default search action
8th ICITS 2015: Lugano, Switzerland
- Anja Lehmann, Stefan Wolf:
Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings. Lecture Notes in Computer Science 9063, Springer 2015, ISBN 978-3-319-17469-3 - Damian Markham, Anne Marin:
Practical Sharing of Quantum Secrets over Untrusted Channels. 1-14 - Bernardo Machado David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp:
Generalizing Efficient Multiparty Computation. 15-32 - Ravi Kishore, Ashutosh Kumar, Chiranjeevi Vanarasa, Kannan Srinathan:
Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity. 33-50 - Ning Ding:
On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits. 51-68 - Benjamin Fuller, Ariel Hamlin:
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy. 69-86 - Ivan Damgård, Frédéric Dupuis, Jesper Buus Nielsen:
On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation. 87-104 - Maciej Skorski:
Metric Pseudoentropy: Characterizations, Transformations and Applications. 105-122 - Maciej Skorski:
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy. 123-140 - Mohammad Hajiabadi, Bruce M. Kapron:
Gambling, Computational Information and Encryption Security. 141-158 - Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Query-Complexity Amplification for Random Oracles. 159-180 - Ivan Damgård, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi:
The Chaining Lemma and Its Application. 181-196 - Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges:
Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens. 197-213 - Pengwei Wang, Reihaneh Safavi-Naini:
Limited View Adversary Codes: Bounds, Constructions and Applications. 214-235 - Rafail Ostrovsky, Anat Paskin-Cherniavsky:
Locally Decodable Codes for Edit Distance. 236-249 - Steven D. Galbraith, Barak Shani:
The Multivariate Hidden Number Problem. 250-268 - Michael Walter:
Lattice Point Enumeration on Block Reduced Bases. 269-282 - Ricardo Dahab, Steven D. Galbraith, Eduardo Morais:
Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes. 283-296
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.