


default search action
1st ICITS 2005: Awaji Island, Japan
- IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, ICITS 2005, Awaji Island, Japan, October 16-19, 2005. IEEE 2005

- Tsutomu Matsumoto, Junji Shikata:

Authenticated encryption and steganography in unconditional security setting. 1-6 - Goichiro Hanaoka:

Unconditionally secure signatures and its related schemes. 7-12 - Daisuke Kobayashi, Hirosuke Yamamoto

, Tomohiro Ogawa:
How to attain the ordinary channel capacity securely in wiretap channels. 13-18 - Gilles Brassard:

Brief history of quantum cryptography: a personal perspective. 19-23 - Ivan Bjerre Damgård, Serge Fehr, Louis Salvail, Christian Schaffner

:
Cryptography in the bounded quantum-storage model. 24-27 - Stefan Wolf

, Jürg Wullschleger:
Bit commitment from weak non-locality. 28-30 - Jörn Müller-Quade:

Temporary assumptions - quantum and classical. 31-33 - Michael O. Rabin:

Provably unbreakable hyper-encryption in the limited access model. 34-37 - Yvo Desmedt:

Unconditionally private and reliable communication in an untrusted network. 38-41 - Matthias Fitzi:

Broadcast and secure computation under reduced setup assumptions. 42-47 - Aggelos Kiayias, Moti Yung:

Cryptography and decoding Reed-Solomon codes as a hard problem. 48 - Anne Canteaut:

Fast correlation attacks against stream ciphers and related open problems. 49-54 - Kaoru Kurosawa:

Some topics related to resilient functions. 55-60 - Keith M. Martin:

Dynamic access policies for unconditionally secure secret sharing schemes. 61-66 - Hiroki Koga:

Coding theorems on the threshold scheme for a general source. 67-72 - Tatsuaki Okamoto:

Relationship of three cryptographic channels in the UC framework. 73 - Yevgeniy Dodis:

On extractors, error-correction and hiding all partial information. 74-79 - Carlo Blundo

:
Randomness in self-healing key distribution schemes. 80-84 - Reihaneh Safavi-Naini, Peter R. Wild:

Bounds on authentication systems in query model. 85-91

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














