Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] The odyssey of entropy: Cryptography
After being introduced by Shannon as a measure of disorder and unavailable information,
the notion of entropy has found its applications in a broad range of scientific disciplines. In …
the notion of entropy has found its applications in a broad range of scientific disciplines. In …
Common information, noise stability, and their extensions
Common information is ubiquitous in information theory and related areas such as
theoretical computer science and discrete probability. However, because there are multiple …
theoretical computer science and discrete probability. However, because there are multiple …
Improved non-malleable extractors, non-malleable codes and independent source extractors
X Li - Proceedings of the 49th Annual ACM SIGACT …, 2017 - dl.acm.org
In this paper we give improved constructions of several central objects in the literature of
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …
Non-malleable extractors and codes, with their many tampered extensions
Randomness extractors and error correcting codes are fundamental objects in computer
science. Recently, there have been several natural generalizations of these objects, in the …
science. Recently, there have been several natural generalizations of these objects, in the …
Collusion resistant traitor tracing from learning with errors
In this work we provide a traitor tracing construction with ciphertexts that grow polynomially
in log (n) where n is the number of users and prove it secure under the Learning with Errors …
in log (n) where n is the number of users and prove it secure under the Learning with Errors …
A unified approach to deterministic encryption: New constructions and a connection to computational entropy
This paper addresses deterministic public-key encryption schemes (DE), which are
designed to provide meaningful security when only source of randomness in the encryption …
designed to provide meaningful security when only source of randomness in the encryption …
Leakage-resilient cryptography from minimal assumptions
We present new constructions of leakage-resilient cryptosystems, which remain provably
secure even if the attacker learns some arbitrary partial information about their internal …
secure even if the attacker learns some arbitrary partial information about their internal …
Information theoretic security for encryption based on conditional Rényi entropies
M Iwamoto, J Shikata - … Security: 7th International Conference, ICITS 2013 …, 2014 - Springer
In this paper, information theoretic cryptography is discussed based on conditional Rényi
entropies. Our discussion focuses not only on cryptography but also on the definitions of …
entropies. Our discussion focuses not only on cryptography but also on the definitions of …
Cryptanalysis via algebraic spans
A Ben-Zvi, A Kalka, B Tsaban - … in Cryptology–CRYPTO 2018: 38th Annual …, 2018 - Springer
We introduce a method for obtaining provable polynomial time solutions of problems in
nonabelian algebraic cryptography. This method is widely applicable, easier to apply, and …
nonabelian algebraic cryptography. This method is widely applicable, easier to apply, and …
Rényi resolvability and its applications to the wiretap channel
The conventional channel resolvability problem refers to the determination of the minimum
rate required for an input process so that the output distribution approximates a target …
rate required for an input process so that the output distribution approximates a target …