Works matching DE "INFORMATION-theoretic security"
Results: 113
Crypto Analysis of the Key Distribution Scheme Using Noise-Free Resistances.
- Published in:
- Fluctuation & Noise Letters, 2024, v. 23, n. 3, p. 1, doi. 10.1142/S0219477524500287
- By:
- Publication type:
- Article
A Distributed and Parallel (k , n) QSS Scheme with Verification Capability.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 23, p. 3782, doi. 10.3390/math12233782
- By:
- Publication type:
- Article
An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 1, p. 88, doi. 10.3390/sym11010088
- By:
- Publication type:
- Article
Cryptanalysis and Improvement on an Image Encryption Algorithm Design Using a Novel Chaos Based S-Box.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 9, p. 399, doi. 10.3390/sym10090399
- By:
- Publication type:
- Article
An Image Encryption Algorithm Based on Information Hiding.
- Published in:
- International Journal of Bifurcation & Chaos in Applied Sciences & Engineering, 2016, v. 26, n. 11, p. 1, doi. 10.1142/S0218127416501923
- By:
- Publication type:
- Article
Code design and interception probability of optical fibre communication system based on optical coding.
- Published in:
- IET Communications (Wiley-Blackwell), 2022, v. 16, n. 14, p. 1731, doi. 10.1049/cmu2.12440
- By:
- Publication type:
- Article
Efficient secure channel coding scheme based on low-density Lattice codes.
- Published in:
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 11, p. 1365, doi. 10.1049/iet-com.2015.0713
- By:
- Publication type:
- Article
Polarization bases compensation towards advantages in satellite-based QKD without active feedback.
- Published in:
- Communications Physics, 2023, v. 6, n. 1, p. 1, doi. 10.1038/s42005-023-01235-8
- By:
- Publication type:
- Article
Unconditionally secure signature schemes revisited.
- Published in:
- Journal of Mathematical Cryptology, 2016, v. 10, n. 1, p. 35, doi. 10.1515/jmc-2016-0002
- By:
- Publication type:
- Article
Towards efficient private distributed computation on unbounded input streams.
- Published in:
- Journal of Mathematical Cryptology, 2015, v. 9, n. 2, p. 79, doi. 10.1515/jmc-2013-0039
- By:
- Publication type:
- Article
The Communication Complexity of Private Simultaneous Messages, Revisited.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 3, p. 917, doi. 10.1007/s00145-019-09334-y
- By:
- Publication type:
- Article
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 1, p. 49, doi. 10.1007/s00145-013-9172-7
- By:
- Publication type:
- Article
A study of polarization compensation for quantum networks.
- Published in:
- EPJ Quantum Technology, 2023, v. 10, n. 1, p. 1, doi. 10.1140/epjqt/s40507-023-00187-w
- By:
- Publication type:
- Article
On the Consistency of Multithreshold Entropy Linear Classifier.
- Published in:
- Schedae Informaticae, 2015, v. 24, p. 123
- By:
- Publication type:
- Article
Comparison of the Convergence Rates of the New Correntropy-Based Levenberg-Marquardt (CLM) Method and the Fixed-Point Maximum Correntropy (FP-MCC) Algorithm.
- Published in:
- Circuits, Systems & Signal Processing, 2018, v. 37, n. 7, p. 2884, doi. 10.1007/s00034-017-0694-3
- By:
- Publication type:
- Article
Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2017, v. 6, n. 2, p. 89, doi. 10.1049/iet-bmt.2016.0061
- By:
- Publication type:
- Article
Advances in device-independent quantum key distribution.
- Published in:
- NPJ Quantum Information, 2023, v. 9, n. 1, p. 1, doi. 10.1038/s41534-023-00684-x
- By:
- Publication type:
- Article
Modulation leakage-free continuous-variable quantum key distribution.
- Published in:
- NPJ Quantum Information, 2022, v. 8, n. 1, p. 1, doi. 10.1038/s41534-022-00640-1
- By:
- Publication type:
- Article
CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS - A SURVEY.
- Published in:
- ICTACT Journal on Communication Technology, 2017, v. 8, n. 2, p. 1533, doi. 10.21917/ijct.2017.0226
- By:
- Publication type:
- Article
A Trend in Global Steganography and Steganalysis Approaches.
- Published in:
- Asian Journal of Engineering, Sciences & Technology (AJEST), 2014, v. 4, n. 1, p. 30
- By:
- Publication type:
- Article
Adaptive multitask network based on maximum correntropy learning algorithm.
- Published in:
- International Journal of Adaptive Control & Signal Processing, 2017, v. 31, n. 8, p. 1232, doi. 10.1002/acs.2760
- By:
- Publication type:
- Article
Experimental measurement-device-independent quantum digital signatures.
- Published in:
- Nature Communications, 2017, v. 8, n. 1, p. 1, doi. 10.1038/s41467-017-01245-5
- By:
- Publication type:
- Article
Experimental demonstration of long-distance continuous-variable quantum key distribution.
- Published in:
- Nature Photonics, 2013, v. 7, n. 5, p. 378, doi. 10.1038/nphoton.2013.63
- By:
- Publication type:
- Article
Directional modulation techniques for secure wireless communication: a comprehensive survey.
- Published in:
- 2022
- By:
- Publication type:
- Literature Review
Finite key analysis for discrete phase randomized BB84 protocol.
- Published in:
- Quantum Information Processing, 2024, v. 23, n. 9, p. 1, doi. 10.1007/s11128-024-04520-9
- By:
- Publication type:
- Article
Entropically secure encryption with faster key expansion.
