Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference24 articles.
1. Agrikola T., Couteau G., Ishai Y., Jarecki S., Sahai A.: On pseudorandom encodings. In: Theory of Cryptography Conference, pp. 639–669. Springer, Cham (2020).
2. Billingsley P.: Ergodic Theory and Information. Wiley, Hoboken (1965).
3. Calmon F.D.: Information-theoretic metrics for security and privacy (Doctoral dissertation, Massachusetts Institute of Technology) (2015).
4. Cover T.M., Thomas J.A.: Elements of information theory. Wiley, New York (2006).
5. Dodis Y., Smith A.: Entropic security and the encryption of high entropy messages. In: Theory of Cryptography Conference, pp. 556–577. Springer, Berlin (2005).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献