


default search action
1st ICITS 2005: Awaji Island, Japan
- IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, ICITS 2005, Awaji Island, Japan, October 16-19, 2005. IEEE 2005
- Tsutomu Matsumoto, Junji Shikata:
Authenticated encryption and steganography in unconditional security setting. 1-6 - Goichiro Hanaoka:
Unconditionally secure signatures and its related schemes. 7-12 - Daisuke Kobayashi, Hirosuke Yamamoto
, Tomohiro Ogawa:
How to attain the ordinary channel capacity securely in wiretap channels. 13-18 - Gilles Brassard:
Brief history of quantum cryptography: a personal perspective. 19-23 - Ivan Bjerre Damgård, Serge Fehr, Louis Salvail, Christian Schaffner
:
Cryptography in the bounded quantum-storage model. 24-27 - Stefan Wolf
, Jürg Wullschleger:
Bit commitment from weak non-locality. 28-30 - Jörn Müller-Quade:
Temporary assumptions - quantum and classical. 31-33 - Michael O. Rabin:
Provably unbreakable hyper-encryption in the limited access model. 34-37 - Yvo Desmedt:
Unconditionally private and reliable communication in an untrusted network. 38-41 - Matthias Fitzi:
Broadcast and secure computation under reduced setup assumptions. 42-47 - Aggelos Kiayias, Moti Yung:
Cryptography and decoding Reed-Solomon codes as a hard problem. 48 - Anne Canteaut:
Fast correlation attacks against stream ciphers and related open problems. 49-54 - Kaoru Kurosawa:
Some topics related to resilient functions. 55-60 - Keith M. Martin:
Dynamic access policies for unconditionally secure secret sharing schemes. 61-66 - Hiroki Koga:
Coding theorems on the threshold scheme for a general source. 67-72 - Tatsuaki Okamoto:
Relationship of three cryptographic channels in the UC framework. 73 - Yevgeniy Dodis:
On extractors, error-correction and hiding all partial information. 74-79 - Carlo Blundo
:
Randomness in self-healing key distribution schemes. 80-84 - Reihaneh Safavi-Naini, Peter R. Wild:
Bounds on authentication systems in query model. 85-91

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.