Correlation Extractors and Their Applications (English)
(Invited Talk)
- New search for: Ishai, Yuval
- New search for: Ishai, Yuval
In:
Information Theoretic Security
;
1-5
;
2011
- Article/Chapter (Book) / Electronic Resource
-
Title:Correlation Extractors and Their Applications
-
Subtitle:(Invited Talk)
-
Contributors:Ishai, Yuval ( author )
-
Published in:Lecture Notes in Computer Science ; 6673 ; 1-5
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2011-01-01
-
Size:5 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Correlation Extractors and Their ApplicationsIshai, Yuval et al. | 2011
- 6
-
Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and AuthenticityKawachi, Akinori / Portmann, Christopher / Tanaka, Keisuke et al. | 2011
- 25
-
Randomly Encoding Functions: A New Cryptographic ParadigmApplebaum, Benny et al. | 2011
- 32
-
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed NetworksNayak, Manan / Agrawal, Shashank / Srinathan, Kannan et al. | 2011
- 52
-
Quantum-Resilient Randomness ExtractionRenner, Renato et al. | 2011
- 58
-
Homogeneous Faults, Colored Edge Graphs, and Cover Free FamiliesWang, Yongge / Desmedt, Yvo et al. | 2011
- 73
-
On Information Theoretic Security: Mathematical Models and TechniquesCsiszár, Imre et al. | 2011
- 76
-
Common Randomness and Secret Key Capacities of Two-Way ChannelsAhmadi, Hadi / Safavi-Naini, Reihaneh et al. | 2011
- 94
-
LT-Codes and Phase Transitions for Mutual InformationShokrollahi, Amin et al. | 2011
- 100
-
Unconditionally Secure Signature Schemes RevisitedSwanson, Colleen M. / Stinson, Douglas R. et al. | 2011
- 117
-
Bell Inequalities: What Do We Know about Them and Why Should Cryptographers Care?Wolf, Ronald et al. | 2011
- 120
-
Efficient Reductions for Non-signaling Cryptographic PrimitivesDöttling, Nico / Kraschewski, Daniel / Müller-Quade, Jörn et al. | 2011
- 138
-
Some Notions of Entropy for CryptographyReyzin, Leonid et al. | 2011
- 143
-
The Round Complexity of Perfectly Secure General VSSChoudhury, Ashish / Kurosawa, Kaoru / Patra, Arpita et al. | 2011
- 163
-
Graceful Degradation in Multi-Party Computation (Extended Abstract)Hirt, Martin / Lucas, Christoph / Maurer, Ueli / Raub, Dominik et al. | 2011
- 181
-
Quantum Communication Attacks on Classical Cryptographic ProtocolsDamgård, Ivan et al. | 2011
- 182
-
Using Colors to Improve Visual Cryptography for Black and White ImagesPrisco, Roberto / Santis, Alfredo et al. | 2011
- 202
-
Digital Fingerprinting under and (Somewhat) beyond the Marking AssumptionBarg, Alexander / Kabatiansky, Grigory et al. | 2011
- 206
-
Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal ResiliencePatra, Arpita / Rangan, C. Pandu et al. | 2011