Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
Special pages
In other projects
MaRDI portal item
Discussion
View source
View history
Purge
English
Log in

Information-theoretic security with asymmetries

From MaRDI portal
Publication:6652930
Jump to:navigation, search

DOI10.1007/978-3-031-68385-5_15MaRDI QIDQ6652930

Yu Long Chen, Tim Beyne

Publication date: 13 December 2024





zbMATH Keywords

information-theoretic securitymulti-user securitypower boundsasymmetrical statistical costs


Mathematics Subject Classification ID

Information theory (general) (94A15)


Cites Work

  • Unnamed Item
  • Unnamed Item
  • Unnamed Item
  • Unnamed Item
  • Unnamed Item
  • Unnamed Item
  • Information-theoretic indistinguishability via the chi-squared method
  • The memory-tightness of authenticated encryption
  • Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security
  • Multi-key Security: The Even-Mansour Construction Revisited
  • A Provable-Security Treatment of the Key-Wrap Problem
  • The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
  • The “Coefficients H” Technique
  • IX. On the problem of the most efficient tests of statistical hypotheses
  • Proof of Mirror Theory for ξ max = 2
  • Tight Security Bounds for Key-Alternating Ciphers
  • The Multi-user Security of Double Encryption
  • The query-complexity of preprocessing attacks
  • Improved multi-user security using the squared-ratio method







This page was built for publication: Information-theoretic security with asymmetries

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:6652930&oldid=40226986"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 13 February 2025, at 21:00.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki