List Error-Correction with Optimal Information Rate (Invited Talk) (Englisch)
- Neue Suche nach: Guruswami, V.
- Neue Suche nach: Guruswami, V.
- Neue Suche nach: Safavi-Naini, Reihanah
In:
Information theoretic security, ICITS 2008
5155
;
118-119
;
2008
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:List Error-Correction with Optimal Information Rate (Invited Talk)
-
Beteiligte:Guruswami, V. ( Autor:in ) / Safavi-Naini, Reihanah
-
Kongress:Conference; 3rd, Information theoretic security, ICITS 2008 ; 2008 ; Calgary, Canada
-
Erschienen in:Information theoretic security, ICITS 2008 , 5155 ; 118-119LECTURE NOTES IN COMPUTER SCIENCE , 5155 ; 118-119
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Berlin
-
Erscheinungsdatum:01.01.2008
-
Format / Umfang:2 pages
-
Anmerkungen:Includes bibliographical references and author index. Also issued online.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Partially Connected Networks: Information Theoretically Secure Protocols and Open Problems (Invited Talk)Garay, J.A. et al. | 2008
- 2
-
Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message DecryptionAraki, T. et al. | 2008
- 14
-
Interactive Hashing: An Information Theoretic Tool (Invited Talk)Crepeau, C. / Kilian, J. / Savvides, G. et al. | 2008
- 29
-
Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised NetworkBeals, T.R. / Sanders, B.C. et al. | 2008
- 40
-
Strong Secrecy for Wireless Channels (Invited Talk)Barros, J. / Bloch, M. et al. | 2008
- 54
-
Efficient Key Predistribution for Grid-Based Wireless Sensor NetworksBlackburn, S.R. / Etzion, T. / Martin, K.M. / Paterson, M.B. et al. | 2008
- 70
-
Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)Standaert, F.-X. / Malkin, T.G. / Yung, M. et al. | 2008
- 71
-
A Single Initialization Server for Multi-party CryptographyBlier, H. / Tapp, A. et al. | 2008
- 86
-
Statistical Security Conditions for Two-Party Secure Function EvaluationCrepeau, C. / Wullschleger, J. et al. | 2008
- 100
-
Upper Bounds for Set Systems with the Identifiable Parent PropertyCollins, M.J. et al. | 2008
- 107
-
Oblivious Transfer Based on the McEliece AssumptionsDowsley, R. / van de Graaf, J. / Muller-Quade, J. / Nascimento, A.C.A. et al. | 2008
- 118
-
List Error-Correction with Optimal Information Rate (Invited Talk)Guruswami, V. et al. | 2008
- 120
-
Theory of Quantum Key Distribution: The Road Ahead (Invited Talk)Lutkenhaus, N. et al. | 2008
- 121
-
Susceptible Two-Party Quantum ComputationsJakoby, A. / Liskiewicz, M. / Madry, A. et al. | 2008
- 137
-
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed AdversaryChoudhary, A. / Patra, A. / Ashwinkumar, B.V. / Srinathan, K. / Rangan, C.P. et al. | 2008
- 156
-
Key Refreshing in Wireless Sensor NetworksBlackburn, S.R. / Martin, K.M. / Paterson, M.B. / Stinson, D.R. et al. | 2008
- 171
-
Efficient Traitor Tracing from Collusion Secure CodesBillet, O. / Phan, D.H. et al. | 2008
- 183
-
Revisiting the Karnin, Greene and Hellman BoundsDesmedt, Y. / King, B. / Schoenmakers, B. et al. | 2008
- 199
-
Simple Direct Reduction of String (1,2)-OT to Rabin's OT without Privacy AmplificationKurosawa, K. / Koshiba, T. et al. | 2008
- 210
-
The Complexity of Distinguishing Distributions (Invited Talk)Baigneres, T. / Vaudenay, S. et al. | 2008
- 223
-
Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)Hanaoka, G. et al. | 2008
- 232
-
A Proof of Security in O(2^n) for the Xor of Two Random PermutationsPatarin, J. et al. | 2008