Search dblp for Publications

export results for "stream:streams/conf/icits:"

 download as .bib file

@inproceedings{DBLP:conf/icits/0001S20,
  author       = {Gil Segev and
                  Ido Shahaf},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {Hardness vs. (Very Little) Structure in Cryptography: {A} Multi-Prover
                  Interactive Proofs Perspective},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {10:1--10:23},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.10},
  doi          = {10.4230/LIPICS.ITC.2020.10},
  timestamp    = {Thu, 04 Jun 2020 17:19:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/0001S20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/AsharovKLPS20,
  author       = {Gilad Asharov and
                  Ilan Komargodski and
                  Wei{-}Kai Lin and
                  Enoch Peserico and
                  Elaine Shi},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {Oblivious Parallel Tight Compaction},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {11:1--11:23},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.11},
  doi          = {10.4230/LIPICS.ITC.2020.11},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/AsharovKLPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BalcerC20,
  author       = {Victor Balcer and
                  Albert Cheu},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {Separating Local {\&} Shuffled Differential Privacy via Histograms},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {1:1--1:14},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.1},
  doi          = {10.4230/LIPICS.ITC.2020.1},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BalcerC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BeimelKNSS20,
  author       = {Amos Beimel and
                  Aleksandra Korolova and
                  Kobbi Nissim and
                  Or Sheffet and
                  Uri Stemmer},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {The Power of Synergy in Differential Privacy: Combining a Small Curator
                  with Local Randomizers},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {14:1--14:25},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.14},
  doi          = {10.4230/LIPICS.ITC.2020.14},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BeimelKNSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BlockiKZ20,
  author       = {Jeremiah Blocki and
                  Shubhang Kulkarni and
                  Samson Zhou},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {On Locally Decodable Codes in Resource Bounded Channels},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {16:1--16:23},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.16},
  doi          = {10.4230/LIPICS.ITC.2020.16},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BlockiKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/ChungLQ20,
  author       = {Kai{-}Min Chung and
                  Tai{-}Ning Liao and
                  Luowen Qian},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {Lower Bounds for Function Inversion with Quantum Advice},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {8:1--8:15},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.8},
  doi          = {10.4230/LIPICS.ITC.2020.8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/ChungLQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CrepeauMSSY20,
  author       = {Claude Cr{\'{e}}peau and
                  Arnaud Massenet and
                  Louis Salvail and
                  Lucas Shigeru Stinchcombe and
                  Nan Yang},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {Practical Relativistic Zero-Knowledge for {NP}},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {4:1--4:18},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.4},
  doi          = {10.4230/LIPICS.ITC.2020.4},
  timestamp    = {Mon, 29 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/CrepeauMSSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/EeriksonKOPP020,
  author       = {Hendrik Eerikson and
                  Marcel Keller and
                  Claudio Orlandi and
                  Pille Pullonen and
                  Joonas Puura and
                  Mark Simkin},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {Use Your Brain! Arithmetic 3PC for Any Modulus with Active Security},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {5:1--5:24},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.5},
  doi          = {10.4230/LIPICS.ITC.2020.5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/EeriksonKOPP020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/EriguchiK20,
  author       = {Reo Eriguchi and
                  Noboru Kunihiro},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {d-Multiplicative Secret Sharing for Multipartite Adversary Structures},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {2:1--2:16},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.2},
  doi          = {10.4230/LIPICS.ITC.2020.2},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/EriguchiK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/GhaziGKMPV20,
  author       = {Badih Ghazi and
                  Noah Golowich and
                  Ravi Kumar and
                  Pasin Manurangsi and
                  Rasmus Pagh and
                  Ameya Velingker},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {Pure Differentially Private Summation from Anonymous Messages},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {15:1--15:23},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.15},
  doi          = {10.4230/LIPICS.ITC.2020.15},
  timestamp    = {Sat, 15 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/GhaziGKMPV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/HirtM20,
  author       = {Martin Hirt and
                  Marta Mularczyk},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {Efficient {MPC} with a Mixed Adversary},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {3:1--3:23},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.3},
  doi          = {10.4230/LIPICS.ITC.2020.3},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/HirtM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/LinCGSW20,
  author       = {Fuchun Lin and
                  Mahdi Cheraghchi and
                  Venkatesan Guruswami and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {Leakage-Resilient Secret Sharing in Non-Compartmentalized Models},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {7:1--7:24},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.7},
  doi          = {10.4230/LIPICS.ITC.2020.7},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/LinCGSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/NaorR020,
  author       = {Moni Naor and
                  Lior Rotem and
                  Gil Segev},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {Out-Of-Band Authenticated Group Key Exchange: From Strong Authentication
                  to Immediate Key Delivery},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {9:1--9:25},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.9},
  doi          = {10.4230/LIPICS.ITC.2020.9},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/NaorR020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Paskin-Cherniavsky20,
  author       = {Anat Paskin{-}Cherniavsky and
                  Artiom Radune},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {On Polynomial Secret Sharing Schemes},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {12:1--12:21},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.12},
  doi          = {10.4230/LIPICS.ITC.2020.12},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Paskin-Cherniavsky20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/PeterTW20,
  author       = {Naty Peter and
                  Rotem Tsabary and
                  Hoeteck Wee},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {One-One Constrained Pseudorandom Functions},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {13:1--13:22},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.13},
  doi          = {10.4230/LIPICS.ITC.2020.13},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/PeterTW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/RasmussenS20,
  author       = {Peter Michael Reichstein Rasmussen and
                  Amit Sahai},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {Expander Graphs Are Non-Malleable Codes},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {6:1--6:10},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.6},
  doi          = {10.4230/LIPICS.ITC.2020.6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/RasmussenS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/X20,
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {Front Matter, Table of Contents, Preface, Conference Organization},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {0:1--0:14},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.0},
