[引用][C] Special issue on cryptography and security

A Mazzeo - Proceedings of the IEEE, 2006 - ieeexplore.ieee.org
Special Issue on Cryptography and Security Page 1 Scanning the Issue Special Issue on
Cryptography and Security With the explosive growth of computer networks, more and more …

[图书][B] Information Security and Cryptology-Icisc 2014

J Lee, J Kim - 2015 - Springer
ICISC 2014, the 17th International Conference on Information Security and Cryptology, was
held in Seoul, Korea, during December 3–5, 2014. This year the conference was hosted by …

Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers

G Samid - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The prevailing ciphers rely on the weak assumption that their attacker is not smarter than
expected by their designers. The resultant crypto ecology favors the cryptographic …

Shannon perfect secrecy in a discrete Hilbert space

R Kuang, N Bettenburg - 2020 IEEE international conference on …, 2020 - ieeexplore.ieee.org
The One-time-pad (OTP) was mathematically proven to be perfectly secure by Shannon in
1949. We propose to extend the classical OTP from an n-bit finite field to the entire …

Security and vulnerability in the Internet of Things

S Li, LD Xu - Securing the Internet of Things, 2017 - books.google.com
In this chapter, we will introduce the secrecy and secret-key in the Internet of Things (IoT).
We clarify the ways of secret-key generation that the IoT differs from the web application and …

Information-theoretic secrecy with access to decryption oracles

C Portmann, K Tanaka - IEICE transactions on fundamentals of …, 2011 - search.ieice.org
We analyze the security notion of information-theoretic secrecy against an adversary who
can make< mos00099. jpg> adaptive queries to the decryption oracle, and show that it is …

[PDF][PDF] IoT security: problems, Challenges and Solution

L Ren, T Micro - Santa Clara, CA, 2015 - academia.edu
• Data security, cloud security, network security, IoT security• Stringology, differential
compression, deep learning• Mathematical modeling, algorithms.–Measurable …

[图书][B] Information Security and Cryptology: 7th International Conference, Inscrypt 2011, Beijing, China, November 30--December 3, 2011. Revised Selected Papers

CK Wu, M Yung, D Lin - 2012 - books.google.com
This book constitutes the thoroughly refereed post-conference proceedings of the 7th
International Conference on Information Security and Cryptology, Inscrypt 2011, held in …

[图书][B] Information and Communications Security: 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers

S Qing, E Okamoto, K Kim, D Liu - 2016 - books.google.com
This book constitutes the thoroughly refereed post-conference proceedings of the 17th
International Conference on Information and Communications Security, ICISC 2015, held in …

The future of cryptography

J Callas - Information Systems Security, 2007 - Taylor & Francis
We've seen where cryptography came from, but where is it going? In this article, I pose a
number of unsolved problems: challenges that face us with which we have to deal. Some of …