- Published in:
- Quantum Information Processing, 2024, v. 23, n. 4, p. 1, doi. 10.1007/s11128-024-04330-z
- By:
- Publication type:
- Article
Experimental quantum digital signature based on heralded single-photon sources.
- Published in:
- Quantum Information Processing, 2024, v. 23, n. 1, p. 1, doi. 10.1007/s11128-023-04235-3
- By:
- Publication type:
- Article
Quantum designated verifier signature without third party.
- Published in:
- Quantum Information Processing, 2023, v. 22, n. 12, p. 1, doi. 10.1007/s11128-023-04183-y
- By:
- Publication type:
- Article
An improved efficient identity-based quantum signature scheme.
- Published in:
- Quantum Information Processing, 2023, v. 22, n. 1, p. 1, doi. 10.1007/s11128-022-03786-1
- By:
- Publication type:
- Article
Leveraging the hardness of dihedral coset problem for quantum cryptography.
- Published in:
- Quantum Information Processing, 2022, v. 21, n. 9, p. 1, doi. 10.1007/s11128-022-03592-9
- By:
- Publication type:
- Article
Estimating security of the quantum key distribution from the guesswork.
- Published in:
- Quantum Information Processing, 2022, v. 21, n. 4, p. 1, doi. 10.1007/s11128-022-03487-9
- By:
- Publication type:
- Article
Analysis of a High-Dimensional Extended B92 Protocol.
- Published in:
- Quantum Information Processing, 2021, v. 20, n. 10, p. 1, doi. 10.1007/s11128-021-03276-w
- By:
- Publication type:
- Article
ADA-QKDN: a new quantum key distribution network routing scheme based on application demand adaptation.
- Published in:
- Quantum Information Processing, 2021, v. 20, n. 9, p. 1, doi. 10.1007/s11128-021-03246-2
- By:
- Publication type:
- Article
Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security.
- Published in:
- Quantum Information Processing, 2021, v. 20, n. 7, p. 1, doi. 10.1007/s11128-021-03164-3
- By:
- Publication type:
- Article
Optimizing the decoy-state BB84 QKD protocol parameters.
- Published in:
- Quantum Information Processing, 2021, v. 20, n. 4, p. 1, doi. 10.1007/s11128-021-03078-0
- By:
- Publication type:
- Article
Quantum-based anonymity and secure veto.
- Published in:
- Quantum Information Processing, 2021, v. 20, n. 3, p. 1, doi. 10.1007/s11128-021-03022-2
- By:
- Publication type:
- Article
Quantum public-key encryption schemes based on conjugate coding.
- Published in:
- Quantum Information Processing, 2020, v. 19, n. 11, p. 1, doi. 10.1007/s11128-020-02912-1
- By:
- Publication type:
- Article
Improving the performance of decoy-state quantum digital signature with single-photon-added coherent sources.
- Published in:
- Quantum Information Processing, 2020, v. 19, n. 7, p. 1, doi. 10.1007/s11128-020-02695-5
- By:
- Publication type:
- Article
Cryptanalysis of multiparty quantum digital signatures.
- Published in:
- Quantum Information Processing, 2019, v. 18, n. 8, p. N.PAG, doi. 10.1007/s11128-019-2365-8
- By:
- Publication type:
- Article
Efficient Big Integer Multiplication in Cryptography.
- Published in:
- International Journal of Information Security Science, 2017, v. 6, n. 4, p. 70
- By:
- Publication type:
- Article
Bounds for Message Authentication with Distortion.
- Published in:
- Computer Journal, 2017, v. 60, n. 4, p. 497, doi. 10.1093/comjnl/bxw060
- By:
- Publication type:
- Article
Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme.
- Published in:
- Computer Journal, 2017, v. 60, n. 4, p. 491, doi. 10.1093/comjnl/bxw058
- By:
- Publication type:
- Article
Three‐level quantum satellite communication framework and its applications.
- Published in:
- International Journal of Satellite Communications & Networking, 2021, v. 39, n. 5, p. 473, doi. 10.1002/sat.1392
- By:
- Publication type:
- Article
GROUP SECRET KEY GENERATION FOR 5G Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2019, v. 13, n. 8, p. 4041, doi. 10.3837/tiis.2019.08.012
- By:
- Publication type:
- Article
Private measures, random walks, and synthetic data.
- Published in:
- Probability Theory & Related Fields, 2024, v. 189, n. 1/2, p. 569, doi. 10.1007/s00440-024-01279-z
- By:
- Publication type:
- Article
Application and Development of QKD-Based Quantum Secure Communication.
- Published in:
- Entropy, 2023, v. 25, n. 4, p. 627, doi. 10.3390/e25040627
- By:
- Publication type:
- Article
Straggler- and Adversary-Tolerant Secure Distributed Matrix Multiplication Using Polynomial Codes.
- Published in:
- Entropy, 2023, v. 25, n. 2, p. 266, doi. 10.3390/e25020266
- By:
- Publication type:
- Article
Private Key and Decoder Side Information for Secure and Private Source Coding †.
- Published in:
- Entropy, 2022, v. 24, n. 12, p. 1716, doi. 10.3390/e24121716
- By:
- Publication type:
- Article
Secure Polar Coding for the Primitive Relay Wiretap Channel.
- Published in:
- Entropy, 2021, v. 23, n. 4, p. 442, doi. 10.3390/e23040442
- By:
- Publication type:
- Article
Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography.
- Published in:
- Entropy, 2021, v. 23, n. 1, p. 54, doi. 10.3390/e23010054
- By:
- Publication type:
- Article