How to Reduce your Enemy’s Information (extended abstract)
- 1 December 2000
- book chapter
- Published by Springer Nature
- p. 468-476
- https://doi.org/10.1007/3-540-39799-x_37
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- How To Construct Randolli FunctionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- An Update on Quantum CryptographyPublished by Springer Nature ,2000
- The bit extraction problem or t-resilient functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- New hash functions and their use in authentication and set equalityJournal of Computer and System Sciences, 1981
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- The Wire-Tap ChannelBell System Technical Journal, 1975