


default search action
Search dblp for Publications
export results for "stream:conf/icits:"
@inproceedings{DBLP:conf/icits/0001S20, author = {Gil Segev and Ido Shahaf}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Hardness vs. (Very Little) Structure in Cryptography: {A} Multi-Prover Interactive Proofs Perspective}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {10:1--10:23}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.10}, doi = {10.4230/LIPICS.ITC.2020.10}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/0001S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/AsharovKLPS20, author = {Gilad Asharov and Ilan Komargodski and Wei{-}Kai Lin and Enoch Peserico and Elaine Shi}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Oblivious Parallel Tight Compaction}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {11:1--11:23}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.11}, doi = {10.4230/LIPICS.ITC.2020.11}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/AsharovKLPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BalcerC20, author = {Victor Balcer and Albert Cheu}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Separating Local {\&} Shuffled Differential Privacy via Histograms}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {1:1--1:14}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.1}, doi = {10.4230/LIPICS.ITC.2020.1}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BalcerC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BeimelKNSS20, author = {Amos Beimel and Aleksandra Korolova and Kobbi Nissim and Or Sheffet and Uri Stemmer}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {The Power of Synergy in Differential Privacy: Combining a Small Curator with Local Randomizers}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {14:1--14:25}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.14}, doi = {10.4230/LIPICS.ITC.2020.14}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BeimelKNSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BlockiKZ20, author = {Jeremiah Blocki and Shubhang Kulkarni and Samson Zhou}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {On Locally Decodable Codes in Resource Bounded Channels}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {16:1--16:23}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.16}, doi = {10.4230/LIPICS.ITC.2020.16}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BlockiKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/ChungLQ20, author = {Kai{-}Min Chung and Tai{-}Ning Liao and Luowen Qian}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Lower Bounds for Function Inversion with Quantum Advice}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {8:1--8:15}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.8}, doi = {10.4230/LIPICS.ITC.2020.8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/ChungLQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CrepeauMSSY20, author = {Claude Cr{\'{e}}peau and Arnaud Massenet and Louis Salvail and Lucas Shigeru Stinchcombe and Nan Yang}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Practical Relativistic Zero-Knowledge for {NP}}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {4:1--4:18}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.4}, doi = {10.4230/LIPICS.ITC.2020.4}, timestamp = {Mon, 29 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/CrepeauMSSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/EeriksonKOPP020, author = {Hendrik Eerikson and Marcel Keller and Claudio Orlandi and Pille Pullonen and Joonas Puura and Mark Simkin}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Use Your Brain! Arithmetic 3PC for Any Modulus with Active Security}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {5:1--5:24}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.5}, doi = {10.4230/LIPICS.ITC.2020.5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/EeriksonKOPP020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/EriguchiK20, author = {Reo Eriguchi and Noboru Kunihiro}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {d-Multiplicative Secret Sharing for Multipartite Adversary Structures}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {2:1--2:16}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.2}, doi = {10.4230/LIPICS.ITC.2020.2}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/EriguchiK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/GhaziGKMPV20, author = {Badih Ghazi and Noah Golowich and Ravi Kumar and Pasin Manurangsi and Rasmus Pagh and Ameya Velingker}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Pure Differentially Private Summation from Anonymous Messages}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {15:1--15:23}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.15}, doi = {10.4230/LIPICS.ITC.2020.15}, timestamp = {Sat, 15 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/GhaziGKMPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/HirtM20, author = {Martin Hirt and Marta Mularczyk}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Efficient {MPC} with a Mixed Adversary}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {3:1--3:23}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.3}, doi = {10.4230/LIPICS.ITC.2020.3}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/HirtM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/LinCGSW20, author = {Fuchun Lin and Mahdi Cheraghchi and Venkatesan Guruswami and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Leakage-Resilient Secret Sharing in Non-Compartmentalized Models}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {7:1--7:24}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.7}, doi = {10.4230/LIPICS.ITC.2020.7}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/LinCGSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/NaorR020, author = {Moni Naor and Lior Rotem and Gil Segev}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Out-Of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {9:1--9:25}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.9}, doi = {10.4230/LIPICS.ITC.2020.9}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/NaorR020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Paskin-Cherniavsky20, author = {Anat Paskin{-}Cherniavsky and Artiom Radune}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {On Polynomial Secret Sharing Schemes}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {12:1--12:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.12}, doi = {10.4230/LIPICS.ITC.2020.12}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Paskin-Cherniavsky20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/PeterTW20, author = {Naty Peter and Rotem Tsabary and Hoeteck Wee}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {One-One Constrained Pseudorandom Functions}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {13:1--13:22}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.13}, doi = {10.4230/LIPICS.ITC.2020.13}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/PeterTW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/RasmussenS20, author = {Peter Michael Reichstein Rasmussen and Amit Sahai}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Expander Graphs Are Non-Malleable Codes}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {6:1--6:10}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.6}, doi = {10.4230/LIPICS.ITC.2020.6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/RasmussenS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/X20, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Front Matter, Table of Contents, Preface, Conference Organization}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {0:1--0:14}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.0}, doi = {10.4230/LIPICS.ITC.2020.0}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/X20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2020, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://www.dagstuhl.de/dagpub/978-3-95977-151-1}, isbn = {978-3-95977-151-1}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/AgarwalCF17, author = {Gaurav Kumar Agarwal and Martina Cardone and Christina Fragouli}, editor = {Junji Shikata}, title = {Secure Network Coding for Multiple Unicast: On the Case of Single Source}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {188--207}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_11}, doi = {10.1007/978-3-319-72089-0\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/AgarwalCF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/ChoudhuryPR17, author = {Ashish Choudhury and Arpita Patra and Divya Ravi}, editor = {Junji Shikata}, title = {Round and Communication Efficient Unconditionally-Secure {MPC} with t t n / 3 in Partially Synchronous Network}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {83--109}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_6}, doi = {10.1007/978-3-319-72089-0\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/ChoudhuryPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CramerDDGX17, author = {Ronald Cramer and Ivan Damg{\aa}rd and Nico D{\"{o}}ttling and Irene Giacomelli and Chaoping Xing}, editor = {Junji Shikata}, title = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {1--25}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_1}, doi = {10.1007/978-3-319-72089-0\_1}, timestamp = {Tue, 28 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/CramerDDGX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CunninghamFY17, author = {Robert K. Cunningham and Benjamin Fuller and Sophia Yakoubov}, editor = {Junji Shikata}, title = {Catching {MPC} Cheaters: Identification and Openability}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {110--134}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_7}, doi = {10.1007/978-3-319-72089-0\_7}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/CunninghamFY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DuttaA17, author = {Sabyasachi Dutta and Avishek Adhikari}, editor = {Junji Shikata}, title = {Contrast Optimal {XOR} Based Visual Cryptographic Schemes}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {58--72}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_4}, doi = {10.1007/978-3-319-72089-0\_4}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DuttaA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/HashimotoSNIH17, author = {Yuji Hashimoto and Kazumasa Shinagawa and Koji Nuida and Masaki Inamura and Goichiro Hanaoka}, editor = {Junji Shikata}, title = {Secure Grouping Protocol Using a Deck of Cards}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {135--152}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_8}, doi = {10.1007/978-3-319-72089-0\_8}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/HashimotoSNIH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KatoOH17, author = {Go Kato and Masaki Owari and Masahito Hayashi}, editor = {Junji Shikata}, title = {Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free Public Communication}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {166--187}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_10}, doi = {10.1007/978-3-319-72089-0\_10}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/KatoOH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/MalinowskiZ17, author = {Daniel Malinowski and Karol Zebrowski}, editor = {Junji Shikata}, title = {Disproving the Conjectures from "On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model"}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {26--38}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_2}, doi = {10.1007/978-3-319-72089-0\_2}, timestamp = {Tue, 28 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/MalinowskiZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/NakaiSIO17, author = {Takeshi Nakai and Satoshi Shirouchi and Mitsugu Iwamoto and Kazuo Ohta}, editor = {Junji Shikata}, title = {Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol Utilizing Private Permutations}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {153--165}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_9}, doi = {10.1007/978-3-319-72089-0\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/NakaiSIO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Watanabe17, author = {Yohei Watanabe}, editor = {Junji Shikata}, title = {Broadcast Encryption with Guessing Secrecy}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {39--57}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_3}, doi = {10.1007/978-3-319-72089-0\_3}, timestamp = {Mon, 18 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/Watanabe17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/YoshidaO17, author = {Maki Yoshida and Satoshi Obana}, editor = {Junji Shikata}, title = {Verifiably Multiplicative Secret Sharing}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {73--82}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_5}, doi = {10.1007/978-3-319-72089-0\_5}, timestamp = {Tue, 28 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/YoshidaO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/YuT17, author = {Lei Yu and Vincent Y. F. Tan}, editor = {Junji Shikata}, title = {R{\'{e}}nyi Resolvability and Its Applications to the Wiretap Channel}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {208--233}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_12}, doi = {10.1007/978-3-319-72089-0\_12}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/YuT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2017, editor = {Junji Shikata}, title = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0}, doi = {10.1007/978-3-319-72089-0}, isbn = {978-3-319-72088-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/0001HS16, author = {Yohei Watanabe and Goichiro Hanaoka and Junji Shikata}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {213--237}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_11}, doi = {10.1007/978-3-319-49175-2\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/0001HS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/AdhikariMORSX16, author = {Avishek Adhikari and Kirill Morozov and Satoshi Obana and Partha Sarathi Roy and Kouichi Sakurai and Rui Xu}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {3--23}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_1}, doi = {10.1007/978-3-319-49175-2\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/AdhikariMORSX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/AlagicBFGSJ16, author = {Gorjan Alagic and Anne Broadbent and Bill Fefferman and Tommaso Gagliardoni and Christian Schaffner and Michael St. Jules}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Computational Security of Quantum Encryption}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {47--71}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_3}, doi = {10.1007/978-3-319-49175-2\_3}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/AlagicBFGSJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/AsoodehAL16, author = {Shahab Asoodeh and Fady Alajaji and Tam{\'{a}}s Linder}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Almost Perfect Privacy for Additive Gaussian Privacy Filters}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {259--278}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_13}, doi = {10.1007/978-3-319-49175-2\_13}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/AsoodehAL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BroadbentW16, author = {Anne Broadbent and Evelyn Wainewright}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Efficient Simulation for Quantum Message Authentication}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {72--91}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_4}, doi = {10.1007/978-3-319-49175-2\_4}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BroadbentW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DArcoPD16, author = {Paolo D'Arco and Roberto De Prisco and Yvo Desmedt}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {95--113}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_5}, doi = {10.1007/978-3-319-49175-2\_5}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DArcoPD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KarabinaR16, author = {Koray Karabina and Angela Robinson}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Revisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic Schemes}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {114--125}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_6}, doi = {10.1007/978-3-319-49175-2\_6}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/KarabinaR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/LinSW16, author = {Fuchun Lin and Reihaneh Safavi{-}Naini and Pengwei Wang}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Detecting Algebraic Manipulation in Leaky Storage Systems}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {129--150}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_7}, doi = {10.1007/978-3-319-49175-2\_7}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/LinSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/ParenteG16, author = {Vladimir P. Parente and Jeroen van de Graaf}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {A Practical Fuzzy Extractor for Continuous Features}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {241--258}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_12}, doi = {10.1007/978-3-319-49175-2\_12}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/ParenteG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/RanellucciTZ16, author = {Samuel Ranellucci and Alain Tapp and Rasmus Winther Zakarias}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Efficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract)}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {190--212}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_10}, doi = {10.1007/978-3-319-49175-2\_10}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/RanellucciTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Skorski16, author = {Maciej Sk{\'{o}}rski}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {A Better Chain Rule for {HILL} Pseudoentropy - Beyond Bounded Leakage}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {279--299}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_14}, doi = {10.1007/978-3-319-49175-2\_14}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Skorski16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/SpiniF16, author = {Gabriele Spini and Serge Fehr}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Cheater Detection in {SPDZ} Multiparty Computation}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {151--176}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_8}, doi = {10.1007/978-3-319-49175-2\_8}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/SpiniF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/TraversoDB16, author = {Giulia Traverso and Denise Demirel and Johannes Buchmann}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Dynamic and Verifiable Hierarchical Secret Sharing}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {24--43}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_2}, doi = {10.1007/978-3-319-49175-2\_2}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/TraversoDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Yasunaga16, author = {Kenji Yasunaga}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Error-Correcting Codes Against Chosen-Codeword Attacks}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {177--189}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_9}, doi = {10.1007/978-3-319-49175-2\_9}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Yasunaga16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2016, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2}, doi = {10.1007/978-3-319-49175-2}, isbn = {978-3-319-49174-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DahabGM15, author = {Ricardo Dahab and Steven D. Galbraith and Eduardo Morais}, editor = {Anja Lehmann and Stefan Wolf}, title = {Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {283--296}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_17}, doi = {10.1007/978-3-319-17470-9\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DahabGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DamgardDN15, author = {Ivan Damg{\aa}rd and Fr{\'{e}}d{\'{e}}ric Dupuis and Jesper Buus Nielsen}, editor = {Anja Lehmann and Stefan Wolf}, title = {On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {87--104}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_6}, doi = {10.1007/978-3-319-17470-9\_6}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/DamgardDN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DamgardFMV15, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, editor = {Anja Lehmann and Stefan Wolf}, title = {The Chaining Lemma and Its Application}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {181--196}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_11}, doi = {10.1007/978-3-319-17470-9\_11}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DamgardFMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DavidNRT15, author = {Bernardo Machado David and Ryo Nishimaki and Samuel Ranellucci and Alain Tapp}, editor = {Anja Lehmann and Stefan Wolf}, title = {Generalizing Efficient Multiparty Computation}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {15--32}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_2}, doi = {10.1007/978-3-319-17470-9\_2}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DavidNRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DemayGMT15, author = {Gr{\'{e}}gory Demay and Peter Gazi and Ueli Maurer and Bj{\"{o}}rn Tackmann}, editor = {Anja Lehmann and Stefan Wolf}, title = {Query-Complexity Amplification for Random Oracles}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {159--180}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_10}, doi = {10.1007/978-3-319-17470-9\_10}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DemayGMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Ding15, author = {Ning Ding}, editor = {Anja Lehmann and Stefan Wolf}, title = {On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {51--68}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_4}, doi = {10.1007/978-3-319-17470-9\_4}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/Ding15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DowsleyMN15, author = {Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Tobias Nilges}, editor = {Anja Lehmann and Stefan Wolf}, title = {Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {197--213}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_12}, doi = {10.1007/978-3-319-17470-9\_12}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DowsleyMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/FullerH15, author = {Benjamin Fuller and Ariel Hamlin}, editor = {Anja Lehmann and Stefan Wolf}, title = {Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {69--86}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_5}, doi = {10.1007/978-3-319-17470-9\_5}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/FullerH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/GalbraithS15, author = {Steven D. Galbraith and Barak Shani}, editor = {Anja Lehmann and Stefan Wolf}, title = {The Multivariate Hidden Number Problem}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {250--268}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_15}, doi = {10.1007/978-3-319-17470-9\_15}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/GalbraithS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/HajiabadiK15, author = {Mohammad Hajiabadi and Bruce M. Kapron}, editor = {Anja Lehmann and Stefan Wolf}, title = {Gambling, Computational Information and Encryption Security}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {141--158}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_9}, doi = {10.1007/978-3-319-17470-9\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/HajiabadiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KishoreKVK15, author = {Ravi Kishore and Ashutosh Kumar and Chiranjeevi Vanarasa and Kannan Srinathan}, editor = {Anja Lehmann and Stefan Wolf}, title = {Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {33--50}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_3}, doi = {10.1007/978-3-319-17470-9\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/KishoreKVK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/MarkhamM15, author = {Damian Markham and Anne Marin}, editor = {Anja Lehmann and Stefan Wolf}, title = {Practical Sharing of Quantum Secrets over Untrusted Channels}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {1--14}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_1}, doi = {10.1007/978-3-319-17470-9\_1}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/MarkhamM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/OstrovskyP15, author = {Rafail Ostrovsky and Anat Paskin{-}Cherniavsky}, editor = {Anja Lehmann and Stefan Wolf}, title = {Locally Decodable Codes for Edit Distance}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {236--249}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_14}, doi = {10.1007/978-3-319-17470-9\_14}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/OstrovskyP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Skorski15, author = {Maciej Skorski}, editor = {Anja Lehmann and Stefan Wolf}, title = {Metric Pseudoentropy: Characterizations, Transformations and Applications}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {105--122}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_7}, doi = {10.1007/978-3-319-17470-9\_7}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Skorski15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Skorski15a, author = {Maciej Skorski}, editor = {Anja Lehmann and Stefan Wolf}, title = {Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {123--140}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_8}, doi = {10.1007/978-3-319-17470-9\_8}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Skorski15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Walter15, author = {Michael Walter}, editor = {Anja Lehmann and Stefan Wolf}, title = {Lattice Point Enumeration on Block Reduced Bases}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {269--282}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_16}, doi = {10.1007/978-3-319-17470-9\_16}, timestamp = {Thu, 29 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/Walter15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/WangS15, author = {Pengwei Wang and Reihaneh Safavi{-}Naini}, editor = {Anja Lehmann and Stefan Wolf}, title = {Limited View Adversary Codes: Bounds, Constructions and Applications}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {214--235}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_13}, doi = {10.1007/978-3-319-17470-9\_13}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/WangS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2015, editor = {Anja Lehmann and Stefan Wolf}, title = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9}, doi = {10.1007/978-3-319-17470-9}, isbn = {978-3-319-17469-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2013, editor = {Carles Padr{\'{o}}}, title = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04268-8}, doi = {10.1007/978-3-319-04268-8}, isbn = {978-3-319-04267-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/AhmadiS13, author = {Hadi Ahmadi and Reihaneh Safavi{-}Naini}, editor = {Carles Padr{\'{o}}}, title = {Detection of Algebraic Manipulation in the Presence of Leakage}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {238--258}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_14}, doi = {10.1007/978-3-319-04268-8\_14}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/AhmadiS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DArcoP13, author = {Paolo D'Arco and Roberto De Prisco}, editor = {Carles Padr{\'{o}}}, title = {Secure Two-Party Computation: {A} Visual Way}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {18--38}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_2}, doi = {10.1007/978-3-319-04268-8\_2}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DArcoP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DArcoPS13, author = {Paolo D'Arco and Roberto De Prisco and Alfredo De Santis}, editor = {Carles Padr{\'{o}}}, title = {Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {39--55}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_3}, doi = {10.1007/978-3-319-04268-8\_3}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DArcoPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DamgardFNS13, author = {Ivan Damg{\aa}rd and Jakob Funder and Jesper Buus Nielsen and Louis Salvail}, editor = {Carles Padr{\'{o}}}, title = {Superposition Attacks on Cryptographic Protocols}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {142--161}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_9}, doi = {10.1007/978-3-319-04268-8\_9}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/DamgardFNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/GarayGOR13, author = {Juan A. Garay and Clint Givens and Rafail Ostrovsky and Pavel Raykov}, editor = {Carles Padr{\'{o}}}, title = {Broadcast (and Round) Efficient Verifiable Secret Sharing}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {200--219}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_12}, doi = {10.1007/978-3-319-04268-8\_12}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/GarayGOR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/GirnykGVRS13, author = {Maksym A. Girnyk and Frederic Gabry and Mikko Vehkaper{\"{a}} and Lars K. Rasmussen and Mikael Skoglund}, editor = {Carles Padr{\'{o}}}, title = {On the Transmit Beamforming for {MIMO} Wiretap Channels: Large-System Analysis}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {90--102}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_6}, doi = {10.1007/978-3-319-04268-8\_6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/GirnykGVRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/GuoLWRW13, author = {Teng Guo and Feng Liu and Chuan Kun Wu and YaWei Ren and Wen Wang}, editor = {Carles Padr{\'{o}}}, title = {On (k, n) Visual Cryptography Scheme with t Essential Parties}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {56--68}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_4}, doi = {10.1007/978-3-319-04268-8\_4}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/GuoLWRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/IwamotoS13, author = {Mitsugu Iwamoto and Junji Shikata}, editor = {Carles Padr{\'{o}}}, title = {Information Theoretic Security for Encryption Based on Conditional R{\'{e}}nyi Entropies}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {103--121}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_7}, doi = {10.1007/978-3-319-04268-8\_7}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/IwamotoS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/JastrzebskiD13, author = {Michal Jastrzebski and Stefan Dziembowski}, editor = {Carles Padr{\'{o}}}, title = {Leakage Resilience of the Blom's Key Distribution Scheme}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {220--237}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_13}, doi = {10.1007/978-3-319-04268-8\_13}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/JastrzebskiD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KerenidisLX13, author = {Iordanis Kerenidis and Mathieu Lauri{\`{e}}re and David Xiao}, editor = {Carles Padr{\'{o}}}, title = {New Lower Bounds for Privacy in Communication Protocols}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {69--89}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_5}, doi = {10.1007/978-3-319-04268-8\_5}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/KerenidisLX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KurosawaOK13, author = {Kaoru Kurosawa and Hiroyuki Ohta and Kenji Kakuta}, editor = {Carles Padr{\'{o}}}, title = {How to Construct Strongly Secure Network Coding Scheme}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {1--17}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_1}, doi = {10.1007/978-3-319-04268-8\_1}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/KurosawaOK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/McKagueS13, author = {Matthew McKague and Lana Sheridan}, editor = {Carles Padr{\'{o}}}, title = {Insider-Proof Encryption with Applications for Quantum Key Distribution}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {122--141}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_8}, doi = {10.1007/978-3-319-04268-8\_8}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/McKagueS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Skorski13, author = {Maciej Skorski}, editor = {Carles Padr{\'{o}}}, title = {Modulus Computational Entropy}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {179--199}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_11}, doi = {10.1007/978-3-319-04268-8\_11}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Skorski13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/YaoL13, author = {Yanqing Yao and Zhoujun Li}, editor = {Carles Padr{\'{o}}}, title = {Overcoming Weak Expectations via the R{\'{e}}nyi Entropy and the Expanded Computational Entropy}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {162--178}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_10}, doi = {10.1007/978-3-319-04268-8\_10}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/YaoL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/AlimomeniS12, author = {Mohsen Alimomeni and Reihaneh Safavi{-}Naini}, editor = {Adam D. Smith}, title = {Guessing Secrecy}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {1--13}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_1}, doi = {10.1007/978-3-642-32284-6\_1}, timestamp = {Tue, 20 Aug 2024 08:48:08 +0200}, biburl = {https://dblp.org/rec/conf/icits/AlimomeniS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BroadbentJRT12, author = {Anne Broadbent and Stacey Jeffery and Samuel Ranellucci and Alain Tapp}, editor = {Adam D. Smith}, title = {Trading Robustness for Correctness and Privacy in Certain Multiparty Computations, beyond an Honest Majority}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {14--36}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_2}, doi = {10.1007/978-3-642-32284-6\_2}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BroadbentJRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CanettiRR12, author = {Ran Canetti and Ben Riva and Guy N. Rothblum}, editor = {Adam D. Smith}, title = {Two Protocols for Delegation of Computation}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {37--61}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_3}, doi = {10.1007/978-3-642-32284-6\_3}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/CanettiRR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CramerDP12, author = {Ronald Cramer and Ivan Damg{\aa}rd and Valerio Pastro}, editor = {Adam D. Smith}, title = {On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {62--79}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_4}, doi = {10.1007/978-3-642-32284-6\_4}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/CramerDP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DavidNM12, author = {Bernardo Machado David and Anderson C. A. Nascimento and J{\"{o}}rn M{\"{u}}ller{-}Quade}, editor = {Adam D. Smith}, title = {Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {80--99}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_5}, doi = {10.1007/978-3-642-32284-6\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DavidNM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Dodis12, author = {Yevgeniy Dodis}, editor = {Adam D. Smith}, title = {Shannon Impossibility, Revisited}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {100--110}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_6}, doi = {10.1007/978-3-642-32284-6\_6}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Dodis12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DottlingKM12, author = {Nico D{\"{o}}ttling and Daniel Kraschewski and J{\"{o}}rn M{\"{u}}ller{-}Quade}, editor = {Adam D. Smith}, title = {Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {111--128}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_7}, doi = {10.1007/978-3-642-32284-6\_7}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DottlingKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/HirtLMR12, author = {Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub}, editor = {Adam D. Smith}, title = {Passive Corruption in Statistical Multi-Party Computation - (Extended Abstract)}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {129--146}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_8}, doi = {10.1007/978-3-642-32284-6\_8}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/HirtLMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KellerMR12, author = {Marcel Keller and Gert L{\ae}ss{\o}e Mikkelsen and Andy Rupp}, editor = {Adam D. Smith}, title = {Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {147--166}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_9}, doi = {10.1007/978-3-642-32284-6\_9}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/KellerMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/WatanabeSS12, author = {Yohei Watanabe and Takenobu Seito and Junji Shikata}, editor = {Adam D. Smith}, title = {Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {167--186}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_10}, doi = {10.1007/978-3-642-32284-6\_10}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/WatanabeSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/YoshidaFF12, author = {Maki Yoshida and Toru Fujiwara and Marc P. C. Fossorier}, editor = {Adam D. Smith}, title = {Optimum General Threshold Secret Sharing}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {187--204}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_11}, doi = {10.1007/978-3-642-32284-6\_11}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/YoshidaFF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2012, editor = {Adam D. Smith}, title = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6}, doi = {10.1007/978-3-642-32284-6}, isbn = {978-3-642-32283-9}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/AhmadiS11, author = {Hadi Ahmadi and Reihaneh Safavi{-}Naini}, editor = {Serge Fehr}, title = {Common Randomness and Secret Key Capacities of Two-Way Channels}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {76--93}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_8}, doi = {10.1007/978-3-642-20728-0\_8}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/AhmadiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Applebaum11, author = {Benny Applebaum}, editor = {Serge Fehr}, title = {Randomly Encoding Functions: {A} New Cryptographic Paradigm - (Invited Talk)}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {25--31}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_3}, doi = {10.1007/978-3-642-20728-0\_3}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Applebaum11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BargK11, author = {Alexander Barg and Grigory Kabatiansky}, editor = {Serge Fehr}, title = {Digital Fingerprinting under and (Somewhat) beyond the Marking Assumption - (Invited