  doi          = {10.4230/LIPICS.ITC.2020.0},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/X20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2020,
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://www.dagstuhl.de/dagpub/978-3-95977-151-1},
  isbn         = {978-3-95977-151-1},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/AgarwalCF17,
  author       = {Gaurav Kumar Agarwal and
                  Martina Cardone and
                  Christina Fragouli},
  editor       = {Junji Shikata},
  title        = {Secure Network Coding for Multiple Unicast: On the Case of Single
                  Source},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {188--207},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_11},
  doi          = {10.1007/978-3-319-72089-0\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/AgarwalCF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/ChoudhuryPR17,
  author       = {Ashish Choudhury and
                  Arpita Patra and
                  Divya Ravi},
  editor       = {Junji Shikata},
  title        = {Round and Communication Efficient Unconditionally-Secure {MPC} with
                  t t n / 3 in Partially Synchronous Network},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {83--109},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_6},
  doi          = {10.1007/978-3-319-72089-0\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/ChoudhuryPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CramerDDGX17,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Nico D{\"{o}}ttling and
                  Irene Giacomelli and
                  Chaoping Xing},
  editor       = {Junji Shikata},
  title        = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering
                  Model},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_1},
  doi          = {10.1007/978-3-319-72089-0\_1},
  timestamp    = {Tue, 28 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/CramerDDGX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CunninghamFY17,
  author       = {Robert K. Cunningham and
                  Benjamin Fuller and
                  Sophia Yakoubov},
  editor       = {Junji Shikata},
  title        = {Catching {MPC} Cheaters: Identification and Openability},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {110--134},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_7},
  doi          = {10.1007/978-3-319-72089-0\_7},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/CunninghamFY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DuttaA17,
  author       = {Sabyasachi Dutta and
                  Avishek Adhikari},
  editor       = {Junji Shikata},
  title        = {Contrast Optimal {XOR} Based Visual Cryptographic Schemes},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {58--72},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_4},
  doi          = {10.1007/978-3-319-72089-0\_4},
  timestamp    = {Tue, 28 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/DuttaA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/HashimotoSNIH17,
  author       = {Yuji Hashimoto and
                  Kazumasa Shinagawa and
                  Koji Nuida and
                  Masaki Inamura and
                  Goichiro Hanaoka},
  editor       = {Junji Shikata},
  title        = {Secure Grouping Protocol Using a Deck of Cards},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {135--152},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_8},
  doi          = {10.1007/978-3-319-72089-0\_8},
  timestamp    = {Tue, 28 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/HashimotoSNIH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KatoOH17,
  author       = {Go Kato and
                  Masaki Owari and
                  Masahito Hayashi},
  editor       = {Junji Shikata},
  title        = {Single-Shot Secure Quantum Network Coding for General Multiple Unicast
                  Network with Free Public Communication},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {166--187},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_10},
  doi          = {10.1007/978-3-319-72089-0\_10},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KatoOH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/MalinowskiZ17,
  author       = {Daniel Malinowski and
                  Karol Zebrowski},
  editor       = {Junji Shikata},
  title        = {Disproving the Conjectures from "On the Complexity of Scrypt and Proofs
                  of Space in the Parallel Random Oracle Model"},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {26--38},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_2},
  doi          = {10.1007/978-3-319-72089-0\_2},
  timestamp    = {Tue, 28 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/MalinowskiZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/NakaiSIO17,
  author       = {Takeshi Nakai and
                  Satoshi Shirouchi and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  editor       = {Junji Shikata},
  title        = {Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol
                  Utilizing Private Permutations},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {153--165},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_9},
  doi          = {10.1007/978-3-319-72089-0\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/NakaiSIO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Watanabe17,
  author       = {Yohei Watanabe},
  editor       = {Junji Shikata},
  title        = {Broadcast Encryption with Guessing Secrecy},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {39--57},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_3},
  doi          = {10.1007/978-3-319-72089-0\_3},
  timestamp    = {Mon, 18 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/Watanabe17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/YoshidaO17,
  author       = {Maki Yoshida and
                  Satoshi Obana},
  editor       = {Junji Shikata},
  title        = {Verifiably Multiplicative Secret Sharing},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {73--82},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_5},
  doi          = {10.1007/978-3-319-72089-0\_5},
  timestamp    = {Tue, 28 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/YoshidaO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/YuT17,
  author       = {Lei Yu and
                  Vincent Y. F. Tan},
  editor       = {Junji Shikata},
  title        = {R{\'{e}}nyi Resolvability and Its Applications to the Wiretap
                  Channel},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {208--233},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_12},
  doi          = {10.1007/978-3-319-72089-0\_12},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/YuT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2017,
  editor       = {Junji Shikata},
  title        = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0},
  doi          = {10.1007/978-3-319-72089-0},
  isbn         = {978-3-319-72088-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/0001HS16,
  author       = {Yohei Watanabe and
                  Goichiro Hanaoka and
                  Junji Shikata},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction,
                  and Robustness},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {213--237},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_11},
  doi          = {10.1007/978-3-319-49175-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/0001HS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/AdhikariMORSX16,
  author       = {Avishek Adhikari and
                  Kirill Morozov and
                  Satoshi Obana and
                  Partha Sarathi Roy and
                  Kouichi Sakurai and
                  Rui Xu},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Efficient Threshold Secret Sharing Schemes Secure Against Rushing
                  Cheaters},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {3--23},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_1},
  doi          = {10.1007/978-3-319-49175-2\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/AdhikariMORSX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/AlagicBFGSJ16,
  author       = {Gorjan Alagic and
                  Anne Broadbent and
                  Bill Fefferman and
                  Tommaso Gagliardoni and
                  Christian Schaffner and
                  Michael St. Jules},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Computational Security of Quantum Encryption},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {47--71},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_3},
  doi          = {10.1007/978-3-319-49175-2\_3},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/AlagicBFGSJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/AsoodehAL16,
  author       = {Shahab Asoodeh and
                  Fady Alajaji and
                  Tam{\'{a}}s Linder},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Almost Perfect Privacy for Additive Gaussian Privacy Filters},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {259--278},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_13},
