semiskilled 发表于 2025-3-27 01:02:57

http://reply.papertrans.cn/47/4658/465741/465741_31.png

neutralize 发表于 2025-3-27 04:06:54

http://reply.papertrans.cn/47/4658/465741/465741_32.png

前兆 发表于 2025-3-27 05:58:33

978-3-642-20727-3Springer Berlin Heidelberg 2011

ordain 发表于 2025-3-27 10:23:00

Information Theoretic Security978-3-642-20728-0Series ISSN 0302-9743 Series E-ISSN 1611-3349

百灵鸟 发表于 2025-3-27 16:56:05

LT-Codes and Phase Transitions for Mutual Information,LDPC codes in the 1990’s , and a decade long research on their properties have brought fundamental changes to coding theory in general, and to the practical design of codes in particular. Today, a number of international standards such as DVB-S2, ITU-T G.hn, or 10 GBase-T use LDPC codes for the transmission of signals.

clarify 发表于 2025-3-27 21:43:47

http://reply.papertrans.cn/47/4658/465741/465741_36.png

BORE 发表于 2025-3-27 22:38:16

Some Notions of Entropy for Cryptography,ic constructions. It focuses on min-entropy and its extensions to the cases when the adversary has correlated information and/or is computationally bounded. It also presents results that can be used to bound such entropy and apply it to the analysis of cryptographic constructions.

Oratory 发表于 2025-3-28 02:45:27

http://reply.papertrans.cn/47/4658/465741/465741_38.png

Autobiography 发表于 2025-3-28 07:43:23

http://reply.papertrans.cn/47/4658/465741/465741_39.png

LAP 发表于 2025-3-28 10:48:08

Randomly Encoding Functions: A New Cryptographic Paradigm,The notion of . allows to represent a “complex” function .(.) by a “simpler” randomized mapping .(x;r) whose output distribution on an input . encodes the value of .(.). We survey several cryptographic applications of this paradigm.
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Theoretic Security; 5th International Co Serge Fehr Conference proceedings 2011 Springer Berlin Heidelberg 2011 authentication.