Talk)}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {202--205}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_18}, doi = {10.1007/978-3-642-20728-0\_18}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BargK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/ChoudhuryKP11, author = {Ashish Choudhury and Kaoru Kurosawa and Arpita Patra}, editor = {Serge Fehr}, title = {The Round Complexity of Perfectly Secure General {VSS}}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {143--162}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_14}, doi = {10.1007/978-3-642-20728-0\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/ChoudhuryKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Csiszar11, author = {Imre Csisz{\'{a}}r}, editor = {Serge Fehr}, title = {On Information Theoretic Security: Mathematical Models and Techniques - (Invited Talk)}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {73--75}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_7}, doi = {10.1007/978-3-642-20728-0\_7}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Csiszar11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Damgard11, author = {Ivan Damg{\aa}rd}, editor = {Serge Fehr}, title = {Quantum Communication Attacks on Classical Cryptographic Protocols - (Invited Talk)}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {181}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_16}, doi = {10.1007/978-3-642-20728-0\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Damgard11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DottlingKM11, author = {Nico D{\"{o}}ttling and Daniel Kraschewski and J{\"{o}}rn M{\"{u}}ller{-}Quade}, editor = {Serge Fehr}, title = {Efficient Reductions for Non-signaling Cryptographic Primitives}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {120--137}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_12}, doi = {10.1007/978-3-642-20728-0\_12}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DottlingKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/HirtLMR11, author = {Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub}, editor = {Serge Fehr}, title = {Graceful Degradation in Multi-Party Computation (Extended Abstract)}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {163--180}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_15}, doi = {10.1007/978-3-642-20728-0\_15}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/HirtLMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Ishai11, author = {Yuval Ishai}, editor = {Serge Fehr}, title = {Correlation Extractors and Their Applications - (Invited Talk)}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {1--5}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_1}, doi = {10.1007/978-3-642-20728-0\_1}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Ishai11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KawachiPT11, author = {Akinori Kawachi and Christopher Portmann and Keisuke Tanaka}, editor = {Serge Fehr}, title = {Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and Authenticity}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {6--24}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_2}, doi = {10.1007/978-3-642-20728-0\_2}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/KawachiPT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/NayakAS11, author = {Manan Nayak and Shashank Agrawal and Kannan Srinathan}, editor = {Serge Fehr}, title = {Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {32--51}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_4}, doi = {10.1007/978-3-642-20728-0\_4}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/NayakAS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/PatraR11, author = {Arpita Patra and C. Pandu Rangan}, editor = {Serge Fehr}, title = {Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {206--226}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_19}, doi = {10.1007/978-3-642-20728-0\_19}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/PatraR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/PriscoS11, author = {Roberto De Prisco and Alfredo De Santis}, editor = {Serge Fehr}, title = {Using Colors to Improve Visual Cryptography for Black and White Images}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {182--201}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_17}, doi = {10.1007/978-3-642-20728-0\_17}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/PriscoS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Renner11, author = {Renato Renner}, editor = {Serge Fehr}, title = {Quantum-Resilient Randomness Extraction - (Invited Talk)}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {52--57}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_5}, doi = {10.1007/978-3-642-20728-0\_5}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Renner11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Reyzin11, author = {Leonid Reyzin}, editor = {Serge Fehr}, title = {Some Notions of Entropy for Cryptography - (Invited Talk)}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {138--142}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_13}, doi = {10.1007/978-3-642-20728-0\_13}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Reyzin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Shokrollahi11, author = {Amin Shokrollahi}, editor = {Serge Fehr}, title = {LT-Codes and Phase Transitions for Mutual Information - (Invited Talk)}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {94--99}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_9}, doi = {10.1007/978-3-642-20728-0\_9}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Shokrollahi11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/SwansonS11, author = {Colleen Swanson and Douglas R. Stinson}, editor = {Serge Fehr}, title = {Unconditionally Secure Signature Schemes Revisited}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {100--116}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_10}, doi = {10.1007/978-3-642-20728-0\_10}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/SwansonS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/WangD11, author = {Yongge Wang and Yvo Desmedt}, editor = {Serge Fehr}, title = {Homogeneous Faults, Colored Edge Graphs, and Cover Free Families}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {58--72}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_6}, doi = {10.1007/978-3-642-20728-0\_6}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/WangD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Wolf11, author = {Ronald de Wolf}, editor = {Serge Fehr}, title = {Bell Inequalities: What Do We Know about Them and Why Should Cryptographers Care? - (Invited Talk)}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {117--119}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_11}, doi = {10.1007/978-3-642-20728-0\_11}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Wolf11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2011, editor = {Serge Fehr}, title = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0}, doi = {10.1007/978-3-642-20728-0}, isbn = {978-3-642-20727-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2009, editor = {Kaoru Kurosawa}, title = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14496-7}, doi = {10.1007/978-3-642-14496-7}, isbn = {978-3-642-14495-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/AlwenDW09, author = {Jo{\"{e}}l Alwen and Yevgeniy Dodis and Daniel Wichs}, editor = {Kaoru Kurosawa}, title = {Survey: Leakage Resilience and the Bounded Retrieval Model}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {1--18}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_1}, doi = {10.1007/978-3-642-14496-7\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/AlwenDW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/ChenM09, author = {Han Chen and Pasquale Malacaria}, editor = {Kaoru Kurosawa}, title = {The Optimum Leakage Principle for Analyzing Multi-threaded Programs}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {177--193}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_15}, doi = {10.1007/978-3-642-14496-7\_15}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/ChenM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Dziembowski09, author = {Stefan Dziembowski}, editor = {Kaoru Kurosawa}, title = {A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {19--26}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_2}, doi = {10.1007/978-3-642-14496-7\_2}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Dziembowski09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/FarrasGMP09, author = {Oriol Farr{\`{a}}s and Ignacio Gracia and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Carles Padr{\'{o}}}, editor = {Kaoru Kurosawa}, title = {Linear Threshold Multisecret Sharing Schemes}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {110--126}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_9}, doi = {10.1007/978-3-642-14496-7\_9}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/FarrasGMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/FarrasMPV09, author = {Oriol Farr{\`{a}}s and Jessica Ruth Metcalf{-}Burton and Carles Padr{\'{o}} and Leonor V{\'{a}}zquez}, editor = {Kaoru Kurosawa}, title = {On the Optimization of Bipartite Secret Sharing Schemes}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {93--109}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_8}, doi = {10.1007/978-3-642-14496-7\_8}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/FarrasMPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/GaziM09, author = {Peter Gazi and Ueli Maurer}, editor = {Kaoru Kurosawa}, title = {Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {28--44}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_4}, doi = {10.1007/978-3-642-14496-7\_4}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/GaziM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Koashi09, author = {Masato Koashi}, editor = {Kaoru Kurosawa}, title = {Security of Key Distribution and Complementarity in Quantum Mechanics}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {27}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_3}, doi = {10.1007/978-3-642-14496-7\_3}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Koashi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Kobara09, author = {Kazukuni Kobara}, editor = {Kaoru Kurosawa}, title = {Code-Based Public-Key Cryptosystems and Their Applications}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {45--55}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_5}, doi = {10.1007/978-3-642-14496-7\_5}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Kobara09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/MuramatsuYD09, author = {Jun Muramatsu and Kazuyuki Yoshimura and Peter Davis}, editor = {Kaoru Kurosawa}, title = {Information Theoretic Security Based on Bounded Observability}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {128--139}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_11}, doi = {10.1007/978-3-642-14496-7\_11}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/MuramatsuYD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Narayan09, author = {Prakash Narayan}, editor = {Kaoru Kurosawa}, title = {Multiterminal Secrecy Generation and Tree Packing}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {127}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_10}, doi = {10.1007/978-3-642-14496-7\_10}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Narayan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Nuida09, author = {Koji Nuida}, editor = {Kaoru Kurosawa}, title = {A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {194--212}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_16}, doi = {10.1007/978-3-642-14496-7\_16}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Nuida09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/NuidaH09, author = {Koji Nuida and Goichiro Hanaoka}, editor = {Kaoru Kurosawa}, title = {On the Security of Pseudorandomized Information-Theoretically Secure Schemes}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {56--73}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_6}, doi = {10.1007/978-3-642-14496-7\_6}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/NuidaH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/NuidaH09a, author = {Koji Nuida and Goichiro Hanaoka}, editor = {Kaoru Kurosawa}, title = {An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint Codes}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {213--230}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_17}, doi = {10.1007/978-3-642-14496-7\_17}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/NuidaH09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/PatraCR09, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Kaoru Kurosawa}, title = {Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {74--92}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_7}, doi = {10.1007/978-3-642-14496-7\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/PatraCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/SendaK09, author = {Kazuhiro Senda and Masaki Kawamura}, editor = {Kaoru Kurosawa}, title = {Statistical-Mechanical Approach for Multiple Watermarks Using Spectrum Spreading}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {231--247}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_18}, doi = {10.1007/978-3-642-14496-7\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/SendaK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Smith09, author = {Adam D. Smith}, editor = {Kaoru Kurosawa}, title = {What Can Cryptography Do for Coding Theory?}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {158}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_13}, doi = {10.1007/978-3-642-14496-7\_13}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Smith09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/YangD09, author = {Qiushi Yang and Yvo Desmedt}, editor = {Kaoru Kurosawa}, title = {Cryptanalysis of Secure Message Transmission Protocols with Feedback}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {159--176}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_14}, doi = {10.1007/978-3-642-14496-7\_14}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/YangD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/ZaveruchaS09, author = {Gregory M. Zaverucha and Douglas R. Stinson}, editor = {Kaoru Kurosawa}, title = {Group Testing and Batch Verification}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {140--157}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_12}, doi = {10.1007/978-3-642-14496-7\_12}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/ZaveruchaS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2007, editor = {Yvo Desmedt}, title = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10230-1}, doi = {10.1007/978-3-642-10230-1}, isbn = {978-3-642-10229-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Araki08, author = {Toshinori Araki}, editor = {Reihaneh Safavi{-}Naini}, title = {Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {2--13}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_2}, doi = {10.1007/978-3-540-85093-9\_2}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/Araki08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BaigneresV08, author = {Thomas Baign{\`{e}}res and Serge Vaudenay}, editor = {Reihaneh Safavi{-}Naini}, title = {The Complexity of Distinguishing Distributions (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {210--222}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_20}, doi = {10.1007/978-3-540-85093-9\_20}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BaigneresV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BarrosB08, author = {Jo{\~{a}}o Barros and Matthieu R. Bloch}, editor = {Reihaneh Safavi{-}Naini}, title = {Strong Secrecy for Wireless Channels (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {40--53}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_5}, doi = {10.1007/978-3-540-85093-9\_5}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BarrosB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BealsS08, author = {Travis R. Beals and Barry C. Sanders}, editor = {Reihaneh Safavi{-}Naini}, title = {Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {29--39}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_4}, doi = {10.1007/978-3-540-85093-9\_4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BealsS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BilletP08, author = {Olivier Billet and Duong Hieu Phan}, editor = {Reihaneh Safavi{-}Naini}, title = {Efficient Traitor Tracing from Collusion Secure Codes}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {171--182}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_17}, doi = {10.1007/978-3-540-85093-9\_17}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BilletP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BlackburnEMP08, author = {Simon R. Blackburn and Tuvi Etzion and Keith M. Martin and Maura B. Paterson}, editor = {Reihaneh Safavi{-}Naini}, title = {Efficient Key Predistribution for Grid-Based Wireless Sensor Networks}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {54--69}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_6}, doi = {10.1007/978-3-540-85093-9\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/BlackburnEMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BlackburnMPS08, author = {Simon R. Blackburn and Keith M. Martin and Maura B. Paterson and Douglas R. Stinson}, editor = {Reihaneh Safavi{-}Naini}, title = {Key Refreshing in Wireless Sensor Networks}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {156--170}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_16}, doi = {10.1007/978-3-540-85093-9\_16}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/BlackburnMPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BlierT08, author = {Hugue Blier and Alain Tapp}, editor = {Reihaneh Safavi{-}Naini}, title = {A Single Initialization Server for Multi-party Cryptography}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {71--85}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_8}, doi = {10.1007/978-3-540-85093-9\_8}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/BlierT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/ChoudharyPASR08, author = {Ashish Choudhary and Arpita Patra and B. V. Ashwinkumar and K. Srinathan and C. Pandu Rangan}, editor = {Reihaneh Safavi{-}Naini}, title = {Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {137--155}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_15}, doi = {10.1007/978-3-540-85093-9\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/ChoudharyPASR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Collins08, author = {Michael J. Collins}, editor = {Reihaneh Safavi{-}Naini}, title = {Upper Bounds for Set Systems with the Identifiable Parent Property}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {100--106}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_10}, doi = {10.1007/978-3-540-85093-9\_10}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Collins08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CrepeauKS08, author = {Claude Cr{\'{e}}peau and Joe Kilian and George Savvides}, editor = {Reihaneh Safavi{-}Naini}, title = {Interactive Hashing: An Information Theoretic Tool (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {14--28}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_3}, doi = {10.1007/978-3-540-85093-9\_3}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/CrepeauKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CrepeauW08, author = {Claude Cr{\'{e}}peau and J{\"{u}}rg Wullschleger}, editor = {Reihaneh Safavi{-}Naini}, title = {Statistical Security