The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Unconditionally-secure (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1992 (16) 1993-1997 (16) 1998-1999 (16) 2000-2002 (27) 2003-2004 (21) 2005 (17) 2006-2007 (32) 2008 (22) 2009 (17) 2010-2011 (28) 2012-2013 (22) 2014-2015 (19) 2016-2017 (17) 2018-2019 (15) 2020-2022 (19) 2023 (18) 2024 (2)
Publication types (Num. hits)
article(134) inproceedings(186) phdthesis(4)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 98 occurrences of 54 keywords

Results
Found 324 publication records. Showing 324 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
92Luke McAven, Reihaneh Safavi-Naini, Moti Yung Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
90Bo Yang, Shixiong Zhu, Yumin Wang Unconditionally-Secure Oblivious Transfer. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Rnyi entropy, Unconditionally-secure, Oblivious transfer, Privacy amplification
77Yvo Desmedt, Moti Yung Abritrated Unconditionally Secure Authentication Can Be Unconditionally Protected Against Arbiter's Attacks (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
67Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. Search on Bibsonomy AAECC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
67Paolo D'Arco, Douglas R. Stinson On Unconditionally Secure Robust Distributed Key Distribution Centers. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
64Anderson C. A. Nascimento, Akira Otsuka, Hideki Imai, Jörn Müller-Quade Unconditionally Secure Homomorphic Pre-distributed Commitments. Search on Bibsonomy AAECC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
64Goichiro Hanaoka, Junji Shikata, Yuliang Zheng 0001, Hideki Imai Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
64Ayako Maeda, Atsuko Miyaji, Mitsuru Tada Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
54Dominic Mayers Quantum Key Distribution and String Oblivious Transfer in Noisy Channels. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
53Arpita Patra, Ashish Choudhary, C. Pandu Rangan Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Information Theoretic Security, Multiparty Computation, Error Probability
53Reihaneh Safavi-Naini, Luke McAven, Moti Yung General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures". Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
53Goichiro Hanaoka, Junji Shikata, Yuliang Zheng 0001, Hideki Imai Unconditionally Secure Digital Signature Schemes Admitting Transferability. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
53Richard Taylor 0002 Near Optimal Unconditionally Secure Authentication. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
51Ueli M. Maurer A Unified and Generalized Treatment of Authentification Theory. Search on Bibsonomy STACS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF unconditionally-secure authentication, Cryptography, information theory
50Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt Unconditionally secure ring authentication. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ring signature, unconditional security, authentication codes
50Ivan Damgård, Jesper Buus Nielsen Scalable and Unconditionally Secure Multiparty Computation. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Renato Renner, Stefan Wolf 0001 The Exact Price for Unconditionally Secure Asymmetric Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF quantum key agreement, reductions of information-theoretic primitives, authentication, Information-theoretic security, privacy amplification, information reconciliation
50Mida Guillermo, Keith M. Martin, Christine M. O'Keefe Providing Anonymity in Unconditionally Secure Secret Sharing Schemes. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptography, anonymity, secret sharing
50Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai Unconditionally Secure Anonymous Encryption and Group Authentication. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
50Junji Shikata, Goichiro Hanaoka, Yuliang Zheng 0001, Hideki Imai Security Notions for Unconditionally Secure Signature Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
50Frank Niedermeyer, Werner Schindler On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF unconditional security, Key agreement protocol, CHIMERA
50David Chaum, Eugène van Heijst, Birgit Pfitzmann Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
45Luke McAven, Reihaneh Safavi-Naini, Moti Yung Unconditionally Secure Encryption Under Strong Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Michael Waidner Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
42Hoi Fung Chau Unconditionally secure key distribution in higher dimensions by depolarization. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39Junji Shikata, Tsutomu Matsumoto Unconditionally Secure Steganography Against Active Attacks. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Ivan Damgård, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, Tomas Toft Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Kevin M. Greenan, Mark W. Storer, Ethan L. Miller, Carlos Maltzahn POTSHARDS : Storing Data for the Long-term Without Encryption. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Data Security, Distributed Storage, Secure Storage, Survivable Storage
36Reihaneh Safavi-Naini, Shaoquan Jiang Non-interactive conference key distribution and its applications. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF conference key distribution, ring authentication, broadcast encryption, unconditional security
36Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mixed adversary, information theoretic security, error probability
