Linked e-resources

Details

How to Construct Strongly Secure Network Coding Scheme
Secure two-party computation: a visual way
Measure-independent Characterization of Contrast Optimal Visual Cryptography Schemes
On (k; n) visual cryptography scheme with t essential parties
New Lower Bounds for Privacy in Communication Protocols
On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis
Information Theoretic Security for Encryption Based on Conditional Renyi Entropies
Insider-proof encryption with applications for quantum key distribution
Superposition Attacks on Cryptographic Protocols
Overcoming Weak Expectations via the Renyi Entropy and the Expanded Computational Entropy
Modulus Computational Entropy
Broadcast (and Round) Efficient Verifiable Secret Sharing
Leakage Resilience of the Blom's Key Distribution Scheme
Detection of Algebraic Manipulation in the Presence of Leakage.

Browse Subjects

Show more subjects...

Statistics

from
to
Export