Information-Theoretic Cryptography
- 16 December 1999
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 35 references indexed in Scilit:
- Elements of Information TheoryPublished by Wiley ,2001
- On the foundations of oblivious transferPublished by Springer Nature ,1998
- Generalized privacy amplificationIEEE Transactions on Information Theory, 1995
- Experimental quantum cryptographyJournal of Cryptology, 1992
- Privacy Amplification by Public DiscussionSIAM Journal on Computing, 1988
- Multiparty unconditionally secure protocolsPublished by Association for Computing Machinery (ACM) ,1988
- Equivalence Between Two Flavours of Oblivious TransfersPublished by Springer Nature ,1988
- Completeness theorems for non-cryptographic fault-tolerant distributed computationPublished by Association for Computing Machinery (ACM) ,1988
- Achieving oblivious transfer using weakened security assumptionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1988
- Broadcast channels with confidential messagesIEEE Transactions on Information Theory, 1978