Gambling, Computational Information and Encryption Security
暂无分享,去创建一个
[1] Silvio Micali,et al. The Notion of Security for Probabilistic Cryptosystems , 1986, CRYPTO.
[2] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[3] Alexander Vardy,et al. Semantic Security for the Wiretap Channel , 2012, CRYPTO.
[4] Gábor Lugosi,et al. Prediction, learning, and games , 2006 .
[5] Avi Wigderson,et al. Computational Analogues of Entropy , 2003, RANDOM-APPROX.
[6] Chi-Jen Lu,et al. Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility , 2007, EUROCRYPT.
[7] Y. Freund,et al. Adaptive game playing using multiplicative weights , 1999 .
[8] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[9] D. Bernoulli. Exposition of a New Theory on the Measurement of Risk , 1954 .
[10] Alexandre Pinto,et al. Comparing Notions of Computational Entropy , 2007, Theory of Computing Systems.
[11] Ueli Maurer,et al. Rational Protocol Design: Cryptography against Incentive-Driven Adversaries , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[12] Andrew Chi-Chih Yao,et al. Computational information theory , 1988 .
[13] Maciej Skorski. Metric Pseudoentropy: Characterizations, Transformations and Applications , 2015, ICITS.
[14] John L. Kelly,et al. A new interpretation of information rate , 1956, IRE Trans. Inf. Theory.
[15] Salil P. Vadhan,et al. Characterizing pseudoentropy and simplifying pseudorandom generator constructions , 2012, STOC '12.
[16] Leonid Reyzin,et al. Some Notions of Entropy for Cryptography - (Invited Talk) , 2011, ICITS.
[17] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[18] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[19] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[20] Anja Lehmann,et al. Information theoretic security : 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015 : proceedings , 2015 .
[21] Charles R. Skinner. Now , 1927 .
[22] Thomas M. Cover,et al. Elements of Information Theory: Cover/Elements of Information Theory, Second Edition , 2005 .
[23] Stephan Krenn,et al. A counterexample to the chain rule for conditional HILL entropy , 2013, computational complexity.
[24] Yevgeniy Dodis,et al. Shannon Impossibility, Revisited , 2012, ICITS.
[25] Stephan Krenn,et al. A counterexample to the chain rule for conditional HILL entropy , 2016, computational complexity.
[26] Hoeteck Wee. On pseudoentropy versus compressibility , 2004, Proceedings. 19th IEEE Annual Conference on Computational Complexity, 2004..
[27] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[28] Oded Goldreich,et al. The Foundations of Cryptography - Volume 1: Basic Techniques , 2001 .
[29] Oded Goldreich. Foundations of Cryptography: Index , 2001 .