Found 31 results for 'information-theory'.
1) key-derivation - What's bad about idea of public-key/one-time-pad hybrid cryptosystem?
2) public-key - Information theoretical lower limit on the size of public and private keys
3) block-cipher - Would a symmetric cipher with a keylength a big as the data length be information theoretically secure?
4) mac - Is Poly1305 an information-theoretically secure MAC?
5) secret-sharing - Distributing shares in a particular monotone access structure
6) algorithm-design - Is this transposition cipher information-theoretically secure for 1 message?
7) information-theory - what is the motivation behind quantum key distribution with Continuous variable?
8) mac - Is Poly1305 an information-theoretically secure MAC?
9) cryptanalysis - Fuzzy Extractor constructor for sequence reconciliation
10) keys - How to securely combine multiple sources of entropy?
11) oblivious-transfer - Oblivious transfer impossible from noiseless channels
12) key-exchange - Proof that any key exchange protocol is vulnerable to MitM attacks in the absence of shared information or trust
13) symmetric - Can you have perfect secrecy with countable message/key spaces by dropping countable additivity?
14) secret-sharing - Computational Complexity Of Breaking Information Theoretic Security
15) hash - How long to wait to feed hashing using SHA 256?
16) security-definition - Does information theoretical security definition imply DDH, RSA, QR does not hold?
17) encryption - Fortuna: With a Single Entropy Source
18) cryptanalysis - Brute-force attack on OAEP
19) encryption - Why does a perfect secrecy can be achieved when decryption correctness is not totally required?
20) encryption - Machine learning to break imperfect randomness
21) cryptanalysis - Fuzzy Extractor for Binary Sequence
22) random-number-generator - Understanding $\varepsilon$-advantage in cryptographically secure deterministic RNG
23) provable-security - Does an information-theoretically secure hash function exist?
24) public-key - What's the probability of cracking this cipher using partial information about the private key obtained from $k$ public keys?
25) entropy - Monotonicity of min-entropy
26) algorithm-design - What is the methodology for selecting symbol bit length and window size when performing Shannon Entropy Analysis?
27) authentication - Security of Carter-Wegman polynomial authenticators, and their concatenation?
28) computer-science - What is the computer science definition of entropy?
29) finite-field - Difference between $F_2^n$ and $\Bbb F_2^n$ for a field
30) security-definition - What is the difference between information-theoretic and perfect types of security?
31) random-number-generator - Fortuna: Reseeding