How to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\) (Q268461): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(6 intermediate revisions by 5 users not shown)
Property / author
 
Property / author: Ivan B. Damgård / rank
Normal rank
 
Property / author
 
Property / author: Thomas Brochmann Pedersen / rank
Normal rank
 
Property / author
 
Property / author: Ivan B. Damgård / rank
 
Normal rank
Property / author
 
Property / author: Thomas Brochmann Pedersen / rank
 
Normal rank
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 94A60 / rank
 
Normal rank
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 81P94 / rank
 
Normal rank
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 94A62 / rank
 
Normal rank
Property / zbMATH DE Number
 
Property / zbMATH DE Number: 6569225 / rank
 
Normal rank
Property / zbMATH Keywords
 
key-recycling
Property / zbMATH Keywords: key-recycling / rank
 
Normal rank
Property / zbMATH Keywords
 
private-key encryption
Property / zbMATH Keywords: private-key encryption / rank
 
Normal rank
Property / zbMATH Keywords
 
quantum cryptography
Property / zbMATH Keywords: quantum cryptography / rank
 
Normal rank
Property / zbMATH Keywords
 
unconditional security
Property / zbMATH Keywords: unconditional security / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s11047-014-9454-5 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2048812146 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum cryptography. II: How to re-use a one-time pad safely even if \(\mathrm P=\mathrm{NP}\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Quantum Cipher with Near Optimal Key-Recycling / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3522361 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Encryption against storage-bounded adversaries from on-line strong extractors / rank
 
Normal rank
Property / cites work
 
Property / cites work: A transform of complementary aspects with applications to entropic uncertainty relations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2706552 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10--12, 2005. Proceedings. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing locally computable extractors and cryptosystems in the bounded-storage model / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 18:55, 11 July 2024

scientific article
Language Label Description Also known as
English
How to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\)
scientific article

    Statements

    How to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\) (English)
    0 references
    0 references
    0 references
    15 April 2016
    0 references
    key-recycling
    0 references
    private-key encryption
    0 references
    quantum cryptography
    0 references
    unconditional security
    0 references

    Identifiers