  doi          = {10.1007/978-3-319-49175-2\_13},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/AsoodehAL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BroadbentW16,
  author       = {Anne Broadbent and
                  Evelyn Wainewright},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Efficient Simulation for Quantum Message Authentication},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {72--91},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_4},
  doi          = {10.1007/978-3-319-49175-2\_4},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BroadbentW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DArcoPD16,
  author       = {Paolo D'Arco and
                  Roberto De Prisco and
                  Yvo Desmedt},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Private Visual Share-Homomorphic Computation and Randomness Reduction
                  in Visual Cryptography},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {95--113},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_5},
  doi          = {10.1007/978-3-319-49175-2\_5},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DArcoPD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KarabinaR16,
  author       = {Koray Karabina and
                  Angela Robinson},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Revisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic
                  Schemes},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {114--125},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_6},
  doi          = {10.1007/978-3-319-49175-2\_6},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KarabinaR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/LinSW16,
  author       = {Fuchun Lin and
                  Reihaneh Safavi{-}Naini and
                  Pengwei Wang},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Detecting Algebraic Manipulation in Leaky Storage Systems},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {129--150},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_7},
  doi          = {10.1007/978-3-319-49175-2\_7},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/LinSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/ParenteG16,
  author       = {Vladimir P. Parente and
                  Jeroen van de Graaf},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {A Practical Fuzzy Extractor for Continuous Features},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {241--258},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_12},
  doi          = {10.1007/978-3-319-49175-2\_12},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/ParenteG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/RanellucciTZ16,
  author       = {Samuel Ranellucci and
                  Alain Tapp and
                  Rasmus Winther Zakarias},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Efficient Generic Zero-Knowledge Proofs from Commitments (Extended
                  Abstract)},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {190--212},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_10},
  doi          = {10.1007/978-3-319-49175-2\_10},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/RanellucciTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Skorski16,
  author       = {Maciej Sk{\'{o}}rski},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {A Better Chain Rule for {HILL} Pseudoentropy - Beyond Bounded Leakage},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {279--299},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_14},
  doi          = {10.1007/978-3-319-49175-2\_14},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Skorski16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/SpiniF16,
  author       = {Gabriele Spini and
                  Serge Fehr},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Cheater Detection in {SPDZ} Multiparty Computation},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {151--176},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_8},
  doi          = {10.1007/978-3-319-49175-2\_8},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/SpiniF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/TraversoDB16,
  author       = {Giulia Traverso and
                  Denise Demirel and
                  Johannes Buchmann},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Dynamic and Verifiable Hierarchical Secret Sharing},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {24--43},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_2},
  doi          = {10.1007/978-3-319-49175-2\_2},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/TraversoDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Yasunaga16,
  author       = {Kenji Yasunaga},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Error-Correcting Codes Against Chosen-Codeword Attacks},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {177--189},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_9},
  doi          = {10.1007/978-3-319-49175-2\_9},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Yasunaga16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2016,
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2},
  doi          = {10.1007/978-3-319-49175-2},
  isbn         = {978-3-319-49174-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DahabGM15,
  author       = {Ricardo Dahab and
                  Steven D. Galbraith and
                  Eduardo Morais},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption
                  Schemes},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {283--296},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_17},
  doi          = {10.1007/978-3-319-17470-9\_17},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DahabGM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DamgardDN15,
  author       = {Ivan Damg{\aa}rd and
                  Fr{\'{e}}d{\'{e}}ric Dupuis and
                  Jesper Buus Nielsen},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {On the Orthogonal Vector Problem and the Feasibility of Unconditionally
                  Secure Leakage-Resilient Computation},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {87--104},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_6},
  doi          = {10.1007/978-3-319-17470-9\_6},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/DamgardDN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DamgardFMV15,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {The Chaining Lemma and Its Application},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {181--196},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_11},
  doi          = {10.1007/978-3-319-17470-9\_11},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DamgardFMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DavidNRT15,
  author       = {Bernardo Machado David and
                  Ryo Nishimaki and
                  Samuel Ranellucci and
                  Alain Tapp},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Generalizing Efficient Multiparty Computation},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {15--32},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_2},
  doi          = {10.1007/978-3-319-17470-9\_2},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DavidNRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DemayGMT15,
  author       = {Gr{\'{e}}gory Demay and
                  Peter Gazi and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Query-Complexity Amplification for Random Oracles},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {159--180},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_10},
  doi          = {10.1007/978-3-319-17470-9\_10},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DemayGMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Ding15,
  author       = {Ning Ding},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction
                  from Differing-Input Obfuscation for Circuits},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {51--68},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_4},
  doi          = {10.1007/978-3-319-17470-9\_4},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/Ding15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DowsleyMN15,
  author       = {Rafael Dowsley and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Tobias Nilges},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {197--213},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_12},
  doi          = {10.1007/978-3-319-17470-9\_12},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DowsleyMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/FullerH15,
  author       = {Benjamin Fuller and
                  Ariel Hamlin},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {69--86},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_5},
  doi          = {10.1007/978-3-319-17470-9\_5},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/FullerH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/GalbraithS15,
