Works matching Information-theoretic security
Results: 174
Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 15, p. 4221, doi. 10.3390/s20154221
- By:
- Publication type:
- Article
Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †.
- Published in:
- Entropy, 2019, v. 21, n. 8, p. 781, doi. 10.3390/e21080781
- By:
- Publication type:
- Article
Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks †.
- Published in:
- Entropy, 2019, v. 21, n. 5, p. 469, doi. 10.3390/e21050469
- By:
- Publication type:
- Article
Crypto Analysis of the Key Distribution Scheme Using Noise-Free Resistances.
- Published in:
- Fluctuation & Noise Letters, 2024, v. 23, n. 3, p. 1, doi. 10.1142/S0219477524500287
- By:
- Publication type:
- Article
Secure Polar Coding for the Primitive Relay Wiretap Channel.
- Published in:
- Entropy, 2021, v. 23, n. 4, p. 442, doi. 10.3390/e23040442
- By:
- Publication type:
- Article
New Public-key Quantum Signature Scheme with Quantum One-Way Function.
- Published in:
- International Journal of Theoretical Physics, 2019, v. 58, n. 10, p. 3282, doi. 10.1007/s10773-019-04203-7
- By:
- Publication type:
- Article
A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13638-024-02396-y
- By:
- Publication type:
- Article
Directional modulation techniques for secure wireless communication: a comprehensive survey.
- Published in:
- 2022
- By:
- Publication type:
- Literature Review
RFID Authentication Efficient Proactive Information Security within Computational Security.
- Published in:
- Theory of Computing Systems, 2011, v. 48, n. 1, p. 132, doi. 10.1007/s00224-009-9236-0
- By:
- Publication type:
- Article
Unconditionally secure signature schemes revisited.
- Published in:
- Journal of Mathematical Cryptology, 2016, v. 10, n. 1, p. 35, doi. 10.1515/jmc-2016-0002
- By:
- Publication type:
- Article
The Communication Complexity of Private Simultaneous Messages, Revisited.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 917, doi. 10.1007/s00145-019-09334-y
- By:
- Publication type:
- Article
Quantum designated verifier signature without third party.
- Published in:
- Quantum Information Processing, 2023, v. 22, n. 12, p. 1, doi. 10.1007/s11128-023-04183-y
- By:
- Publication type:
- Article
An improved efficient identity-based quantum signature scheme.
- Published in:
- Quantum Information Processing, 2023, v. 22, n. 1, p. 1, doi. 10.1007/s11128-022-03786-1
- By:
- Publication type:
- Article
Quantum public-key encryption schemes based on conjugate coding.
- Published in:
- Quantum Information Processing, 2020, v. 19, n. 11, p. 1, doi. 10.1007/s11128-020-02912-1
- By:
- Publication type:
- Article
GROUP SECRET KEY GENERATION FOR 5G Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2019, v. 13, n. 8, p. 4041, doi. 10.3837/tiis.2019.08.012
- By:
- Publication type:
- Article
Straggler- and Adversary-Tolerant Secure Distributed Matrix Multiplication Using Polynomial Codes.
- Published in:
- Entropy, 2023, v. 25, n. 2, p. 266, doi. 10.3390/e25020266
- By:
- Publication type:
- Article
Private Key and Decoder Side Information for Secure and Private Source Coding †.
- Published in:
- Entropy, 2022, v. 24, n. 12, p. 1716, doi. 10.3390/e24121716
- By:
- Publication type:
- Article
Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography.
- Published in:
- Entropy, 2021, v. 23, n. 1, p. 54, doi. 10.3390/e23010054
- By:
- Publication type:
- Article
Polar Coding for Confidential Broadcasting.
- Published in:
- Entropy, 2020, v. 22, n. 2, p. 149, doi. 10.3390/e22020149
- By:
- Publication type:
- Article
The Secret Key Capacity of a Class of Noisy Channels with Correlated Sources.
- Published in:
- Entropy, 2019, v. 21, n. 8, p. 732, doi. 10.3390/e21080732
- By:
- Publication type:
- Article
Identity Authentication over Noisy Channels.
- Published in:
- Entropy, 2015, v. 17, n. 7, p. 4940, doi. 10.3390/e17074940
- By:
- Publication type:
- Article
Comparing Security Notions of Secret Sharing Schemes.
- Published in:
- Entropy, 2015, v. 17, n. 3, p. 1135, doi. 10.3390/e17031135
- By:
- Publication type:
- Article
Statistical Testing of Random Number Generators and Their Improvement Using Randomness Extraction.
- Published in:
- Entropy, 2024, v. 26, n. 12, p. 1053, doi. 10.3390/e26121053
- By:
- Publication type:
- Article
Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN) Key Exchange.
- Published in:
- Metrology & Measurement Systems, 2016, v. 23, n. 1, p. 3, doi. 10.1515/mms-2016-0007
- By:
- Publication type:
- Article
Secure transmission of correlated sources over broadcast channels with ultra-low latency.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2019, v. 2019, n. 1, p. N.PAG, doi. 10.1186/s13638-019-1527-9
- By:
- Publication type:
- Article
An Optimal Secure Key Distribution Scheme for Internet of Things Devices in Multi-Session Network Communications †.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 24, p. 4951, doi. 10.3390/electronics13244951
- By:
- Publication type:
- Article
Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 2, p. 141, doi. 10.1007/s10207-020-00487-7
- By:
- Publication type:
- Article
Three‐level quantum satellite communication framework and its applications.
- Published in:
- International Journal of Satellite Communications & Networking, 2021, v. 39, n. 5, p. 473, doi. 10.1002/sat.1392
- By:
- Publication type:
- Article
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach.
- Published in:
- Entropy, 2019, v. 21, n. 8, p. 755, doi. 10.3390/e21080755
- By:
- Publication type:
- Article
Experimental cheat-sensitive quantum weak coin flipping.
- Published in:
- Nature Communications, 2023, v. 14, n. 1, p. 1, doi. 10.1038/s41467-023-37566-x
- By:
- Publication type:
- Article
Experimental cheat-sensitive quantum weak coin flipping.
- Published in:
- Nature Communications, 2023, v. 14, n. 1, p. 1, doi. 10.1038/s41467-023-37566-x
- By:
- Publication type:
- Article
A One-Round Quantum Mutual Authenticated Key Agreement Protocol with Semi-Honest Server Using Three-Particle Entangled States.
- Published in:
- International Journal of Theoretical Physics, 2021, v. 60, n. 3, p. 929, doi. 10.1007/s10773-021-04716-0
- By:
- Publication type:
- Article
An Authenticated Quantum Dialog Protocol with Three-Particle Entangled States Using Subset of Intersection Method.
- Published in:
- International Journal of Theoretical Physics, 2020, v. 59, n. 9, p. 2795, doi. 10.1007/s10773-020-04539-5
- By:
- Publication type:
- Article
A Distributed and Parallel (k , n) QSS Scheme with Verification Capability.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 23, p. 3782, doi. 10.3390/math12233782
- By:
- Publication type:
- Article
Code design and interception probability of optical fibre communication system based on optical coding.
- Published in:
- IET Communications (Wiley-Blackwell), 2022, v. 16, n. 14, p. 1731, doi. 10.1049/cmu2.12440
- By:
- Publication type:
- Article
Polarization bases compensation towards advantages in satellite-based QKD without active feedback.
- Published in:
- Communications Physics, 2023, v. 6, n. 1, p. 1, doi. 10.1038/s42005-023-01235-8
- By:
- Publication type:
- Article
Towards efficient private distributed computation on unbounded input streams.
- Published in:
- Journal of Mathematical Cryptology, 2015, v. 9, n. 2, p. 79, doi. 10.1515/jmc-2013-0039
- By:
- Publication type:
- Article
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 1, p. 49, doi. 10.1007/s00145-013-9172-7
- By:
- Publication type:
- Article
A study of polarization compensation for quantum networks.
- Published in:
- EPJ Quantum Technology, 2023, v. 10, n. 1, p. 1, doi. 10.1140/epjqt/s40507-023-00187-w
- By:
- Publication type:
- Article
Advances in device-independent quantum key distribution.
- Published in:
- NPJ Quantum Information, 2023, v. 9, n. 1, p. 1, doi. 10.1038/s41534-023-00684-x
- By:
- Publication type:
- Article
Modulation leakage-free continuous-variable quantum key distribution.
- Published in:
- NPJ Quantum Information, 2022, v. 8, n. 1, p. 1, doi. 10.1038/s41534-022-00640-1
- By:
- Publication type:
- Article
Experimental measurement-device-independent quantum digital signatures.
- Published in:
- Nature Communications, 2017, v. 8, n. 1, p. 1, doi. 10.1038/s41467-017-01245-5
- By:
- Publication type:
- Article
Experimental demonstration of long-distance continuous-variable quantum key distribution.
- Published in:
- Nature Photonics, 2013, v. 7, n. 5, p. 378, doi. 10.1038/nphoton.2013.63
- By:
- Publication type:
- Article
Finite key analysis for discrete phase randomized BB84 protocol.
- Published in:
- Quantum Information Processing, 2024, v. 23, n. 9, p. 1, doi. 10.1007/s11128-024-04520-9
- By:
- Publication type:
- Article
Entropically secure encryption with faster key expansion.
- Published in:
- Quantum Information Processing, 2024, v. 23, n. 4, p. 1, doi. 10.1007/s11128-024-04330-z
- By:
- Publication type:
- Article
Experimental quantum digital signature based on heralded single-photon sources.
- Published in:
- Quantum Information Processing, 2024, v. 23, n. 1, p. 1, doi. 10.1007/s11128-023-04235-3
- By:
- Publication type:
- Article
Leveraging the hardness of dihedral coset problem for quantum cryptography.
- Published in:
- Quantum Information Processing, 2022, v. 21, n. 9, p. 1, doi. 10.1007/s11128-022-03592-9
- By:
- Publication type:
- Article
Estimating security of the quantum key distribution from the guesswork.
- Published in:
- Quantum Information Processing, 2022, v. 21, n. 4, p. 1, doi. 10.1007/s11128-022-03487-9
- By:
- Publication type:
- Article
Analysis of a High-Dimensional Extended B92 Protocol.
- Published in:
- Quantum Information Processing, 2021, v. 20, n. 10, p. 1, doi. 10.1007/s11128-021-03276-w
- By:
- Publication type:
- Article
ADA-QKDN: a new quantum key distribution network routing scheme based on application demand adaptation.
- Published in:
- Quantum Information Processing, 2021, v. 20, n. 9, p. 1, doi. 10.1007/s11128-021-03246-2
- By:
- Publication type:
- Article