Guessing Secrecy (English)
- New search for: Alimomeni, Mohsen
- New search for: Safavi-Naini, Reihaneh
- New search for: Alimomeni, Mohsen
- New search for: Safavi-Naini, Reihaneh
In:
ICITS, International Conference on Information Theoretic Security, 6
;
1-13
;
2012
-
ISSN:
- Conference paper / Print
-
Title:Guessing Secrecy
-
Contributors:Alimomeni, Mohsen ( author ) / Safavi-Naini, Reihaneh ( author )
-
Published in:Lecture Notes in Computer Science ; 7412 ; 1-13
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2012
-
Size:13 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Guessing SecrecyAlimomeni, M. / Safavi-Naini, R. et al. | 2012
- 14
-
Trading Robustness for Correctness and Privacy in Certain Multiparty Computations, beyond an Honest MajorityBroadbent, A. / Jeffery, S. / Ranellucci, S. / Tapp, A. et al. | 2012
- 37
-
Two Protocols for Delegation of ComputationCanetti, R. / Riva, B. / Rothblum, G.N. et al. | 2012
- 62
-
On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative RelationsCramer, R. / Damgard, I. / Pastro, V. et al. | 2012
- 80
-
Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece AssumptionsDavid, B.M. / Nascimento, A.C.A. / Muller-Quade, J. et al. | 2012
- 100
-
Shannon Impossibility, RevisitedDodis, Y. et al. | 2012
- 111
-
Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function EvaluationDottling, N. / Kraschewski, D. / Muller-Quade, J. et al. | 2012
- 129
-
Passive Corruption in Statistical Multi-Party Computation (Extended Abstract)Hirt, M. / Lucas, C. / Maurer, U. / Raub, D. et al. | 2012
- 147
-
Efficient Threshold Zero-Knowledge with Applications to User-Centric ProtocolsKeller, M. / Mikkelsen, G.L. / Rupp, A. et al. | 2012
- 167
-
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication CodesWatanabe, Y. / Seito, T. / Shikata, J. et al. | 2012
- 187
-
Optimum General Threshold Secret SharingYoshida, M. / Fujiwara, T. / Fossorier, M. et al. | 2012