  author       = {Steven D. Galbraith and
                  Barak Shani},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {The Multivariate Hidden Number Problem},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {250--268},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_15},
  doi          = {10.1007/978-3-319-17470-9\_15},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/GalbraithS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/HajiabadiK15,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Gambling, Computational Information and Encryption Security},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {141--158},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_9},
  doi          = {10.1007/978-3-319-17470-9\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/HajiabadiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KishoreKVK15,
  author       = {Ravi Kishore and
                  Ashutosh Kumar and
                  Chiranjeevi Vanarasa and
                  Kannan Srinathan},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Round-Optimal Perfectly Secret Message Transmission with Linear Communication
                  Complexity},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {33--50},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_3},
  doi          = {10.1007/978-3-319-17470-9\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/KishoreKVK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/MarkhamM15,
  author       = {Damian Markham and
                  Anne Marin},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Practical Sharing of Quantum Secrets over Untrusted Channels},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_1},
  doi          = {10.1007/978-3-319-17470-9\_1},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/MarkhamM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/OstrovskyP15,
  author       = {Rafail Ostrovsky and
                  Anat Paskin{-}Cherniavsky},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Locally Decodable Codes for Edit Distance},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {236--249},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_14},
  doi          = {10.1007/978-3-319-17470-9\_14},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/OstrovskyP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Skorski15,
  author       = {Maciej Skorski},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Metric Pseudoentropy: Characterizations, Transformations and Applications},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {105--122},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_7},
  doi          = {10.1007/978-3-319-17470-9\_7},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Skorski15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Skorski15a,
  author       = {Maciej Skorski},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas:
                  New Proofs and Applications to Pseudoentropy},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {123--140},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_8},
  doi          = {10.1007/978-3-319-17470-9\_8},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Skorski15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Walter15,
  author       = {Michael Walter},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Lattice Point Enumeration on Block Reduced Bases},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {269--282},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_16},
  doi          = {10.1007/978-3-319-17470-9\_16},
  timestamp    = {Thu, 29 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/Walter15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/WangS15,
  author       = {Pengwei Wang and
                  Reihaneh Safavi{-}Naini},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Limited View Adversary Codes: Bounds, Constructions and Applications},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {214--235},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_13},
  doi          = {10.1007/978-3-319-17470-9\_13},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/WangS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2015,
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9},
  doi          = {10.1007/978-3-319-17470-9},
  isbn         = {978-3-319-17469-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2013,
  editor       = {Carles Padr{\'{o}}},
  title        = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04268-8},
  doi          = {10.1007/978-3-319-04268-8},
  isbn         = {978-3-319-04267-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/AhmadiS13,
  author       = {Hadi Ahmadi and
                  Reihaneh Safavi{-}Naini},
  editor       = {Carles Padr{\'{o}}},
  title        = {Detection of Algebraic Manipulation in the Presence of Leakage},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {238--258},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_14},
  doi          = {10.1007/978-3-319-04268-8\_14},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/AhmadiS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DArcoP13,
  author       = {Paolo D'Arco and
                  Roberto De Prisco},
  editor       = {Carles Padr{\'{o}}},
  title        = {Secure Two-Party Computation: {A} Visual Way},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {18--38},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_2},
  doi          = {10.1007/978-3-319-04268-8\_2},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DArcoP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DArcoPS13,
  author       = {Paolo D'Arco and
                  Roberto De Prisco and
                  Alfredo De Santis},
  editor       = {Carles Padr{\'{o}}},
  title        = {Measure-Independent Characterization of Contrast Optimal Visual Cryptography
                  Schemes},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {39--55},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_3},
  doi          = {10.1007/978-3-319-04268-8\_3},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DArcoPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DamgardFNS13,
  author       = {Ivan Damg{\aa}rd and
                  Jakob Funder and
                  Jesper Buus Nielsen and
                  Louis Salvail},
  editor       = {Carles Padr{\'{o}}},
  title        = {Superposition Attacks on Cryptographic Protocols},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {142--161},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_9},
  doi          = {10.1007/978-3-319-04268-8\_9},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/DamgardFNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/GarayGOR13,
  author       = {Juan A. Garay and
                  Clint Givens and
                  Rafail Ostrovsky and
                  Pavel Raykov},
  editor       = {Carles Padr{\'{o}}},
  title        = {Broadcast (and Round) Efficient Verifiable Secret Sharing},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {200--219},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_12},
  doi          = {10.1007/978-3-319-04268-8\_12},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/GarayGOR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/GirnykGVRS13,
  author       = {Maksym A. Girnyk and
                  Frederic Gabry and
                  Mikko Vehkaper{\"{a}} and
                  Lars K. Rasmussen and
                  Mikael Skoglund},
  editor       = {Carles Padr{\'{o}}},
  title        = {On the Transmit Beamforming for {MIMO} Wiretap Channels: Large-System
                  Analysis},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {90--102},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_6},
  doi          = {10.1007/978-3-319-04268-8\_6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/GirnykGVRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/GuoLWRW13,
  author       = {Teng Guo and
                  Feng Liu and
                  Chuan Kun Wu and
                  YaWei Ren and
                  Wen Wang},
  editor       = {Carles Padr{\'{o}}},
  title        = {On (k, n) Visual Cryptography Scheme with t Essential Parties},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {56--68},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_4},
  doi          = {10.1007/978-3-319-04268-8\_4},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/GuoLWRW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/IwamotoS13,
  author       = {Mitsugu Iwamoto and
                  Junji Shikata},
  editor       = {Carles Padr{\'{o}}},
  title        = {Information Theoretic Security for Encryption Based on Conditional
                  R{\'{e}}nyi Entropies},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {103--121},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_7},
  doi          = {10.1007/978-3-319-04268-8\_7},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/IwamotoS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/JastrzebskiD13,
