共 50 条
- [1] On the Security of Pseudorandomized Information-Theoretically Secure Schemes [J]. INFORMATION THEORETIC SECURITY, 2010, 5973 : 56 - 73
- [3] Efficient information-theoretically secure schemes for cloud data outsourcing [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3591 - 3606
- [4] Efficient information-theoretically secure schemes for cloud data outsourcing [J]. Cluster Computing, 2021, 24 : 3591 - 3606
- [5] Information-theoretically secure keyless authentication [J]. 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 20 - 20
- [6] Information-Theoretically Secure Key Generation and Management [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 1529 - 1533
- [7] On Optimal Information-Theoretically Secure Key Management [J]. 2019 16TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2019,
- [8] Parallel reducibility for information-theoretically secure computation [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 74 - 92
- [9] Security research on an information-theoretically secure secret key agreement using LDPC matrices [J]. PROCEEDINGS OF THE THIRD CHINAGRID ANNUAL CONFERENCE, 2008, : 197 - 201