×

Found 9 Documents (Results 1–9)

Fooling an unbounded adversary with a short key, repeatedly: the honey encryption perspective. (English) Zbl 1517.94127

Tessaro, Stefano (ed.), 2nd conference on information-theoretic cryptography. ITC 2021, July 23–26, 2021, virtual conference. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 199, Article 23, 21 p. (2021).
MSC:  94A60 94A05
PDFBibTeX XMLCite
Full Text: DOI

From the Gaussian circle problem to multivariate Shannon sampling. (English) Zbl 1412.94002

Nashed, M. Zuhair (ed.) et al., Frontiers in orthogonal polynomials and \(q\)-series. Papers based on the international conference, University of Central Florida, Orlando, FL, USA, May 10–12, 2015. Dedicated to Professor Mourad Ismail on his 70th birthday. Hackensack, NJ: World Scientific. Contemp. Math. Appl., Monogr. Expo. Lect. Notes 1, 213-237 (2018).
PDFBibTeX XMLCite
Full Text: DOI

Two philosophies for solving non-linear equations in algebraic cryptanalysis. (English) Zbl 1410.94059

Phan, Raphael C.-W. (ed.) et al., Paradigms in cryptology – Mycrypt 2016. Malicious and exploratory cryptology. Second international conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1–2, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10311, 506-520 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Shannon impossibility, revisited. (English) Zbl 1295.94054

Smith, Adam (ed.), Information theoretic security. 6th international conference, ICITS 2012, Montreal, QC, Canada, August 15–17, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32283-9/pbk). Lecture Notes in Computer Science 7412, 100-110 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field