  author       = {Michal Jastrzebski and
                  Stefan Dziembowski},
  editor       = {Carles Padr{\'{o}}},
  title        = {Leakage Resilience of the Blom's Key Distribution Scheme},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {220--237},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_13},
  doi          = {10.1007/978-3-319-04268-8\_13},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/JastrzebskiD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KerenidisLX13,
  author       = {Iordanis Kerenidis and
                  Mathieu Lauri{\`{e}}re and
                  David Xiao},
  editor       = {Carles Padr{\'{o}}},
  title        = {New Lower Bounds for Privacy in Communication Protocols},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {69--89},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_5},
  doi          = {10.1007/978-3-319-04268-8\_5},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KerenidisLX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KurosawaOK13,
  author       = {Kaoru Kurosawa and
                  Hiroyuki Ohta and
                  Kenji Kakuta},
  editor       = {Carles Padr{\'{o}}},
  title        = {How to Construct Strongly Secure Network Coding Scheme},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_1},
  doi          = {10.1007/978-3-319-04268-8\_1},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KurosawaOK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/McKagueS13,
  author       = {Matthew McKague and
                  Lana Sheridan},
  editor       = {Carles Padr{\'{o}}},
  title        = {Insider-Proof Encryption with Applications for Quantum Key Distribution},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {122--141},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_8},
  doi          = {10.1007/978-3-319-04268-8\_8},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/McKagueS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Skorski13,
  author       = {Maciej Skorski},
  editor       = {Carles Padr{\'{o}}},
  title        = {Modulus Computational Entropy},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {179--199},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_11},
  doi          = {10.1007/978-3-319-04268-8\_11},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Skorski13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/YaoL13,
  author       = {Yanqing Yao and
                  Zhoujun Li},
  editor       = {Carles Padr{\'{o}}},
  title        = {Overcoming Weak Expectations via the R{\'{e}}nyi Entropy and
                  the Expanded Computational Entropy},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {162--178},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_10},
  doi          = {10.1007/978-3-319-04268-8\_10},
  timestamp    = {Thu, 05 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/YaoL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/AlimomeniS12,
  author       = {Mohsen Alimomeni and
                  Reihaneh Safavi{-}Naini},
  editor       = {Adam D. Smith},
  title        = {Guessing Secrecy},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_1},
  doi          = {10.1007/978-3-642-32284-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/AlimomeniS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BroadbentJRT12,
  author       = {Anne Broadbent and
                  Stacey Jeffery and
                  Samuel Ranellucci and
                  Alain Tapp},
  editor       = {Adam D. Smith},
  title        = {Trading Robustness for Correctness and Privacy in Certain Multiparty
                  Computations, beyond an Honest Majority},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {14--36},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_2},
  doi          = {10.1007/978-3-642-32284-6\_2},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BroadbentJRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CanettiRR12,
  author       = {Ran Canetti and
                  Ben Riva and
                  Guy N. Rothblum},
  editor       = {Adam D. Smith},
  title        = {Two Protocols for Delegation of Computation},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {37--61},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_3},
  doi          = {10.1007/978-3-642-32284-6\_3},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/CanettiRR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CramerDP12,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Valerio Pastro},
  editor       = {Adam D. Smith},
  title        = {On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative
                  Relations},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {62--79},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_4},
  doi          = {10.1007/978-3-642-32284-6\_4},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/CramerDP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DavidNM12,
  author       = {Bernardo Machado David and
                  Anderson C. A. Nascimento and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  editor       = {Adam D. Smith},
  title        = {Universally Composable Oblivious Transfer from Lossy Encryption and
                  the McEliece Assumptions},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {80--99},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_5},
  doi          = {10.1007/978-3-642-32284-6\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DavidNM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Dodis12,
  author       = {Yevgeniy Dodis},
  editor       = {Adam D. Smith},
  title        = {Shannon Impossibility, Revisited},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {100--110},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_6},
  doi          = {10.1007/978-3-642-32284-6\_6},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Dodis12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DottlingKM12,
  author       = {Nico D{\"{o}}ttling and
                  Daniel Kraschewski and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  editor       = {Adam D. Smith},
  title        = {Statistically Secure Linear-Rate Dimension Extension for Oblivious
                  Affine Function Evaluation},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {111--128},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_7},
  doi          = {10.1007/978-3-642-32284-6\_7},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DottlingKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/HirtLMR12,
  author       = {Martin Hirt and
                  Christoph Lucas and
                  Ueli Maurer and
                  Dominik Raub},
  editor       = {Adam D. Smith},
  title        = {Passive Corruption in Statistical Multi-Party Computation - (Extended
                  Abstract)},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {129--146},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_8},
  doi          = {10.1007/978-3-642-32284-6\_8},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/HirtLMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KellerMR12,
  author       = {Marcel Keller and
                  Gert L{\ae}ss{\o}e Mikkelsen and
                  Andy Rupp},
  editor       = {Adam D. Smith},
  title        = {Efficient Threshold Zero-Knowledge with Applications to User-Centric
                  Protocols},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {147--166},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_9},
  doi          = {10.1007/978-3-642-32284-6\_9},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KellerMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/WatanabeSS12,
  author       = {Yohei Watanabe and
                  Takenobu Seito and
                  Junji Shikata},
  editor       = {Adam D. Smith},
  title        = {Information-Theoretic Timed-Release Security: Key-Agreement, Encryption,
                  and Authentication Codes},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {167--186},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_10},
  doi          = {10.1007/978-3-642-32284-6\_10},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/WatanabeSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/YoshidaFF12,
  author       = {Maki Yoshida and
                  Toru Fujiwara and
                  Marc P. C. Fossorier},
  editor       = {Adam D. Smith},
  title        = {Optimum General Threshold Secret Sharing},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {187--204},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_11},
  doi          = {10.1007/978-3-642-32284-6\_11},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/YoshidaFF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2012,
  editor       = {Adam D. Smith},
  title        = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6},
  doi          = {10.1007/978-3-642-32284-6},
  isbn         = {978-3-642-32283-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/AhmadiS11,
  author       = {Hadi Ahmadi and
                  Reihaneh Safavi{-}Naini},
  editor       = {Serge Fehr},
