Information-theoretic security

Results: 33



#Item
21A Coding-Theoretic Approach to Recovering Noisy RSA Keys Kenneth G. Paterson, Antigoni Polychroniadou, and Dale L. Sibborn Information Security Group, Royal Holloway, University of London  Abstract. Inspired by cold boot

A Coding-Theoretic Approach to Recovering Noisy RSA Keys Kenneth G. Paterson, Antigoni Polychroniadou, and Dale L. Sibborn Information Security Group, Royal Holloway, University of London Abstract. Inspired by cold boot

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-06 12:25:19
22Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron∗ RAND Corporation [removed]

Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron∗ RAND Corporation [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 19:43:29
23ZISC annual report[removed]

ZISC annual report[removed]

Add to Reading List

Source URL: www.zisc.ethz.ch

Language: English - Date: 2015-02-14 14:43:29
24Efficient Multiparty Protocols via Log-Depth Threshold Formulae Gil Cohen∗ Ivan Bjerre Damg˚ ard† Yuval Ishai‡

Efficient Multiparty Protocols via Log-Depth Threshold Formulae Gil Cohen∗ Ivan Bjerre Damg˚ ard† Yuval Ishai‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-08-07 04:07:04
25The Crypto-democracy and the Trustworthy S´ebastien Gambs1 , Samuel Ranellucci2 , and Alain Tapp3 1 Universit´e de Rennes 1 - INRIA / IRISA, France Department of Computer Science, Aarhus University, Denmark

The Crypto-democracy and the Trustworthy S´ebastien Gambs1 , Samuel Ranellucci2 , and Alain Tapp3 1 Universit´e de Rennes 1 - INRIA / IRISA, France Department of Computer Science, Aarhus University, Denmark

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-09-09 06:11:33
26Secure or Insure? A Game-Theoretic Analysis of Information Security Games Jens Grossklags Nicolas Christin

Secure or Insure? A Game-Theoretic Analysis of Information Security Games Jens Grossklags Nicolas Christin

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-10-08 16:37:13
27Wireless Communication Information Theoretic Security From Channel Reciprocity Gossip Algorithms for Wireless Sensor Networks Alex Dimakis, Anand Sarwate, and Martin Wainwright  Distributed Averaging

Wireless Communication Information Theoretic Security From Channel Reciprocity Gossip Algorithms for Wireless Sensor Networks Alex Dimakis, Anand Sarwate, and Martin Wainwright Distributed Averaging

Add to Reading List

Source URL: wifo.eecs.berkeley.edu

Language: English - Date: 2008-03-21 18:56:00
28GS QKD[removed]V1[removed]Quantum Key Distribution (QKD); Security Proofs

GS QKD[removed]V1[removed]Quantum Key Distribution (QKD); Security Proofs

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2010-12-09 09:45:52
29ETSI GS QKD 002 V1[removed]Group Specification Quantum Key Distribution; Use Cases

ETSI GS QKD 002 V1[removed]Group Specification Quantum Key Distribution; Use Cases

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2010-06-04 11:14:44
30

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2005-05-11 20:53:55