Works matching DE "INFORMATION-theoretic security"
Results: 112
Advances in device-independent quantum key distribution.
- Published in:
- NPJ Quantum Information, 2023, v. 9, n. 1, p. 1, doi. 10.1038/s41534-023-00684-x
- By:
- Publication type:
- Article
Modulation leakage-free continuous-variable quantum key distribution.
- Published in:
- NPJ Quantum Information, 2022, v. 8, n. 1, p. 1, doi. 10.1038/s41534-022-00640-1
- By:
- Publication type:
- Article
Recent progress on BFT in the era of blockchains.
- Published in:
- National Science Review, 2022, v. 9, n. 10, p. 1, doi. 10.1093/nsr/nwac132
- By:
- Publication type:
- Article
Demonstration of quantum-digital payments.
- Published in:
- Nature Communications, 2023, v. 14, n. 1, p. 1, doi. 10.1038/s41467-023-39519-w
- By:
- Publication type:
- Article
Experimental cheat-sensitive quantum weak coin flipping.
- Published in:
- Nature Communications, 2023, v. 14, n. 1, p. 1, doi. 10.1038/s41467-023-37566-x
- By:
- Publication type:
- Article
Experimental cheat-sensitive quantum weak coin flipping.
- Published in:
- Nature Communications, 2023, v. 14, n. 1, p. 1, doi. 10.1038/s41467-023-37566-x
- By:
- Publication type:
- Article
RFID Authentication Efficient Proactive Information Security within Computational Security.
- Published in:
- Theory of Computing Systems, 2011, v. 48, n. 1, p. 132, doi. 10.1007/s00224-009-9236-0
- By:
- Publication type:
- Article
Information theoretic methods in small domain estimation.
- Published in:
- Econometric Reviews, 2018, v. 37, n. 4, p. 347, doi. 10.1080/07474938.2015.1092834
- By:
- Publication type:
- Article
Safety, Closure, and the Flow of Information.
- Published in:
- Erkenntnis, 2016, v. 81, n. 5, p. 1109, doi. 10.1007/s10670-015-9787-1
- By:
- Publication type:
- Article
Secure transmission of correlated sources over broadcast channels with ultra-low latency.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2019, v. 2019, n. 1, p. N.PAG, doi. 10.1186/s13638-019-1527-9
- By:
- Publication type:
- Article
A Grey Qualitative Based Approach for Environmental Information Analysis.
- Published in:
- Journal of Grey System, 2017, v. 29, n. 2, p. 1
- By:
- Publication type:
- Article
Multi-Dimensional Routing, Wavelength, and Timeslot Allocation (RWTA) in Quantum Key Distribution Optical Networks (QKD-ON).
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 1, p. 348, doi. 10.3390/app11010348
- By:
- Publication type:
- Article
Special Issue on "Side Channel Attacks".
- Published in:
- 2019
- By:
- Publication type:
- Editorial
Preface: Special Issue Cryptography and Provable Security.
- Published in:
- International Journal of Foundations of Computer Science, 2019, v. 30, n. 4, p. 489, doi. 10.1142/S0129054119020027
- By:
- Publication type:
- Article
Yao's Millionaires' Problem and Public-Key Encryption Without Computational Assumptions.
- Published in:
- International Journal of Foundations of Computer Science, 2017, v. 28, n. 4, p. 379, doi. 10.1142/S012905411750023X
- By:
- Publication type:
- Article
GROUP SECRET KEY GENERATION FOR 5G Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2019, v. 13, n. 8, p. 4041, doi. 10.3837/tiis.2019.08.012
- By:
- Publication type:
- Article
Quantum public-key encryption schemes based on conjugate coding.
- Published in:
- Quantum Information Processing, 2020, v. 19, n. 11, p. 1, doi. 10.1007/s11128-020-02912-1
- By:
- Publication type:
- Article
Improving the performance of decoy-state quantum digital signature with single-photon-added coherent sources.
- Published in:
- Quantum Information Processing, 2020, v. 19, n. 7, p. 1, doi. 10.1007/s11128-020-02695-5
- By:
- Publication type:
- Article
Cryptanalysis of multiparty quantum digital signatures.
- Published in:
- Quantum Information Processing, 2019, v. 18, n. 8, p. N.PAG, doi. 10.1007/s11128-019-2365-8
- By:
- Publication type:
- Article
Code design and interception probability of optical fibre communication system based on optical coding.
- Published in:
- IET Communications (Wiley-Blackwell), 2022, v. 16, n. 14, p. 1731, doi. 10.1049/cmu2.12440
- By:
- Publication type:
- Article
A Distributed and Parallel (k , n) QSS Scheme with Verification Capability.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 23, p. 3782, doi. 10.3390/math12233782
- By:
- Publication type:
- Article
A study of polarization compensation for quantum networks.
- Published in:
- EPJ Quantum Technology, 2023, v. 10, n. 1, p. 1, doi. 10.1140/epjqt/s40507-023-00187-w
- By:
- Publication type:
- Article
Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 2, p. 141, doi. 10.1007/s10207-020-00487-7
- By:
- Publication type:
- Article
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model.
- Published in:
- International Journal of Information Security, 2015, v. 14, n. 1, p. 73, doi. 10.1007/s10207-014-0247-8
- By:
- Publication type:
- Article
Experimental measurement-device-independent quantum digital signatures.
- Published in:
- Nature Communications, 2017, v. 8, n. 1, p. 1, doi. 10.1038/s41467-017-01245-5
- By:
- Publication type:
- Article
Model selection with multiple regression on distance matrices leads to incorrect inferences.
- Published in:
- PLoS ONE, 2017, v. 12, n. 4, p. 1, doi. 10.1371/journal.pone.0175194
- By:
- Publication type:
- Article
A three-way approach for protein function classification.
- Published in:
- PLoS ONE, 2017, v. 12, n. 2, p. 1, doi. 10.1371/journal.pone.0171702
- By:
- Publication type:
- Article
A One-Round Quantum Mutual Authenticated Key Agreement Protocol with Semi-Honest Server Using Three-Particle Entangled States.
- Published in:
- International Journal of Theoretical Physics, 2021, v. 60, n. 3, p. 929, doi. 10.1007/s10773-021-04716-0
- By:
- Publication type:
- Article
Unique Information Through the Lens of Channel Ordering: An Introduction and Review.
- Published in:
- Entropy, 2025, v. 27, n. 1, p. 29, doi. 10.3390/e27010029
- By:
- Publication type:
- Article
Routing Algorithm Within the Multiple Non-Overlapping Paths' Approach for Quantum Key Distribution Networks.
- Published in:
- Entropy, 2024, v. 26, n. 12, p. 1102, doi. 10.3390/e26121102
- By:
- Publication type:
- Article
Statistical Testing of Random Number Generators and Their Improvement Using Randomness Extraction.
- Published in:
- Entropy, 2024, v. 26, n. 12, p. 1053, doi. 10.3390/e26121053
- By:
- Publication type:
- Article
Quantum Stream Cipher Based on Holevo–Yuen Theory: Part II.
- Published in:
- Entropy, 2024, v. 26, n. 11, p. 983, doi. 10.3390/e26110983
- By:
- Publication type:
- Article
Application and Development of QKD-Based Quantum Secure Communication.
- Published in:
- Entropy, 2023, v. 25, n. 4, p. 627, doi. 10.3390/e25040627
- By:
- Publication type:
- Article
Straggler- and Adversary-Tolerant Secure Distributed Matrix Multiplication Using Polynomial Codes.
- Published in:
- Entropy, 2023, v. 25, n. 2, p. 266, doi. 10.3390/e25020266
- By:
- Publication type:
- Article
Private Key and Decoder Side Information for Secure and Private Source Coding †.
- Published in:
- Entropy, 2022, v. 24, n. 12, p. 1716, doi. 10.3390/e24121716
- By:
- Publication type:
- Article
Secure Polar Coding for the Primitive Relay Wiretap Channel.
- Published in:
- Entropy, 2021, v. 23, n. 4, p. 442, doi. 10.3390/e23040442
- By:
- Publication type:
- Article
Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography.
- Published in:
- Entropy, 2021, v. 23, n. 1, p. 54, doi. 10.3390/e23010054
- By:
- Publication type:
- Article
An Overview of Key Technologies in Physical Layer Security.
- Published in:
- Entropy, 2020, v. 22, n. 11, p. 1261, doi. 10.3390/e22111261
- By:
- Publication type:
- Article
Polar Coding for Confidential Broadcasting.
- Published in:
- Entropy, 2020, v. 22, n. 2, p. 149, doi. 10.3390/e22020149
- By:
- Publication type:
- Article
Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †.
- Published in:
- Entropy, 2019, v. 21, n. 8, p. 781, doi. 10.3390/e21080781
- By:
- Publication type:
- Article
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach.
- Published in:
- Entropy, 2019, v. 21, n. 8, p. 755, doi. 10.3390/e21080755
- By:
- Publication type:
- Article
The Secret Key Capacity of a Class of Noisy Channels with Correlated Sources.
- Published in:
- Entropy, 2019, v. 21, n. 8, p. 732, doi. 10.3390/e21080732
- By:
- Publication type:
- Article
Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks †.
- Published in:
- Entropy, 2019, v. 21, n. 5, p. 469, doi. 10.3390/e21050469
- By:
- Publication type:
- Article
Finite key analysis for discrete phase randomized BB84 protocol.
- Published in:
- Quantum Information Processing, 2024, v. 23, n. 9, p. 1, doi. 10.1007/s11128-024-04520-9
- By:
- Publication type:
- Article
Experimental quantum digital signature based on heralded single-photon sources.
- Published in:
- Quantum Information Processing, 2024, v. 23, n. 1, p. 1, doi. 10.1007/s11128-023-04235-3
- By:
- Publication type:
- Article
Quantum designated verifier signature without third party.
- Published in:
- Quantum Information Processing, 2023, v. 22, n. 12, p. 1, doi. 10.1007/s11128-023-04183-y
- By:
- Publication type:
- Article
An improved efficient identity-based quantum signature scheme.
- Published in:
- Quantum Information Processing, 2023, v. 22, n. 1, p. 1, doi. 10.1007/s11128-022-03786-1
- By:
- Publication type:
- Article
Leveraging the hardness of dihedral coset problem for quantum cryptography.
- Published in:
- Quantum Information Processing, 2022, v. 21, n. 9, p. 1, doi. 10.1007/s11128-022-03592-9
- By:
- Publication type:
- Article
Estimating security of the quantum key distribution from the guesswork.
- Published in:
- Quantum Information Processing, 2022, v. 21, n. 4, p. 1, doi. 10.1007/s11128-022-03487-9
- By:
- Publication type:
- Article
Analysis of a High-Dimensional Extended B92 Protocol.
- Published in:
- Quantum Information Processing, 2021, v. 20, n. 10, p. 1, doi. 10.1007/s11128-021-03276-w
- By:
- Publication type:
- Article