  title        = {Common Randomness and Secret Key Capacities of Two-Way Channels},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {76--93},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_8},
  doi          = {10.1007/978-3-642-20728-0\_8},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/AhmadiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Applebaum11,
  author       = {Benny Applebaum},
  editor       = {Serge Fehr},
  title        = {Randomly Encoding Functions: {A} New Cryptographic Paradigm - (Invited
                  Talk)},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {25--31},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_3},
  doi          = {10.1007/978-3-642-20728-0\_3},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Applebaum11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BargK11,
  author       = {Alexander Barg and
                  Grigory Kabatiansky},
  editor       = {Serge Fehr},
  title        = {Digital Fingerprinting under and (Somewhat) beyond the Marking Assumption
                  - (Invited Talk)},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {202--205},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_18},
  doi          = {10.1007/978-3-642-20728-0\_18},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BargK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/ChoudhuryKP11,
  author       = {Ashish Choudhury and
                  Kaoru Kurosawa and
                  Arpita Patra},
  editor       = {Serge Fehr},
  title        = {The Round Complexity of Perfectly Secure General {VSS}},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {143--162},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_14},
  doi          = {10.1007/978-3-642-20728-0\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/ChoudhuryKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Csiszar11,
  author       = {Imre Csisz{\'{a}}r},
  editor       = {Serge Fehr},
  title        = {On Information Theoretic Security: Mathematical Models and Techniques
                  - (Invited Talk)},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {73--75},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_7},
  doi          = {10.1007/978-3-642-20728-0\_7},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Csiszar11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Damgard11,
  author       = {Ivan Damg{\aa}rd},
  editor       = {Serge Fehr},
  title        = {Quantum Communication Attacks on Classical Cryptographic Protocols
                  - (Invited Talk)},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {181},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_16},
  doi          = {10.1007/978-3-642-20728-0\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Damgard11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DottlingKM11,
  author       = {Nico D{\"{o}}ttling and
                  Daniel Kraschewski and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  editor       = {Serge Fehr},
  title        = {Efficient Reductions for Non-signaling Cryptographic Primitives},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {120--137},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_12},
  doi          = {10.1007/978-3-642-20728-0\_12},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DottlingKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/HirtLMR11,
  author       = {Martin Hirt and
                  Christoph Lucas and
                  Ueli Maurer and
                  Dominik Raub},
  editor       = {Serge Fehr},
  title        = {Graceful Degradation in Multi-Party Computation (Extended Abstract)},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {163--180},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_15},
  doi          = {10.1007/978-3-642-20728-0\_15},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/HirtLMR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Ishai11,
  author       = {Yuval Ishai},
  editor       = {Serge Fehr},
  title        = {Correlation Extractors and Their Applications - (Invited Talk)},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_1},
  doi          = {10.1007/978-3-642-20728-0\_1},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Ishai11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KawachiPT11,
  author       = {Akinori Kawachi and
                  Christopher Portmann and
                  Keisuke Tanaka},
  editor       = {Serge Fehr},
  title        = {Characterization of the Relations between Information-Theoretic Non-malleability,
                  Secrecy, and Authenticity},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {6--24},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_2},
  doi          = {10.1007/978-3-642-20728-0\_2},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KawachiPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/NayakAS11,
  author       = {Manan Nayak and
                  Shashank Agrawal and
                  Kannan Srinathan},
  editor       = {Serge Fehr},
  title        = {Minimal Connectivity for Unconditionally Secure Message Transmission
                  in Synchronous Directed Networks},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {32--51},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_4},
  doi          = {10.1007/978-3-642-20728-0\_4},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/NayakAS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/PatraR11,
  author       = {Arpita Patra and
                  C. Pandu Rangan},
  editor       = {Serge Fehr},
  title        = {Communication Optimal Multi-valued Asynchronous Byzantine Agreement
                  with Optimal Resilience},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {206--226},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_19},
  doi          = {10.1007/978-3-642-20728-0\_19},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/PatraR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/PriscoS11,
  author       = {Roberto De Prisco and
                  Alfredo De Santis},
  editor       = {Serge Fehr},
  title        = {Using Colors to Improve Visual Cryptography for Black and White Images},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {182--201},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_17},
  doi          = {10.1007/978-3-642-20728-0\_17},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/PriscoS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Renner11,
  author       = {Renato Renner},
  editor       = {Serge Fehr},
  title        = {Quantum-Resilient Randomness Extraction - (Invited Talk)},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {52--57},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_5},
  doi          = {10.1007/978-3-642-20728-0\_5},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Renner11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Reyzin11,
  author       = {Leonid Reyzin},
  editor       = {Serge Fehr},
  title        = {Some Notions of Entropy for Cryptography - (Invited Talk)},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {138--142},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_13},
  doi          = {10.1007/978-3-642-20728-0\_13},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Reyzin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Shokrollahi11,
  author       = {Amin Shokrollahi},
  editor       = {Serge Fehr},
  title        = {LT-Codes and Phase Transitions for Mutual Information - (Invited Talk)},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {94--99},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_9},
  doi          = {10.1007/978-3-642-20728-0\_9},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Shokrollahi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/SwansonS11,
  author       = {Colleen Swanson and
                  Douglas R. Stinson},
  editor       = {Serge Fehr},
  title        = {Unconditionally Secure Signature Schemes Revisited},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {100--116},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_10},
  doi          = {10.1007/978-3-642-20728-0\_10},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/SwansonS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/WangD11,
  author       = {Yongge Wang and
                  Yvo Desmedt},
  editor       = {Serge Fehr},
  title        = {Homogeneous Faults, Colored Edge Graphs, and Cover Free Families},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {58--72},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_6},
  doi          = {10.1007/978-3-642-20728-0\_6},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/WangD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Wolf11,
  author       = {Ronald de Wolf},
  editor       = {Serge Fehr},
  title        = {Bell Inequalities: What Do We Know about Them and Why Should Cryptographers
                  Care? - (Invited Talk)},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {117--119},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_11},
