Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.Includes bibliographical references (p. 109-115).(cont.) We apply the framework to get new results, creating (a) encryption schemes with very short keys, and (b) hash functions that leak no information about their input, yet-paradoxically-allow testing if a candidate vector is close to the input. One of the technical contributions of this research is to provide new, cryptographic uses of mathematical tools from complexity theory known as randomness extractors.Sharing and maintaining long, random keys is one of the central problems in cryptography. This thesis provides about ensuring the security of a cryptographic key when part...
This article is motivated by the classical results from Shannon that put the simple and elegant one-...
Viewed through the lens of information-theoretic cryptography, almost all nontrivial two-party secur...
We put forward a general model intended for assessment of system security against passive eavesdropp...
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denn...
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denn...
We consider problems where n people are communicating and a random subset of them is trying to leak ...
AbstractWe consider the problem of computing with encrypted data. Player A wishes to know the value ...
Constructing advanced cryptographic applications often requires the ability of privately embedding m...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
A recent trend in cryptography is to formally show the leakage resilience of cryptographic implement...
Leakage-resilient cryptography builds systems that withstand partial adversary knowledge of secret s...
In recent years, leakage-resilient cryptography---the design of cryptographic protocols resilient to...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
It has long been known that cryptographic schemes offering provably unbreakable security exist - nam...
This article is motivated by the classical results from Shannon that put the simple and elegant one-...
Viewed through the lens of information-theoretic cryptography, almost all nontrivial two-party secur...
We put forward a general model intended for assessment of system security against passive eavesdropp...
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denn...
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denn...
We consider problems where n people are communicating and a random subset of them is trying to leak ...
AbstractWe consider the problem of computing with encrypted data. Player A wishes to know the value ...
Constructing advanced cryptographic applications often requires the ability of privately embedding m...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
A recent trend in cryptography is to formally show the leakage resilience of cryptographic implement...
Leakage-resilient cryptography builds systems that withstand partial adversary knowledge of secret s...
In recent years, leakage-resilient cryptography---the design of cryptographic protocols resilient to...
Abstract—While information-theoretic security is stronger than computational security, it has long b...
It has long been known that cryptographic schemes offering provably unbreakable security exist - nam...
This article is motivated by the classical results from Shannon that put the simple and elegant one-...
Viewed through the lens of information-theoretic cryptography, almost all nontrivial two-party secur...
We put forward a general model intended for assessment of system security against passive eavesdropp...