[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …

Perfect Secrecy in IoT

B Zolfaghari, K Bibak - Springer
Perfectly secure cryptography is a branch of information-theoretic cryptography. A perfectly
secure cryptosystem guarantees that the malicious third party cannot guess anything …

Information-Theoretic Cryptography: A Maneuver in the Trade-Off Space of Cryptography in IoT

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
This chapter discusses the reason why we have chosen to study perfectly secure
cryptography (as a branch of information-theoretic cryptography) among the existing …

Information-theoretic cryptography and perfect secrecy

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first introduce entropy and some basic concepts related to information
theory. We show how entropy has find its way from thermodynamics into information theory …

Boolean Cryptography

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
This chapter completes the discussions of the previous chapter to justify our combinatorial-
Boolean approach toward information-theoretic cryptography. The previous chapter …

Combinatorial Cryptography and Latin Squares

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first overview the applications of combinatorics in cryptography. Then, we
take look at some historical applications of non-combinatorial squares and cubes in …

On the Shannon perfect secrecy result

HR Sadjadpour - 2020 14th International Conference on Signal …, 2020 - ieeexplore.ieee.org
Shannon information theoretic approach to perfect security requires equal number of key
bits to the information bits. This fact has been studied for decades and known as" Shannon …

Information Security and Cryptology–ICISC 2015

S Kwon, A Yun - 2004 - Springer
ICISC 2012, the 15th International Conference on Information Security and Cryptology, was
held in Seoul, Korea, during November 28–30, 2012. This year the conference was hosted …

[图书][B] Information Theoretic Security

A Smith - 2012 - Springer
ICITS 2012 was the 6th International Conference of Information-theoretic Security, held at
the Université de Montréal in Montreal, Quebec, Canada, during August 15–17, 2012. ICITS …

Time for a Paradigm Shift in Our Disciplinary Culture?

N Koblitz - Paradigms in Cryptology–Mycrypt 2016. Malicious and …, 2017 - Springer
The well-known KISS principle of engineering—Keep It Simple, Stupid!—is also of value in
cryptography. In certain subfields, such as lattice-based crypto and indistinguishability …