Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Indistinguishability
biblio
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography
Submitted by aekwall on Thu, 04/08/2021 - 3:39pm
probability
information theoretic security
unconditional security
symmetric-key encryption
Shannon's perfect secrecy
security quantities
security formalizations
relaxed perfect secrecy
perfect secrecy
information-theoretic indistinguishability
Information-Theoretic Cryptography
composable security
semantic security
Indistinguishability
Semantics
Scalability
key agreement
information-theoretic security
Entropy
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
secret keys
private key cryptography
encryption
biblio
Semantic Security for Quantum Wiretap Channels
Submitted by grigby1 on Tue, 12/15/2020 - 12:26pm
Cryptography
telecommunication security
strongly secure code
semantically secure code
semantic security capacity
semantic security
security
secrecy
resilience
quantum wiretap channels
quantum communication
pubcrawl
nonsecure code
Indistinguishability
channel coding
Compositionality
coding theory
classical-quantum channels
classical-quantum
classical channels
capacity
BRI functions
BRI
biregular irreducible functions
biregular irreducible
composability
Resiliency
Metrics
biblio
A Linear Distinguisher and Its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation
Submitted by grigby1 on Mon, 12/16/2019 - 2:54pm
ciphertext-only attack
Control Theory
Cyber Physical System
cyber physical systems
Human behavior
Indistinguishability
privacy
privacy analysis
privacy-preserving verifiable (outsourced) computation
pubcrawl
resilience
Resiliency
Scalability
biblio
Verification of Randomized Security Protocols
Submitted by grigby1 on Thu, 05/24/2018 - 11:22am
Policy
Upper bound
standard cryptographic primitives
sequences
sequence
secret sec
secrecy problem
randomized security protocol Verification
pubcrawl
Protocols
protocol verification
probability
privacy
policy-based collaboration
Complexity theory
nonsatisfiability problem
monadic first order logic
matching lower bound
Indistinguishability
formal logic
encryption
Electronic mail
Cryptographic Protocols
coNEXPTIME
computational complexity
computability
Compositionality