Information theoretical cryptogenography
From MaRDI portal
Recommendations
- Information theoretical cryptogenography
- Information-theoretic Cryptography
- scientific article; zbMATH DE number 1418286
- Information-Theoretic Security of Cryptographic Channels
- Information theoretic security
- scientific article; zbMATH DE number 1914188
- Coding theory and cryptography
- Some open problems in information-theoretic cryptography
- Cryptography from Information Loss.
- Cryptology and complexity theories
Cites work
- scientific article; zbMATH DE number 107482 (Why is no real title available?)
- scientific article; zbMATH DE number 2090929 (Why is no real title available?)
- scientific article; zbMATH DE number 2090930 (Why is no real title available?)
- Communication Complexity
- Cryptogenography
- Improved protocols and hardness results for the two-player cryptogenography problem
- Interactive epistemology. I: Knowledge
- The algorithmic foundations of differential privacy
- The dining cryptographers problem: Unconditional sender and recipient untraceability
Cited in
(7)- Information Theoretic Security for Encryption Based on Conditional Rényi Entropies
- Improved protocols and hardness results for the two-player cryptogenography problem
- Cryptogenography
- The two sheriffs problem: cryptographic formalization and generalization
- Information-theoretic Cryptography
- Information theoretical cryptogenography
- scientific article; zbMATH DE number 1418286 (Why is no real title available?)
This page was built for publication: Information theoretical cryptogenography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1698396)