default search action
5th ICITS 2011: Amsterdam, The Netherlands
- Serge Fehr:
Information Theoretic Security - 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings. Lecture Notes in Computer Science 6673, Springer 2011, ISBN 978-3-642-20727-3 - Yuval Ishai:
Correlation Extractors and Their Applications - (Invited Talk). 1-5 - Akinori Kawachi, Christopher Portmann, Keisuke Tanaka:
Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and Authenticity. 6-24 - Benny Applebaum:
Randomly Encoding Functions: A New Cryptographic Paradigm - (Invited Talk). 25-31 - Manan Nayak, Shashank Agrawal, Kannan Srinathan:
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks. 32-51 - Renato Renner:
Quantum-Resilient Randomness Extraction - (Invited Talk). 52-57 - Yongge Wang, Yvo Desmedt:
Homogeneous Faults, Colored Edge Graphs, and Cover Free Families. 58-72 - Imre Csiszár:
On Information Theoretic Security: Mathematical Models and Techniques - (Invited Talk). 73-75 - Hadi Ahmadi, Reihaneh Safavi-Naini:
Common Randomness and Secret Key Capacities of Two-Way Channels. 76-93 - Amin Shokrollahi:
LT-Codes and Phase Transitions for Mutual Information - (Invited Talk). 94-99 - Colleen Swanson, Douglas R. Stinson:
Unconditionally Secure Signature Schemes Revisited. 100-116 - Ronald de Wolf:
Bell Inequalities: What Do We Know about Them and Why Should Cryptographers Care? - (Invited Talk). 117-119 - Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade:
Efficient Reductions for Non-signaling Cryptographic Primitives. 120-137 - Leonid Reyzin:
Some Notions of Entropy for Cryptography - (Invited Talk). 138-142 - Ashish Choudhury, Kaoru Kurosawa, Arpita Patra:
The Round Complexity of Perfectly Secure General VSS. 143-162 - Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub:
Graceful Degradation in Multi-Party Computation (Extended Abstract). 163-180 - Ivan Damgård:
Quantum Communication Attacks on Classical Cryptographic Protocols - (Invited Talk). 181 - Roberto De Prisco, Alfredo De Santis:
Using Colors to Improve Visual Cryptography for Black and White Images. 182-201 - Alexander Barg, Grigory Kabatiansky:
Digital Fingerprinting under and (Somewhat) beyond the Marking Assumption - (Invited Talk). 202-205 - Arpita Patra, C. Pandu Rangan:
Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience. 206-226
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.