From post

Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio.

, , и . IACR Cryptology ePrint Archive, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Composable and Robust Outsourced Storage., и . IACR Cryptology ePrint Archive, (2017)Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited., , и . ASIACRYPT (1), том 8269 из Lecture Notes in Computer Science, стр. 134-153. Springer, (2013)Anonymous Authentication with Shared Secrets., , , , и . LATINCRYPT, том 8895 из Lecture Notes in Computer Science, стр. 219-236. Springer, (2014)Per-Session Security: Password-Based Cryptography Revisited., , , и . ESORICS (1), том 10492 из Lecture Notes in Computer Science, стр. 408-426. Springer, (2017)Confidentiality and Integrity: A Constructive Perspective., , и . TCC, том 7194 из Lecture Notes in Computer Science, стр. 209-229. Springer, (2012)Constructive Cryptography - A Primer.. Financial Cryptography, том 6052 из Lecture Notes in Computer Science, стр. 1. Springer, (2010)Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio., , и . IACR Cryptology ePrint Archive, (2017)Agree-and-Prove: Generalized Proofs Of Knowledge and Applications., , и . IACR Cryptology ePrint Archive, (2019)Non-malleable Encryption: Simpler, Shorter, Stronger., , , , и . J. Cryptol., 33 (4): 1984-2033 (2020)Overcoming Impossibility Results in Composable Security Using Interval-Wise Guarantees., и . CRYPTO (1), том 12170 из Lecture Notes in Computer Science, стр. 33-62. Springer, (2020)