  doi          = {10.1007/978-3-642-20728-0\_11},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Wolf11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2011,
  editor       = {Serge Fehr},
  title        = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0},
  doi          = {10.1007/978-3-642-20728-0},
  isbn         = {978-3-642-20727-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2009,
  editor       = {Kaoru Kurosawa},
  title        = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14496-7},
  doi          = {10.1007/978-3-642-14496-7},
  isbn         = {978-3-642-14495-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/AlwenDW09,
  author       = {Jo{\"{e}}l Alwen and
                  Yevgeniy Dodis and
                  Daniel Wichs},
  editor       = {Kaoru Kurosawa},
  title        = {Survey: Leakage Resilience and the Bounded Retrieval Model},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_1},
  doi          = {10.1007/978-3-642-14496-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/AlwenDW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/ChenM09,
  author       = {Han Chen and
                  Pasquale Malacaria},
  editor       = {Kaoru Kurosawa},
  title        = {The Optimum Leakage Principle for Analyzing Multi-threaded Programs},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {177--193},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_15},
  doi          = {10.1007/978-3-642-14496-7\_15},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/ChenM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Dziembowski09,
  author       = {Stefan Dziembowski},
  editor       = {Kaoru Kurosawa},
  title        = {A Lower Bound on the Key Length of Information-Theoretic Forward-Secure
                  Storage Schemes},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {19--26},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_2},
  doi          = {10.1007/978-3-642-14496-7\_2},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Dziembowski09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/FarrasGMP09,
  author       = {Oriol Farr{\`{a}}s and
                  Ignacio Gracia and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Carles Padr{\'{o}}},
  editor       = {Kaoru Kurosawa},
  title        = {Linear Threshold Multisecret Sharing Schemes},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {110--126},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_9},
  doi          = {10.1007/978-3-642-14496-7\_9},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/FarrasGMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/FarrasMPV09,
  author       = {Oriol Farr{\`{a}}s and
                  Jessica Ruth Metcalf{-}Burton and
                  Carles Padr{\'{o}} and
                  Leonor V{\'{a}}zquez},
  editor       = {Kaoru Kurosawa},
  title        = {On the Optimization of Bipartite Secret Sharing Schemes},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {93--109},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_8},
  doi          = {10.1007/978-3-642-14496-7\_8},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/FarrasMPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/GaziM09,
  author       = {Peter Gazi and
                  Ueli Maurer},
  editor       = {Kaoru Kurosawa},
  title        = {Free-Start Distinguishing: Combining Two Types of Indistinguishability
                  Amplification},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {28--44},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_4},
  doi          = {10.1007/978-3-642-14496-7\_4},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/GaziM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Koashi09,
  author       = {Masato Koashi},
  editor       = {Kaoru Kurosawa},
  title        = {Security of Key Distribution and Complementarity in Quantum Mechanics},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {27},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_3},
  doi          = {10.1007/978-3-642-14496-7\_3},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Koashi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Kobara09,
  author       = {Kazukuni Kobara},
  editor       = {Kaoru Kurosawa},
  title        = {Code-Based Public-Key Cryptosystems and Their Applications},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {45--55},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_5},
  doi          = {10.1007/978-3-642-14496-7\_5},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Kobara09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/MuramatsuYD09,
  author       = {Jun Muramatsu and
                  Kazuyuki Yoshimura and
                  Peter Davis},
  editor       = {Kaoru Kurosawa},
  title        = {Information Theoretic Security Based on Bounded Observability},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {128--139},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_11},
  doi          = {10.1007/978-3-642-14496-7\_11},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/MuramatsuYD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Narayan09,
  author       = {Prakash Narayan},
  editor       = {Kaoru Kurosawa},
  title        = {Multiterminal Secrecy Generation and Tree Packing},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {127},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_10},
  doi          = {10.1007/978-3-642-14496-7\_10},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Narayan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Nuida09,
  author       = {Koji Nuida},
  editor       = {Kaoru Kurosawa},
  title        = {A General Conversion Method of Fingerprint Codes to (More) Robust
                  Fingerprint Codes against Bit Erasure},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {194--212},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_16},
  doi          = {10.1007/978-3-642-14496-7\_16},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Nuida09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/NuidaH09,
  author       = {Koji Nuida and
                  Goichiro Hanaoka},
  editor       = {Kaoru Kurosawa},
  title        = {On the Security of Pseudorandomized Information-Theoretically Secure
                  Schemes},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {56--73},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_6},
  doi          = {10.1007/978-3-642-14496-7\_6},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/NuidaH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/NuidaH09a,
  author       = {Koji Nuida and
                  Goichiro Hanaoka},
  editor       = {Kaoru Kurosawa},
  title        = {An Improvement of Pseudorandomization against Unbounded Attack Algorithms
                  - The Case of Fingerprint Codes},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {213--230},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_17},
  doi          = {10.1007/978-3-642-14496-7\_17},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/NuidaH09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/PatraCR09,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  editor       = {Kaoru Kurosawa},
  title        = {Efficient Statistical Asynchronous Verifiable Secret Sharing with
                  Optimal Resilience},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {74--92},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_7},
  doi          = {10.1007/978-3-642-14496-7\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/PatraCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/SendaK09,
  author       = {Kazuhiro Senda and
                  Masaki Kawamura},
  editor       = {Kaoru Kurosawa},
  title        = {Statistical-Mechanical Approach for Multiple Watermarks Using Spectrum
                  Spreading},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {231--247},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_18},
  doi          = {10.1007/978-3-642-14496-7\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/SendaK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Smith09,
  author       = {Adam D. Smith},
  editor       = {Kaoru Kurosawa},
  title        = {What Can Cryptography Do for Coding Theory?},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {158},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_13},
  doi          = {10.1007/978-3-642-14496-7\_13},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Smith09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/YangD09,
  author       = {Qiushi Yang and
                  Yvo Desmedt},
  editor       = {Kaoru Kurosawa},
  title        = {Cryptanalysis of Secure Message Transmission Protocols with Feedback},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {159--176},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_14},
  doi          = {10.1007/978-3-642-14496-7\_14},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/YangD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/ZaveruchaS09,
  author       = {Gregory M. Zaverucha and
                  Douglas R. Stinson},
  editor       = {Kaoru Kurosawa},
