-
1Academic Journal
المؤلفون: Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Maciej Obremski
المساهمون: The Pennsylvania State University CiteSeerX Archives
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.697.3743; http://cs.nyu.edu/%7Edodis/ps/nm5part.pdf
-
2Academic Journal
المؤلفون: Divesh Aggarwal, Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: http://eprint.iacr.org/2014/807.pdf.
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.689.5386; http://eprint.iacr.org/2014/807.pdf
-
3Academic Journal
المؤلفون: Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: http://eprint.iacr.org/2013/498.pdf.
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.371.9615; http://eprint.iacr.org/2013/498.pdf
-
4
المؤلفون: Tomasz Kazana, Maciej Zdanowicz, Stefan Dziembowski
المصدر: Information Processing Letters. 134:62-66
مصطلحات موضوعية: Conditional entropy, Discrete mathematics, Min entropy, Data_CODINGANDINFORMATIONTHEORY, 0102 computer and information sciences, Information theory, 01 natural sciences, Computer Science Applications, Theoretical Computer Science, 010201 computation theory & mathematics, Signal Processing, Entropy (information theory), Information Systems, Mathematics
-
5Academic Journal
المؤلفون: Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: https://eprint.iacr.org/2011/530.pdf.
وصف الملف: application/pdf
-
6Academic Journal
المؤلفون: Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: https://eprint.iacr.org/2010/541.pdf.
وصف الملف: application/pdf
-
7
المؤلفون: Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
المصدر: 2018 IEEE International Symposium on Information Theory (ISIT)
ISIT
Aggarwal, D, Kazana, T & Obremski, M 2018, Leakage-Resilient Algebraic Manipulation Detection Codes with Optimal Parameters . in 2018 IEEE International Symposium on Information Theory, ISIT 2018 . vol. 2018-June, 8437762, IEEE, pp. 1131-1135, 2018 IEEE International Symposium on Information Theory, ISIT 2018, Vail, United States, 17/06/2018 . https://doi.org/10.1109/ISIT.2018.8437762مصطلحات موضوعية: Discrete mathematics, Computer science, Code word, Algebraic manipulation, 0102 computer and information sciences, 02 engineering and technology, Code rate, Adversary, 01 natural sciences, 010201 computation theory & mathematics, 020204 information systems, Bounded function, 0202 electrical engineering, electronic engineering, information engineering, Message authentication code
-
8
المؤلفون: Varun Raj, Luisa Siniscalchi, Tomasz Kazana, Ivan Damgård, Maciej Obremski
المساهمون: Beimel, Amos, Dziembowski, Stefan
المصدر: Damgård, I, Kazana, T, Obremski, M, Raj, V & Siniscalchi, L 2018, Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments . in A Beimel & S Dziembowski (eds), Theory of Cryptography . vol. 11240, Springer VS, Cham, Lecture Notes in Computer Science (LNCS), no. 11240, pp. 225-254, Theory of Cryptography Conference, Goa, India, 11/11/2018 . https://doi.org/10.1007/978-3-030-03810-6_9
Theory of Cryptography ISBN: 9783030038090
TCC (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Theory of Cryptography
Theory of Cryptography-16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIمصطلحات موضوعية: Discrete mathematics, Computer science, Code word, Data_CODINGANDINFORMATIONTHEORY, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, GeneralLiterature_MISCELLANEOUS, 010201 computation theory & mathematics, Venturi effect, 0202 electrical engineering, electronic engineering, information engineering, Error correcting, 020201 artificial intelligence & image processing, Relaxation (approximation)
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::64e7a987535f6f054ed715f4d0e6b3d6
https://pure.au.dk/portal/da/publications/continuous-nmc-secure-against-permutations-and-overwrites-with-applications-to-cca-secure-commitments(5f759336-0a25-4eae-8da1-e15406756779).html -
