×

Found 309 Documents (Results 1–100)

Computational wiretap coding from indistinguishability obfuscation. (English) Zbl 07800212

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14084, 263-293 (2023).
PDFBibTeX XMLCite
Full Text: DOI

One-message secure reductions: on the cost of converting correlations. (English) Zbl 07799105

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14081, 515-547 (2023).
MSC:  68P25 68Mxx 94A60
PDFBibTeX XMLCite
Full Text: DOI

Complete characterization of broadcast and pseudo-signatures from correlations. (English) Zbl 07773999

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14005, 563-593 (2023).
MSC:  94A62 94A60 94A05
PDFBibTeX XMLCite
Full Text: DOI

Information in probability: another information-theoretic proof of a finite de Finetti theorem. (English) Zbl 07773769

Morel, Jean-Michel (ed.) et al., Mathematics going forward. Collected mathematical brushstrokes. Cham: Springer. Lect. Notes Math. 2313, 367-385 (2023).
MSC:  94A17 94A15 62B86
PDFBibTeX XMLCite
Full Text: DOI arXiv

Secure non-interactive reducibility is decidable. (English) Zbl 1519.94056

Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 408-437 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure non-interactive simulation from arbitrary joint distributions. (English) Zbl 1519.94142

Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 378-407 (2023).
MSC:  94A60 94A15 68Q10
PDFBibTeX XMLCite
Full Text: DOI

Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation. (English) Zbl 1517.94013

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13508, 573-602 (2022).
MSC:  94A05 94A40 94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure non-interactive reduction and spectral analysis of correlations. (English) Zbl 1496.94023

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13277, 797-827 (2022).
MSC:  94A60 94A05
PDFBibTeX XMLCite
Full Text: DOI

Secure non-interactive simulation: feasibility and rate. (English) Zbl 1497.68214

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13277, 767-796 (2022).
MSC:  68Q10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Minimax theorems for finite blocklength lossy joint source-channel coding over an arbitrarily varying channel. (English. Russian original) Zbl 1469.94005

Probl. Inf. Transm. 57, No. 2, 99-128 (2021); translation from Probl. Peredachi Inf. 57, No. 2, 3-35 (2021).
MSC:  94A05 94A29 91A15
PDFBibTeX XMLCite
Full Text: DOI arXiv

Nested linear/lattice codes revisited. (English) Zbl 1478.94146

Beresnevich, Victor (ed.) et al., Number theory meets wireless communications. Based on lectures given at the workshop on interactions between number theory and wireless communication, York, UK, July 4–16, 2016. Cham: Springer. Math. Eng. (Cham), 241-270 (2020).
MSC:  94B60 11H71
PDFBibTeX XMLCite
Full Text: DOI

Entropy and compression: a simple proof of an inequality of Khinchin-Ornstein-Shields. (English. Russian original) Zbl 1457.94060

Probl. Inf. Transm. 56, No. 1, 13-22 (2020); translation from Probl. Peredachi Inf. 56, No. 1, 15-25 (2020).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Lectures on entropy. I: Information-theoretic notions. (English) Zbl 1452.81022

Bahns, Dorothea (ed.) et al., Open quantum systems. A mathematical perspective. Based on lectures given at the winter school on dynamical methods in open quantum systems, University of Göttingen, Göttingen, Germany, November 16–19, 2016. Cham: Birkhäuser. Tutor. Sch. Workshops Math. Sci., 141-267 (2019).
PDFBibTeX XMLCite
Full Text: DOI

Reliable communication under the influence of a state-constrained jammer: an information-theoretic perspective on receive diversity. (English. Russian original) Zbl 1457.94081

Probl. Inf. Transm. 55, No. 2, 101-123 (2019); translation from Probl. Peredachi Inf. 55, No. 2, 3-27 (2019).
MSC:  94A40 94A24
PDFBibTeX XMLCite
Full Text: DOI

An operational characterization of mutual information in algorithmic information theory. (English) Zbl 1499.68156

Chatzigiannakis, Ioannis (ed.) et al., 45th international colloquium on automata, languages, and programming. ICALP 2018, Prague, Czech Republic, July 9–13, 2018. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 107, Article 95, 14 p. (2018).
MSC:  68Q30 68Q11 94A60
PDFBibTeX XMLCite
Full Text: DOI

DC programming and DCA for enhancing physical layer security in amplify-and-forward relay beamforming networks based on the SNR approach. (English) Zbl 1429.68024

Le, Nguyen-Thinh (ed.) et al., Advanced computational methods for knowledge engineering. Proceedings of the 5th international conference on computer science, applied mathematics and applications, ICCSAMA 2017, Berlin, Germany, June 30 – July 1, 2017. Cham: Springer. Adv. Intell. Syst. Comput. 629, 23-33 (2018).
MSC:  68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI

Analytical properties of Shannon’s capacity of arbitrarily varying channels under list decoding: super-additivity and discontinuity behavior. (English. Russian original) Zbl 1411.94040

Probl. Inf. Transm. 54, No. 3, 199-228 (2018); translation from Probl. Peredachi Inf. 54, No. 3, 3-35 (2018).
MSC:  94A40 81P68
PDFBibTeX XMLCite
Full Text: DOI

Information-theoretic secret-key agreement: the asymptotically tight relation between the secret-key rate and the channel quality ratio. (English) Zbl 1443.94063

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 345-369 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software