Search

Your search keyword '"unconditional security"' showing total 235 results

Search Constraints

Start Over You searched for: Descriptor "unconditional security" Remove constraint Descriptor: "unconditional security"
235 results on '"unconditional security"'

Search Results

201. Attainable Unconditional Security for Shared-Key Cryptosystems

202. On the Attacker's Knowledge in Shared-Key Cryptosystems

203. Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN) Key Exchange

204. Short fail-stop signature scheme based on factorization and discrete logarithm assumptions

205. Multi‐Party Semi‐Quantum Key Distribution Protocol With Four‐Particle Cluster States.

206. A New Quantum Blind Signature Scheme with BB84-State.

207. Commitment and Oblivious Transfer in the Bounded Storage Model with Errors

208. Model Checking Russian Cards

209. Dining Cryptographers are Practical

210. The effect of side-information on smooth entropy

211. Authentication codes from e-ASU hash functions with partially secret keys

212. How To Re-Use A One-Time Pad Safely And Almost Optimally Even If P = Np

214. On The 'Cracking' Scheme in The Paper 'A Directional Coupler Attack Against the Kish Key Distribution System' by Gunn, Allison And Abbott

215. Unconditionally Secure and Universally Composable Commitments from Physical Assumptions

216. Efficient universal blind quantum computation

217. Unconditional security by the laws of classical physics

218. Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation

220. Quantum to Classical Randomness Extractors

221. Unconditional security by the laws of classical physics

222. The Uncertainty Principle in the Presence of Quantum Memory

223. Information Theoretically Secure Encryption with Almost Free Authentication

224. Quantum Information with Optical Continuous Variables: from Bell Tests to Key Distribution/Information Quantique avec Variables Continues Optiques: des Tests de Bell à la Distribution de Clé

225. Information quantique avec variables continues optiques: des tests de Bell à la distribution de clé

226. Unconditionally Secure Oblivious Transfer Based on Channel Delays

227. Unconditionally Secure Key Assignment Schemes

228. Byzantine Agreement Given Partial Broadcast

229. Authentication in quantum key growing

230. Optimal Randomizer Efficiency in the Bounded-Storage Model

231. Performance enhancement of a decoy-state quantum key distribution using a conditionally prepared down-conversion source in the Poisson distribution

232. Improved practical decoy state method in quantum key distribution with parametric down-conversion source

233. Quantum information with optical continuous variables: from Bell tests to key distribution

234. Quantum key distribution using multilevel encoding : security analysis

235. Unconditionally Secure Cryptographic Protocols from Coding-Theoretic Primitives

Catalog

Books, media, physical & digital resources