36Koichi Koizumi, Takaaki Mizuki, Takao Nishizeki A Revised Transformation Protocol for Unconditionally Secure Secret Key Exchange. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Random deal of cards, Secret key exchange, Key set protocol, Transformation protocol, Card games
36Arpita Patra, Ashish Choudhary, C. Pandu Rangan Round Efficient Unconditionally Secure Multiparty Computation Protocol. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Information Theoretic Security, Multiparty Computation
36Goce Jakimoski Unconditionally Secure Information Authentication in Presence of Erasures. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF erasure- resilient codes, erasure-tolerant authentication, message authentication, authentication codes
36Ventzislav Nikov, Svetla Nikova, Bart Preneel Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Cyril Prissette Unconditionally Secure Key Agreement Protocol. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
36Douglas R. Stinson, Ruizhong Wei Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
36Carlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
35Ronald Cramer, Ivan Damgård Secure Distributed Linear Algebra in a Constant Number of Rounds. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
35Martin Hirt, Ueli M. Maurer, Bartosz Przydatek Efficient Secure Multi-party Computation. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
32Mehrdad Dianati, Romain Alléaume Transport Layer Protocols for the Secoqc Quantum Key Distribution (QKD) Network. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai Cryptography from Anonymity. Search on Bibsonomy FOCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Wen-Guey Tzeng Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF distributed oblivious transfer, Oblivious transfer, private information retrieval
32Wen-Guey Tzeng Efficient 1-Out-n Oblivious Transfer Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Jürg Wullschleger Oblivious-Transfer Amplification. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF oblivious-transfer amplification, universal oblivious transfer, weak oblivious transfer, computational weak oblivious transfer, distributed leftover hash lemma, hard-core lemma
28Anna Lisa Ferrara, Barbara Masucci An Information-Theoretic Approach to the Access Control Problem. Search on Bibsonomy ICTCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Ernest F. Brickell, Douglas R. Stinson Authentication Codes with Multiple Arbiters (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
27Yuval Ishai, Manoj Prabhakaran 0001, Amit Sahai Secure Arithmetic Computation with No Honest Majority. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Ahto Buldas, Sven Laur, Margus Niitsoo Oracle Separation in the Non-uniform Model. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Jian Ren 0001 Privacy-Preserving Communication Algorithms and Network Protocols. Search on Bibsonomy WASA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Communication anonymity, sender anonymity, recipient anonymity, location privacy, unconditional security, content authenticity
27Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci Provably-secure time-bound hierarchical key assignment schemes. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, provable security, key assignment
27Sergio Cabello, Carles Padró, Germán Sáez Secret Sharing Schemes with Detection of Cheaters for a General Access Structure. Search on Bibsonomy FCT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Detection of cheaters, Robust and secure schemes, Cryptography, Secret sharing schemes
26Yvo Desmedt, Stelios Erotokritou Making Code Voting Secure against Insider Threats using Unconditionally Secure MIX Schemes and Human PSMT Protocols. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
26Yvo Desmedt, Stelios Erotokritou Making Code Voting Secure Against Insider Threats Using Unconditionally Secure MIX Schemes and Human PSMT Protocols. Search on Bibsonomy VoteID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Paul Dumais, Dominic Mayers, Louis Salvail Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Jian Ren 0001, Tongtong Li, Keesook Han Anonymous Communication Protocol in Overlay Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Ronald Cramer, Serge Fehr, Yuval Ishai, Eyal Kushilevitz Efficient Multi-party Computation over Rings. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Matthias Fitzi, Daniel Gottesman, Martin Hirt, Thomas Holenstein, Adam D. Smith Detectable byzantine agreement secure against faulty majorities. Search on Bibsonomy PODC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF quantum signatures, broadcast, public-key infrastructure, byzantine agreement, multi-party computation
24Kaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike Burmester Some Bounds and a Construction for Secure Broadcast Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
24Yvo Desmedt, Yair Frankel Shared Generation of Authenticators and Signatures (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
21Shannon Veitch, Douglas R. Stinson Unconditionally secure non-malleable secret sharing and circular external difference families. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
21Zhenkai Hu, Kang Yang 0002, Yu Yu 0001 Unconditionally secure MPC for Boolean circuits with constant online communication. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
21Mostefa Kara, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh, Muath AlShaikh Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2023 DBLP  BibTeX  RDF
