Information-theoretic security

Results: 33



#Item
21Applied mathematics / Information theory / Information / Public-key cryptography / Cybernetics / List decoding / Binary symmetric channel / Key size / RSA / Coding theory / Error detection and correction / Mathematics

A Coding-Theoretic Approach to Recovering Noisy RSA Keys Kenneth G. Paterson, Antigoni Polychroniadou, and Dale L. Sibborn Information Security Group, Royal Holloway, University of London Abstract. Inspired by cold boot

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-06 12:25:19
22Secret sharing / Proactive secret sharing / Threshold cryptosystem / Communications protocol / Information-theoretic security / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron∗ RAND Corporation [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 19:43:29
23Dolev-Yao model / Communications protocol / Computer security / Cryptographic primitive / Information-theoretic security / Cryptography / Cryptographic protocols / Secure multi-party computation

ZISC annual report[removed]

Add to Reading List

Source URL: www.zisc.ethz.ch

Language: English - Date: 2015-02-14 14:43:29
24Secure two-party computation / Communications protocol / Secret sharing / Transmission Control Protocol / Information-theoretic security / IP / Computational complexity theory / Zero-knowledge proof / PP / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Multiparty Protocols via Log-Depth Threshold Formulae Gil Cohen∗ Ivan Bjerre Damg˚ ard† Yuval Ishai‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-08-07 04:07:04
25Public-key cryptography / Information-theoretic security / Verifiable secret sharing / Computer security / Cloud computing / Password / Secret sharing / Quantum cryptography / Trustworthy computing / Cryptography / Cryptographic protocols / Secure multi-party computation

The Crypto-democracy and the Trustworthy S´ebastien Gambs1 , Samuel Ranellucci2 , and Alain Tapp3 1 Universit´e de Rennes 1 - INRIA / IRISA, France Department of Computer Science, Aarhus University, Denmark

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-09-09 06:11:33
26Nash equilibrium / Science / Coordination game / Strategic dominance / Outcome / Strategy / Game theory / Problem solving / Economics

Secure or Insure? A Game-Theoretic Analysis of Information Security Games Jens Grossklags Nicolas Christin

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-10-08 16:37:13
27Technology / Telecommunications engineering / Wireless / ANT / Network coding / Channel / Wireless ad-hoc network / Information theory / Wireless networking / Wireless sensor network

Wireless Communication Information Theoretic Security From Channel Reciprocity Gossip Algorithms for Wireless Sensor Networks Alex Dimakis, Anand Sarwate, and Martin Wainwright Distributed Averaging

Add to Reading List

Source URL: wifo.eecs.berkeley.edu

Language: English - Date: 2008-03-21 18:56:00
28Applied mathematics / Decoy state / Quantum key distribution / ETSI Satellite Digital Radio / Information-theoretic security / Man-in-the-middle attack / European Telecommunications Standards Institute / Security parameter / Cryptographic protocol / Quantum cryptography / Cryptography / Quantum information science

GS QKD[removed]V1[removed]Quantum Key Distribution (QKD); Security Proofs

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2010-12-09 09:45:52
29Key management / Public-key cryptography / Quantum key distribution / Secure Communication based on Quantum Cryptography / European Telecommunications Standards Institute / ETSI Satellite Digital Radio / Cryptographic primitive / Key size / Information-theoretic security / Cryptography / Quantum cryptography / Quantum information science

ETSI GS QKD 002 V1[removed]Group Specification Quantum Key Distribution; Use Cases

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2010-06-04 11:14:44
30Public-key cryptography / Encryption / Symmetric-key algorithm / Semantic security / Information-theoretic security / Chosen-plaintext attack / ElGamal encryption / Data Encryption Standard / DES-X / Cryptography / Cipher / Authenticated encryption

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2005-05-11 20:53:55
UPDATE