Information-theoretic security

Results: 33



#Item
31Probabilistic complexity theory / Pseudorandomness / Algorithmic information theory / Pseudorandom generator / Average-case complexity / Information-theoretic security / Randomized algorithm / Russell Impagliazzo / List decoding / Theoretical computer science / Applied mathematics / Computational complexity theory

PDF Document

Add to Reading List

Source URL: www1.cs.columbia.edu

Language: English - Date: 2009-04-05 12:14:36
32Secure two-party computation / Information-theoretic security / Homomorphic encryption / Public-key cryptography / Quantum cryptography / Cryptographic primitive / Noisy-storage model / Universal composability / Cryptography / Cryptographic protocols / Secure multi-party computation

PDF Document

Add to Reading List

Source URL: u.cs.biu.ac.il

Language: English - Date: 2011-04-04 06:52:20
33Applied mathematics / Quantum information science / Kish cypher / Quantum key distribution / Quantum computer / Key size / Information-theoretic security / Man-in-the-middle attack / Noisy-storage model / Cryptography / Quantum cryptography / Theoretical computer science

PDF Document

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-06-18 20:01:55
UPDATE