Quantum Communication Attacks on Classical Cryptographic Protocols (Invited Talk) (Englisch)
- Neue Suche nach: Damgard, I.
- Neue Suche nach: Damgard, I.
- Neue Suche nach: Fehr, Serge
In:
ICITS 2011; Information Theoretic Security
6673
;
181
;
2011
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Quantum Communication Attacks on Classical Cryptographic Protocols (Invited Talk)
-
Beteiligte:Damgard, I. ( Autor:in ) / Fehr, Serge
-
Kongress:ICITS 2011; Information Theoretic Security ; 2011 ; Amsterdam, The Netherlands
-
Erschienen in:ICITS 2011; Information Theoretic Security , 6673 ; 181LECTURE NOTES IN COMPUTER SCIENCE , 6673 ; 181
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg
-
Erscheinungsdatum:01.01.2011
-
Format / Umfang:181 pages
-
Anmerkungen:Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Correlation Extractors and Their Applications (Invited Talk)Ishai, Y. et al. | 2011
- 6
-
Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and AuthenticityKawachi, A. / Portmann, C. / Tanaka, K. et al. | 2011
- 25
-
Randomly Encoding Functions: A New Cryptographic Paradigm (Invited Talk)Applebaum, B. et al. | 2011
- 32
-
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed NetworksNayak, M. / Agrawal, S. / Srinathan, K. et al. | 2011
- 52
-
Quantum-Resilient Randomness Extraction (Invited Talk)Renner, R. et al. | 2011
- 58
-
Homogeneous Faults, Colored Edge Graphs, and Cover Free FamiliesWang, Y. / Desmedt, Y. et al. | 2011
- 73
-
On Information Theoretic Security: Mathematical Models and Techniques (Invited Talk)Csiszar, I. et al. | 2011
- 76
-
Common Randomness and Secret Key Capacities of Two-Way ChannelsAhmadi, H. / Safavi-Naini, R. et al. | 2011
- 94
-
LT-Codes and Phase Transitions for Mutual Information (Invited Talk)Shokrollahi, A. et al. | 2011
- 100
-
Unconditionally Secure Signature Schemes RevisitedSwanson, C.M. / Stinson, D.R. et al. | 2011
- 117
-
Bell Inequalities: What Do We Know about Them and Why Should Cryptographers Care? (Invited Talk)de Wolf, R. et al. | 2011
- 120
-
Efficient Reductions for Non-signaling Cryptographic PrimitivesDottling, N. / Kraschewski, D. / Muller-Quade, J. et al. | 2011
- 138
-
Some Notions of Entropy for Cryptography (Invited Talk)Reyzin, L. et al. | 2011
- 143
-
The Round Complexity of Perfectly Secure General VSSChoudhury, A. / Kurosawa, K. / Patra, A. et al. | 2011
- 163
-
Graceful Degradation in Multi-Party ComputationHirt, M. / Lucas, C. / Maurer, U. / Raub, D. et al. | 2011
- 181
-
Quantum Communication Attacks on Classical Cryptographic Protocols (Invited Talk)Damgard, I. et al. | 2011
- 182
-
Using Colors to Improve Visual Cryptography for Black and White ImagesDe Prisco, R. / De Santis, A. et al. | 2011
- 202
-
Digital Fingerprinting under and (Somewhat) beyond the Marking Assumption (Invited Talk)Barg, A. / Kabatiansky, G. et al. | 2011
- 206
-
Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal ResiliencePatra, A. / Rangan, C.P. et al. | 2011