32 results
6 - Information Reconciliation
- from Part I - External Adversary: Encryption, Authentication, Secret Key
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 104-117
-
- Chapter
- Export citation
4 - Universal Hash Families
- from Part I - External Adversary: Encryption, Authentication, Secret Key
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 66-86
-
- Chapter
- Export citation
11 - Secret Sharing
- from Part II - Internal Adversary: Secure Computation
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 209-226
-
- Chapter
- Export citation
9 - Computationally Secure Encryption and Authentication
- from Part I - External Adversary: Encryption, Authentication, Secret Key
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 158-176
-
- Chapter
- Export citation
Dedication
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp v-vi
-
- Chapter
- Export citation
7 - Random Number Generation
- from Part I - External Adversary: Encryption, Authentication, Secret Key
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 118-138
-
- Chapter
- Export citation
1 - Introduction
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 1-12
-
- Chapter
- Export citation
19 - Multiparty Secure Computation
- from Part II - Internal Adversary: Secure Computation
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 432-461
-
- Chapter
- Export citation
2 - Basic Information Theory
- from Part I - External Adversary: Encryption, Authentication, Secret Key
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 15-46
-
- Chapter
- Export citation
17 - Two-party Secure Computation for an Active Adversary
- from Part II - Internal Adversary: Secure Computation
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 374-398
-
- Chapter
- Export citation
18 - Broadcast, Byzantine Agreement, and Digital Signature
- from Part II - Internal Adversary: Secure Computation
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 399-431
-
- Chapter
- Export citation
16 - Zero-knowledge Proof
- from Part II - Internal Adversary: Secure Computation
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 362-373
-
- Chapter
- Export citation
13 - Oblivious Transfer from Correlated Randomness
- from Part II - Internal Adversary: Secure Computation
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 262-289
-
- Chapter
- Export citation
Contents
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp vii-xii
-
- Chapter
- Export citation
References
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 473-494
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp i-iv
-
- Chapter
- Export citation
Index
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 496-504
-
- Chapter
- Export citation
3 - Secret Keys and Encryption
- from Part I - External Adversary: Encryption, Authentication, Secret Key
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 47-65
-
- Chapter
- Export citation
Part II - Internal Adversary: Secure Computation
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 207-208
-
- Chapter
- Export citation
Symbol Index
-
- Book:
- Information-theoretic Cryptography
- Published online:
- 23 March 2023
- Print publication:
- 13 April 2023, pp 495-495
-
- Chapter
- Export citation