共 50 条
- [1] Information-Theoretically Secure Entity Authentication in the Multi-user Setting [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 400 - 417
- [2] Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 148 - 165
- [4] Information-Theoretically Secure Key Generation and Management [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 1529 - 1533
- [6] On Optimal Information-Theoretically Secure Key Management [J]. 2019 16TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2019,
- [7] On the Security of Pseudorandomized Information-Theoretically Secure Schemes [J]. INFORMATION THEORETIC SECURITY, 2010, 5973 : 56 - 73
- [8] Parallel reducibility for information-theoretically secure computation [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 74 - 92
- [10] Amortized Complexity of Information-Theoretically Secure MPC Revisited [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III, 2018, 10993 : 395 - 426