Perfect Secrecy in IoT

B Zolfaghari, K Bibak - Springer
Perfectly secure cryptography is a branch of information-theoretic cryptography. A perfectly
secure cryptosystem guarantees that the malicious third party cannot guess anything …

[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …

Information-theoretic cryptography and perfect secrecy

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first introduce entropy and some basic concepts related to information
theory. We show how entropy has find its way from thermodynamics into information theory …

Information-Theoretic Cryptography: A Maneuver in the Trade-Off Space of Cryptography in IoT

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
This chapter discusses the reason why we have chosen to study perfectly secure
cryptography (as a branch of information-theoretic cryptography) among the existing …

A Hybrid Combinatorial-Boolean Approach Toward Perfect Secrecy in IoT

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
This chapter completes our discussions in this book via presenting the hybrid combinatorial-
Boolean approach for perfectly secure cryptography in IoT. To this end, we first propose a …

Cryptography and Information Security

LY Por, AA Khan - 2024 - mdpi.com
Summary This Special Issue on cryptography and information security presents a diverse
range of contributions, offering valuable insights into various facets of the field. The topics …

LIPIcs, Volume 304, ITC 2024, Complete Volume

D Aggarwal - … on Information-Theoretic Cryptography (ITC 2024), 2024 - drops.dagstuhl.de
In its fifth year, ITC continued its mission of uniting the cryptography and information theory
communities, and advancing research in all aspects of information-theoretic techniques for …

On measures of information theoretic security

S Liu, Y Hong, E Viterbo - 2014 IEEE Information Theory …, 2014 - ieeexplore.ieee.org
While information-theoretic security is stronger than computational security, it has long been
considered impractical. In this work, we provide new insights into the design of practical …

On the Shannon perfect secrecy result

HR Sadjadpour - 2020 14th International Conference on Signal …, 2020 - ieeexplore.ieee.org
Shannon information theoretic approach to perfect security requires equal number of key
bits to the information bits. This fact has been studied for decades and known as" Shannon …

Information Security and Cryptology–ICISC 2015

S Kwon, A Yun - 2004 - Springer
ICISC 2012, the 15th International Conference on Information Security and Cryptology, was
held in Seoul, Korea, during November 28–30, 2012. This year the conference was hosted …