Shannon Impossibility, Revisited
暂无分享,去创建一个
[1] Stefan Wolf,et al. Unconditional Security in Cryptography , 1998, Lectures on Data Security.
[2] Alexander Vardy,et al. Semantic Security for the Wiretap Channel , 2012, CRYPTO.
[3] Russell Impagliazzo,et al. One-way functions are essential for complexity based cryptography , 1989, 30th Annual Symposium on Foundations of Computer Science.
[4] Mitsugu Iwamoto,et al. Security notions for information theoretically secure encryptions , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[5] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[6] Thomas M. Cover,et al. Elements of Information Theory: Cover/Elements of Information Theory, Second Edition , 2005 .
[7] Ivan Damgård,et al. Lectures on Data Security , 2003, Lecture Notes in Computer Science.
[8] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[9] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..