default search action
4th ICITS 2009: Shizuoka, Japan
- Kaoru Kurosawa:
Information Theoretic Security, 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers. Lecture Notes in Computer Science 5973, Springer 2010, ISBN 978-3-642-14495-0
Leakage Resilient Cryptography
- Joël Alwen, Yevgeniy Dodis, Daniel Wichs:
Survey: Leakage Resilience and the Bounded Retrieval Model. 1-18 - Stefan Dziembowski:
A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes. 19-26
Quantum Cryptography and Indistinguishability
- Masato Koashi:
Security of Key Distribution and Complementarity in Quantum Mechanics. 27 - Peter Gazi, Ueli Maurer:
Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification. 28-44
Connection to Computational Security
- Kazukuni Kobara:
Code-Based Public-Key Cryptosystems and Their Applications. 45-55 - Koji Nuida, Goichiro Hanaoka:
On the Security of Pseudorandomized Information-Theoretically Secure Schemes. 56-73
Secret Sharing
- Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience. 74-92 - Oriol Farràs, Jessica Ruth Metcalf-Burton, Carles Padró, Leonor Vázquez:
On the Optimization of Bipartite Secret Sharing Schemes. 93-109 - Oriol Farràs, Ignacio Gracia, Sebastià Martín Molleví, Carles Padró:
Linear Threshold Multisecret Sharing Schemes. 110-126
Key Agreement from Common Randomness
- Prakash Narayan:
Multiterminal Secrecy Generation and Tree Packing. 127 - Jun Muramatsu, Kazuyuki Yoshimura, Peter Davis:
Information Theoretic Security Based on Bounded Observability. 128-139
Random Graph and Group Testing
- Gregory M. Zaverucha, Douglas R. Stinson:
Group Testing and Batch Verification. 140-157
Reliable Data Transmision and Computation
- Adam D. Smith:
What Can Cryptography Do for Coding Theory? 158 - Qiushi Yang, Yvo Desmedt:
Cryptanalysis of Secure Message Transmission Protocols with Feedback. 159-176 - Han Chen, Pasquale Malacaria:
The Optimum Leakage Principle for Analyzing Multi-threaded Programs. 177-193
Fingerprint and Watermarking
- Koji Nuida:
A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure. 194-212 - Koji Nuida, Goichiro Hanaoka:
An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint Codes. 213-230 - Kazuhiro Senda, Masaki Kawamura:
Statistical-Mechanical Approach for Multiple Watermarks Using Spectrum Spreading. 231-247
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.