Conditions for Two-Party Secure Function Evaluation}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {86--99}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_9}, doi = {10.1007/978-3-540-85093-9\_9}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/CrepeauW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DesmedtKS08, author = {Yvo Desmedt and Brian King and Berry Schoenmakers}, editor = {Reihaneh Safavi{-}Naini}, title = {Revisiting the Karnin, Greene and Hellman Bounds}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {183--198}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_18}, doi = {10.1007/978-3-540-85093-9\_18}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DesmedtKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DowsleyGMN08, author = {Rafael Dowsley and Jeroen van de Graaf and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, editor = {Reihaneh Safavi{-}Naini}, title = {Oblivious Transfer Based on the McEliece Assumptions}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {107--117}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_11}, doi = {10.1007/978-3-540-85093-9\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DowsleyGMN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Garay08, author = {Juan A. Garay}, editor = {Reihaneh Safavi{-}Naini}, title = {Partially Connected Networks: Information Theoretically Secure Protocols and Open Problems (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {1}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_1}, doi = {10.1007/978-3-540-85093-9\_1}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Garay08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Guruswami08, author = {Venkatesan Guruswami}, editor = {Reihaneh Safavi{-}Naini}, title = {List Error-Correction with Optimal Information Rate (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {118--119}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_12}, doi = {10.1007/978-3-540-85093-9\_12}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Guruswami08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Hanaoka08, author = {Goichiro Hanaoka}, editor = {Reihaneh Safavi{-}Naini}, title = {Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {223--231}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_21}, doi = {10.1007/978-3-540-85093-9\_21}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Hanaoka08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/JakobyLM08, author = {Andreas Jakoby and Maciej Liskiewicz and Aleksander Madry}, editor = {Reihaneh Safavi{-}Naini}, title = {Susceptible Two-Party Quantum Computations}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {121--136}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_14}, doi = {10.1007/978-3-540-85093-9\_14}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/JakobyLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KurosawaK08, author = {Kaoru Kurosawa and Takeshi Koshiba}, editor = {Reihaneh Safavi{-}Naini}, title = {Simple Direct Reduction of String (1, 2)-OT to Rabin's {OT} without Privacy Amplification}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {199--209}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_19}, doi = {10.1007/978-3-540-85093-9\_19}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/KurosawaK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Lutkenhaus08, author = {Norbert L{\"{u}}tkenhaus}, editor = {Reihaneh Safavi{-}Naini}, title = {Theory of Quantum Key Distribution: The Road Ahead (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {120}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_13}, doi = {10.1007/978-3-540-85093-9\_13}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Lutkenhaus08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Patarin08, author = {Jacques Patarin}, editor = {Reihaneh Safavi{-}Naini}, title = {A Proof of Security in O(2n) for the Xor of Two Random Permutations}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {232--248}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_22}, doi = {10.1007/978-3-540-85093-9\_22}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Patarin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/StandaertMY08, author = {Fran{\c{c}}ois{-}Xavier Standaert and Tal Malkin and Moti Yung}, editor = {Reihaneh Safavi{-}Naini}, title = {Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {70}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_7}, doi = {10.1007/978-3-540-85093-9\_7}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/StandaertMY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2008, editor = {Reihaneh Safavi{-}Naini}, title = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9}, doi = {10.1007/978-3-540-85093-9}, isbn = {978-3-540-85092-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/0002LPS07, author = {Luis Antunes and Sophie Laplante and Alexandre Pinto and Liliana C. M. Salvador}, editor = {Yvo Desmedt}, title = {Cryptographic Security of Individual Instances}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {195--210}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_17}, doi = {10.1007/978-3-642-10230-1\_17}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/0002LPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BrassardBFGT07, author = {Gilles Brassard and Anne Broadbent and Joseph F. Fitzsimons and S{\'{e}}bastien Gambs and Alain Tapp}, editor = {Yvo Desmedt}, title = {Anonymous Quantum Communication - (Extended Abstract)}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {181--182}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_15}, doi = {10.1007/978-3-642-10230-1\_15}, timestamp = {Mon, 13 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/BrassardBFGT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DArcoS07, author = {Paolo D'Arco and Alfredo De Santis}, editor = {Yvo Desmedt}, title = {Optimising {SD} and {LSD} in Presence of Non-uniform Probabilities of Revocation}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {46--64}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_4}, doi = {10.1007/978-3-642-10230-1\_4}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DArcoS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/HaraSSM07, author = {Yuki Hara and Takenobu Seito and Junji Shikata and Tsutomu Matsumoto}, editor = {Yvo Desmedt}, title = {Unconditionally Secure Blind Signatures}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {23--43}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_2}, doi = {10.1007/978-3-642-10230-1\_2}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/HaraSSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/ImaiMN07, author = {Hideki Imai and Kirill Morozov and Anderson C. A. Nascimento}, editor = {Yvo Desmedt}, title = {Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {183--194}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_16}, doi = {10.1007/978-3-642-10230-1\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/ImaiMN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KasperNN07, author = {Emilia K{\"{a}}sper and Ventzislav Nikov and Svetla Nikova}, editor = {Yvo Desmedt}, title = {Strongly Multiplicative Hierarchical Threshold Secret Sharing}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {148--168}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_13}, doi = {10.1007/978-3-642-10230-1\_13}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/KasperNN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Kerenidis07, author = {Iordanis Kerenidis}, editor = {Yvo Desmedt}, title = {Introduction to Quantum Information Theory}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {146--147}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_12}, doi = {10.1007/978-3-642-10230-1\_12}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Kerenidis07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KitadaHMI07, author = {Wataru Kitada and Goichiro Hanaoka and Kanta Matsuura and Hideki Imai}, editor = {Yvo Desmedt}, title = {Unconditionally Secure Chaffing-and-Winnowing for Multiple Use}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {133--145}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_11}, doi = {10.1007/978-3-642-10230-1\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/KitadaHMI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KurosawaS07, author = {Kaoru Kurosawa and Kazuhiro Suzuki}, editor = {Yvo Desmedt}, title = {Almost Secure (1-Round, n-Channel) Message Transmission Scheme}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {99--112}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_8}, doi = {10.1007/978-3-642-10230-1\_8}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/KurosawaS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Maurer07, author = {Ueli Maurer}, editor = {Yvo Desmedt}, title = {Random Systems: Theory and Applications}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {44--45}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_3}, doi = {10.1007/978-3-642-10230-1\_3}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Maurer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/PintoSM007, author = {Alexandre Pinto and Andr{\'{e}} Souto and Armando Matos and Luis Antunes}, editor = {Yvo Desmedt}, title = {Commitment and Authentication Systems}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {1--22}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_1}, doi = {10.1007/978-3-642-10230-1\_1}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/PintoSM007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/ReistadT07, author = {Tord Ingolf Reistad and Tomas Toft}, editor = {Yvo Desmedt}, title = {Secret Sharing Comparison by Transformation and Rotation}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {169--180}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_14}, doi = {10.1007/978-3-642-10230-1\_14}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/ReistadT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/RennerWW07, author = {Renato Renner and Stefan Wolf and J{\"{u}}rg Wullschleger}, editor = {Yvo Desmedt}, title = {Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {65--75}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_5}, doi = {10.1007/978-3-642-10230-1\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/RennerWW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Shikata07, author = {Junji Shikata}, editor = {Yvo Desmedt}, title = {Construction Methodology of Unconditionally Secure Signature Schemes}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {113--114}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_9}, doi = {10.1007/978-3-642-10230-1\_9}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Shikata07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/SrinathanRK07, author = {K. Srinathan and C. Pandu Rangan and Ranjit Kumaresan}, editor = {Yvo Desmedt}, title = {On Exponential Lower Bound for Protocols for Reliable Communication in Networks}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {89--98}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_7}, doi = {10.1007/978-3-642-10230-1\_7}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/SrinathanRK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Tomas-BuliartFS07, author = {Joan Tom{\`{a}}s{-}Buliart and Marcel Fernandez and Miguel Soriano}, editor = {Yvo Desmedt}, title = {Improvement of Collusion Secure Convolutional Fingerprinting Information Codes}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {76--88}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_6}, doi = {10.1007/978-3-642-10230-1\_6}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Tomas-BuliartFS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/WangS07, author = {Shuhong Wang and Reihaneh Safavi{-}Naini}, editor = {Yvo Desmedt}, title = {New Results on Unconditionally Secure Multi-receiver Manual Authentication}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {115--132}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_10}, doi = {10.1007/978-3-642-10230-1\_10}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/WangS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Blundo05, author = {Carlo Blundo}, title = {Randomness in self-healing key distribution schemes}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {80--84}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543962}, doi = {10.1109/ITWTPI.2005.1543962}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icits/Blundo05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Brassard05, author = {Gilles Brassard}, title = {Brief history of quantum cryptography: a personal perspective}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {19--23}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543949}, doi = {10.1109/ITWTPI.2005.1543949}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/Brassard05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Canteaut05, author = {Anne Canteaut}, title = {Fast correlation attacks against stream ciphers and related open problems}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {49--54}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.4638690}, doi = {10.1109/ITWTPI.2005.4638690}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Canteaut05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DamgardFSS05, author = {Ivan Bjerre Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner}, title = {Cryptography in the bounded quantum-storage model}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {24--27}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543950}, doi = {10.1109/ITWTPI.2005.1543950}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DamgardFSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Desmedt05, author = {Yvo Desmedt}, title = {Unconditionally private and reliable communication in an untrusted network}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {38--41}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543954}, doi = {10.1109/ITWTPI.2005.1543954}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Desmedt05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Dodis05, author = {Yevgeniy Dodis}, title = {On extractors, error-correction and hiding all partial information}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {74--79}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543961}, doi = {10.1109/ITWTPI.2005.1543961}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Dodis05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Fitzi05, author = {Matthias Fitzi}, title = {Broadcast and secure computation under reduced setup assumptions}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {42--47}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543955}, doi = {10.1109/ITWTPI.2005.1543955}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Fitzi05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Hanaoka05, author = {Goichiro Hanaoka}, title = {Unconditionally secure signatures and its related schemes}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {7--12}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543947}, doi = {10.1109/ITWTPI.2005.1543947}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Hanaoka05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KiayiasY05, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptography and decoding Reed-Solomon codes as a hard problem}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {48}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543956}, doi = {10.1109/ITWTPI.2005.1543956}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/KiayiasY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KobayashiYO05, author = {Daisuke Kobayashi and Hirosuke Yamamoto and Tomohiro Ogawa}, title = {How to attain the ordinary channel capacity securely in wiretap channels}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {13--18}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543948}, doi = {10.1109/ITWTPI.2005.1543948}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/KobayashiYO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Koga05, author = {Hiroki Koga}, title = {Coding theorems on the threshold scheme for a general source}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {67--72}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543959}, doi = {10.1109/ITWTPI.2005.1543959}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Koga05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Kurosawa05, author = {Kaoru Kurosawa}, title = {Some topics related to resilient functions}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {55--60}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543957}, doi = {10.1109/ITWTPI.2005.1543957}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Kurosawa05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Martin05, author = {Keith M. Martin}, title = {Dynamic access policies for unconditionally secure secret sharing schemes}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {61--66}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543958}, doi = {10.1109/ITWTPI.2005.1543958}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Martin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/MatsumotoS05, author = {Tsutomu Matsumoto and Junji Shikata}, title = {Authenticated encryption and steganography in unconditional security setting}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {1--6}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543946}, doi = {10.1109/ITWTPI.2005.1543946}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/MatsumotoS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Muller-Quade05, author = {J{\"{o}}rn M{\"{u}}ller{-}Quade}, title = {Temporary assumptions - quantum and classical}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {31--33}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543952}, doi = {10.1109/ITWTPI.2005.1543952}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Muller-Quade05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Okamoto05, author = {Tatsuaki Okamoto}, title = {Relationship of three cryptographic channels in the {UC} framework}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {73}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543960}, doi = {10.1109/ITWTPI.2005.1543960}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Okamoto05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Rabin05, author = {Michael O. Rabin}, title = {Provably unbreakable hyper-encryption in the limited access model}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {34--37}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543953}, doi = {10.1109/ITWTPI.2005.1543953}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Rabin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Safavi-NainiW05, author = {Reihaneh Safavi{-}Naini and Peter R. Wild}, title = {Bounds on authentication systems in query model}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {85--91}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543963}, doi = {10.1109/ITWTPI.2005.1543963}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/Safavi-NainiW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/WolfW05, author = {Stefan Wolf and J{\"{u}}rg Wullschleger}, title = {Bit commitment from weak non-locality}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {28--30}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543951}, doi = {10.1109/ITWTPI.2005.1543951}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/WolfW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2005, title = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, publisher = {{IEEE}}, year = {2005}, url = {https://ieeexplore.ieee.org/xpl/conhome/10361/proceeding}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.