9Conference
المؤلفون: Konrad Durnoga, Tomasz Kazana, Michal Zaja̧c, DZIEMBOWSKI, STEFAN
المساهمون: Konrad, Durnoga, Dziembowski, Stefan, Tomasz, Kazana, Michal, Zaja̧c
Relation: info:eu-repo/semantics/altIdentifier/isbn/9783319120867; info:eu-repo/semantics/altIdentifier/isbn/9783319120874; info:eu-repo/semantics/altIdentifier/wos/WOS:000345588100024; ispartofseries:Lecture Notes in Computer Science; ispartofbook:Information Security and Cryptology; 9th International Conference, Inscrypt 2013; volume:8567; firstpage:377; lastpage:394; numberofpages:18; http://hdl.handle.net/11573/767785; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-84909594378
-
10
المؤلفون: Tomasz KAZANA
المصدر: National Security Studies. 6:317-324
-
11Conference
المؤلفون: DZIEMBOWSKI, STEFAN, Tomasz Kazana, Maciej Obremski
المساهمون: Dziembowski, Stefan, Tomasz, Kazana, Maciej, Obremski
Relation: info:eu-repo/semantics/altIdentifier/isbn/9783642400834; info:eu-repo/semantics/altIdentifier/isbn/9783642400841; ispartofseries:Lecture Notes in Computer Science; ispartofbook:Advances in Cryptology – CRYPTO 2013; CRYPTO 2013; volume:8043; firstpage:239; lastpage:257; numberofpages:19; http://hdl.handle.net/11573/767783; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-84884475512
-
12
المؤلفون: Tomasz Kazana, Divesh Aggarwal, Maciej Obremski
المصدر: Theory of Cryptography (TCC 2017) Proceedings
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Theory of Cryptography
Theory of Cryptography ISBN: 9783319705026
TCC (2)مصطلحات موضوعية: Theoretical computer science, business.industry, Computer science, Message integrity, Cryptography, 0102 computer and information sciences, 02 engineering and technology, Coding theory, Object (computer science), 01 natural sciences, Intersection, 010201 computation theory & mathematics, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, business
-
13
المصدر: Information Security and Cryptology ISBN: 9783319547046
Inscryptمصطلحات موضوعية: TheoryofComputation_MISCELLANEOUS, Theoretical computer science, Computer science, Universal hashing, business.industry, Bounded function, Cryptography, Adversary, Merkle tree, business, Random oracle
-
14
المؤلفون: Maciej Obremski, Tomasz Kazana, Yevgeniy Dodis, Divesh Aggarwal
المصدر: STOC
مصطلحات موضوعية: Theoretical computer science, business.industry, Open problem, Code word, Cryptography, Data_CODINGANDINFORMATIONTHEORY, Construct (python library), Coding theory, Constant (computer programming), Code (cryptography), Non-malleable codes, business, Mathematics, Simple (philosophy)
-
15
المؤلفون: Divesh Aggarwal, Tomasz Kazana, Maciej Obremski, Stefan Dziembowski
المساهمون: Dodis, Yevgeniy, Nielsen, Jesper Buus
المصدر: Theory of Cryptography ISBN: 9783662464939
TCC (1)مصطلحات موضوعية: Theoretical computer science, business.industry, Computer science, leakage, Cryptography, Adversary, Computer security, computer.software_genre, Secret sharing, tampering, Random oracle, Cryptosystem, Non malleable codes, business, computer, Leakage (electronics)
-
16
المصدر: One-time Programs with Limited Memory.
-
17
المؤلفون: Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
المصدر: Key-Evolution Schemes Resilient to Space-Bounded Leakage..
-
18
المؤلفون: Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
المصدر: One-Time Computable Self-erasing Functions..
-
19
المؤلفون: Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
المصدر: Theory of Cryptography ISBN: 9783642195709
TCCمصطلحات موضوعية: Pseudorandom function family, Password, Theoretical computer science, Computer science, business.industry, Hash function, Key (cryptography), Cryptography, Security of cryptographic hash functions, Communication complexity, business, Random oracle