21Boris Ryabko Unconditionally secure short key ciphers based on data compression and randomization. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Sergio Rajsbaum A distributed computing perspective of unconditionally secure information transmission in Russian cards problems. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Cheuk Ting Li, Sherman S. M. Chow Unconditionally Secure Access Control Encryption. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Boris Ryabko Unconditionally secure ciphers with a short key for a source with unknown statistics. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Luowen Qian Unconditionally secure quantum commitments with preprocessing. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Shannon Veitch, Douglas R. Stinson Unconditionally Secure Non-malleable Secret Sharing and Circular External Difference Families. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Ertugrul Basar Kirchhoff Meets Johnson: In Pursuit of Unconditionally Secure Communication. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Tomoyuki Morimae, Barak Nehoran, Takashi Yamakawa Unconditionally Secure Commitments with Quantum Auxiliary Inputs. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Boris Ryabko Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics. Search on Bibsonomy Entropy The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Ping Wang, Yikang Lei, Yiting Su Unconditionally Secure Quantum Bit Commitment and Quantum Oblivious Transfer. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
21Yuyu Wang 0001, Jiaxin Pan Unconditionally Secure NIZK in the Fine-Grained Setting. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
21Reo Eriguchi Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexity. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
21Luowen Qian Unconditionally secure quantum commitments with preprocessing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
21Tomoyuki Morimae, Barak Nehoran, Takashi Yamakawa Unconditionally Secure Commitments with Quantum Auxiliary Inputs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
21Boris Ryabko Unconditionally secure ciphers with a short key for a source with unknown statistics. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
21Cheuk Ting Li, Sherman S. M. Chow Unconditionally Secure Access Control Encryption. Search on Bibsonomy ISIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Reo Eriguchi Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexity. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Louis Cianciullo, Hossein Ghodosi Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage. Search on Bibsonomy J. Cryptol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage. Search on Bibsonomy J. Cryptol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Yoann Pelet, Ittoop Vergheese Puthoor, Natarajan Venkatachalam, Sören Wengerowsky, Martin Loncaric, Sebastian Philipp Neumann, Bo Liu, Zeljko Samec, Mario Stipcevic, Rupert Ursin, Erika Andersson, John G. Rarity, Djeylan Aktas, Siddarth Koduru Joshi Unconditionally secure digital signatures implemented in an 8-user quantum network. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
21Boris Ryabko Using data compression and randomisation to build an unconditionally secure short key cipher. Search on Bibsonomy ITW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Yuyu Wang 0001, Jiaxin Pan Unconditionally Secure NIZK in the Fine-Grained Setting. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan Unconditionally Secure Computation Against Low-Complexity Leakage. Search on Bibsonomy J. Cryptol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Boris Ryabko Using data compression and randomization to build an unconditionally secure short key cipher. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
21André Chailloux, Yann Barsamian Relativistic zero-knowledge protocol for NP over the internet unconditionally secure against quantum adversaries. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
21Seok Hyung Lie, Hyukjoon Kwon, M. S. Kim 0001, Hyunseok Jeong Quantum one-time tables for unconditionally secure qubit-commitment. Search on Bibsonomy Quantum The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Boris Ryabko Using data compression and randomization to build an unconditionally secure short key cipher. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
21Antigoni Polychroniadou, Yifan Song Constant-Overhead Unconditionally Secure Multiparty Computation Over Binary Fields. Search on Bibsonomy EUROCRYPT (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Sergio Rajsbaum A Distributed Computing Perspective of Unconditionally Secure Information Transmission in Russian Cards Problems. Search on Bibsonomy SIROCCO The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Sergio Rajsbaum A Distributed Computing Perspective of Unconditionally Secure Information Transmission in Russian Cards Problems. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
21Babak Siabi, Mehdi Berenjkoub Comments on "Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra". Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21Mingxing Luo, Xiaojun Wang Unconditionally secure quantum bit commitment: Revised. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
21Antigoni Polychroniadou, Yifan Song Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
21Ashish Choudhury Optimally-resilient Unconditionally-secure Asynchronous Multi-party Computation Revisited. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
21Ashish Choudhury Brief Announcement: Optimally-Resilient Unconditionally-Secure Asynchronous Multi-Party Computation Revisited. Search on Bibsonomy DISC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 324 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license