default search action
6th ICITS 2012: Montreal, QC, Canada
- Adam D. Smith:
Information Theoretic Security - 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings. Lecture Notes in Computer Science 7412, Springer 2012, ISBN 978-3-642-32283-9 - Mohsen Alimomeni, Reihaneh Safavi-Naini:
Guessing Secrecy. 1-13 - Anne Broadbent, Stacey Jeffery, Samuel Ranellucci, Alain Tapp:
Trading Robustness for Correctness and Privacy in Certain Multiparty Computations, beyond an Honest Majority. 14-36 - Ran Canetti, Ben Riva, Guy N. Rothblum:
Two Protocols for Delegation of Computation. 37-61 - Ronald Cramer, Ivan Damgård, Valerio Pastro:
On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations. 62-79 - Bernardo Machado David, Anderson C. A. Nascimento, Jörn Müller-Quade:
Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions. 80-99 - Yevgeniy Dodis:
Shannon Impossibility, Revisited. 100-110 - Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade:
Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation. 111-128 - Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub:
Passive Corruption in Statistical Multi-Party Computation - (Extended Abstract). 129-146 - Marcel Keller, Gert Læssøe Mikkelsen, Andy Rupp:
Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols. 147-166 - Yohei Watanabe, Takenobu Seito, Junji Shikata:
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes. 167-186 - Maki Yoshida, Toru Fujiwara, Marc P. C. Fossorier:
Optimum General Threshold Secret Sharing. 187-204
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.