书目名称 | Information Theoretic Security |
副标题 | 4th International Co |
编辑 | Kaoru Kurosawa |
视频video | |
概述 | Fast-track conference proceedings.State-of-the-art research.Unique selling points |
丛书名称 | Lecture Notes in Computer Science |
图书封面 |  |
描述 | ICITS2009washeldattheShizuokaConventionandArtsCenter“GRANSHIP” in Japan during December 3–6,2009.This was the 4th International Conference on Information Theoretic Security. Over the last few decades, we have seen several research topics studied - quiringinformationtheoreticalsecurity,alsocalledunconditionalsecurity,where there is no unproven computational assumption on the adversary. (This is the framework proposed by Claude Shannon in his seminal paper.) Also, coding as well as other aspects of information theory have been used in the design of cryptographic schemes. Examples are authentication, secure communication, key exchange, multi-party computation and information hiding to name a few. A related area is quantum cryptography that predominantly uses information theory for modeling and evaluation of security. Needless to say, information t- oretically secure cryptosystems are secure even if the factoring assumption or the discrete log assumption is broken. Seeing the multitude of topics in m- ern cryptographyrequiring informationtheoreticalsecurity or using information theory, it is time to have a regular conference on this topic. This was the fourth conference of this series, |
出版日期 | Conference proceedings 2010 |
关键词 | DES; Information; algorithms; coding theory; cryptography; data transmission; fingerprinting; information h |
版次 | 1 |
doi | https://doi.org/10.1007/978-3-642-14496-7 |
isbn_softcover | 978-3-642-14495-0 |
isbn_ebook | 978-3-642-14496-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 |
issn_series | 0302-9743 |
copyright | Springer-Verlag Berlin Heidelberg 2010 |