Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation (Q6162057): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration / rank
 
Normal rank
Property / cites work
 
Property / cites work: Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Obfuscation for Evasive Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783716 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Semantic Security for the Wiretap Channel / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Generate Cryptographically Strong Sequences of Pseudorandom Bits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reusable fuzzy extractors for low-entropy distributions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Multilinear Maps over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Broadcast channels / rank
 
Normal rank
Property / cites work
 
Property / cites work: Broadcast channels with confidential messages / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computational fuzzy extractors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Best-Possible Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from well-founded assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A fuzzy vault scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secret key agreement by public discussion from common information / rank
 
Normal rank
Property / cites work
 
Property / cites work: Capacity Regions of Two New Classes of Two-Receiver Broadcast Channels / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elements of Information Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Wire-Tap Channel / rank
 
Normal rank

Latest revision as of 12:36, 1 August 2024

scientific article; zbMATH DE number 7703571
Language Label Description Also known as
English
Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation
scientific article; zbMATH DE number 7703571

    Statements

    Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    28 June 2023
    0 references
    wiretap coding scheme
    0 references
    virtual black-box obfuscation
    0 references

    Identifiers