Login / Signup
A Counterexample to the Chain Rule for Conditional HILL Entropy - And What Deniable Encryption Has to Do with It.
Stephan Krenn
Krzysztof Pietrzak
Akshay Wadia
Published in:
TCC (2013)
Keyphrases
</>
authentication protocol
security analysis
secret key
information theoretic
information theory
classification rules
smart card
encryption algorithms
association rules
model checking
mutual information
encryption algorithm
image encryption
public key
cost effective
intrusion detection
lightweight