  title        = {Group Testing and Batch Verification},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {140--157},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_12},
  doi          = {10.1007/978-3-642-14496-7\_12},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/ZaveruchaS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2007,
  editor       = {Yvo Desmedt},
  title        = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10230-1},
  doi          = {10.1007/978-3-642-10230-1},
  isbn         = {978-3-642-10229-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Araki08,
  author       = {Toshinori Araki},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time
                  Message Decryption},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {2--13},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_2},
  doi          = {10.1007/978-3-540-85093-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Araki08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BaigneresV08,
  author       = {Thomas Baign{\`{e}}res and
                  Serge Vaudenay},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {The Complexity of Distinguishing Distributions (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {210--222},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_20},
  doi          = {10.1007/978-3-540-85093-9\_20},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BaigneresV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BarrosB08,
  author       = {Jo{\~{a}}o Barros and
                  Matthieu R. Bloch},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Strong Secrecy for Wireless Channels (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {40--53},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_5},
  doi          = {10.1007/978-3-540-85093-9\_5},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BarrosB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BealsS08,
  author       = {Travis R. Beals and
                  Barry C. Sanders},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Distributed Relay Protocol for Probabilistic Information-Theoretic
                  Security in a Randomly-Compromised Network},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {29--39},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_4},
  doi          = {10.1007/978-3-540-85093-9\_4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BealsS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BilletP08,
  author       = {Olivier Billet and
                  Duong Hieu Phan},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Efficient Traitor Tracing from Collusion Secure Codes},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {171--182},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_17},
  doi          = {10.1007/978-3-540-85093-9\_17},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BilletP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BlackburnEMP08,
  author       = {Simon R. Blackburn and
                  Tuvi Etzion and
                  Keith M. Martin and
                  Maura B. Paterson},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Efficient Key Predistribution for Grid-Based Wireless Sensor Networks},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {54--69},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_6},
  doi          = {10.1007/978-3-540-85093-9\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/BlackburnEMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BlackburnMPS08,
  author       = {Simon R. Blackburn and
                  Keith M. Martin and
                  Maura B. Paterson and
                  Douglas R. Stinson},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Key Refreshing in Wireless Sensor Networks},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_16},
  doi          = {10.1007/978-3-540-85093-9\_16},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/BlackburnMPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BlierT08,
  author       = {Hugue Blier and
                  Alain Tapp},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {A Single Initialization Server for Multi-party Cryptography},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {71--85},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_8},
  doi          = {10.1007/978-3-540-85093-9\_8},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BlierT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/ChoudharyPASR08,
  author       = {Ashish Choudhary and
                  Arpita Patra and
                  B. V. Ashwinkumar and
                  K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Perfectly Reliable and Secure Communication Tolerating Static and
                  Mobile Mixed Adversary},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {137--155},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_15},
  doi          = {10.1007/978-3-540-85093-9\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/ChoudharyPASR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Collins08,
  author       = {Michael J. Collins},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Upper Bounds for Set Systems with the Identifiable Parent Property},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {100--106},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_10},
  doi          = {10.1007/978-3-540-85093-9\_10},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Collins08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CrepeauKS08,
  author       = {Claude Cr{\'{e}}peau and
                  Joe Kilian and
                  George Savvides},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Interactive Hashing: An Information Theoretic Tool (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_3},
  doi          = {10.1007/978-3-540-85093-9\_3},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/CrepeauKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CrepeauW08,
  author       = {Claude Cr{\'{e}}peau and
                  J{\"{u}}rg Wullschleger},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Statistical Security Conditions for Two-Party Secure Function Evaluation},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {86--99},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_9},
  doi          = {10.1007/978-3-540-85093-9\_9},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/CrepeauW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DesmedtKS08,
  author       = {Yvo Desmedt and
                  Brian King and
                  Berry Schoenmakers},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Revisiting the Karnin, Greene and Hellman Bounds},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_18},
  doi          = {10.1007/978-3-540-85093-9\_18},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DesmedtKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DowsleyGMN08,
  author       = {Rafael Dowsley and
                  Jeroen van de Graaf and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Anderson C. A. Nascimento},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Oblivious Transfer Based on the McEliece Assumptions},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {107--117},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_11},
  doi          = {10.1007/978-3-540-85093-9\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DowsleyGMN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Garay08,
  author       = {Juan A. Garay},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Partially Connected Networks: Information Theoretically Secure Protocols
                  and Open Problems (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {1},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_1},
  doi          = {10.1007/978-3-540-85093-9\_1},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Garay08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Guruswami08,
  author       = {Venkatesan Guruswami},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {List Error-Correction with Optimal Information Rate (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {118--119},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_12},
  doi          = {10.1007/978-3-540-85093-9\_12},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Guruswami08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Hanaoka08,
  author       = {Goichiro Hanaoka},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Some Information Theoretic Arguments for Encryption: Non-malleability
                  and Chosen-Ciphertext Security (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {223--231},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_21},
  doi          = {10.1007/978-3-540-85093-9\_21},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Hanaoka08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/JakobyLM08,
  author       = {Andreas Jakoby and
                  Maciej Liskiewicz and
                  Aleksander Madry},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Susceptible Two-Party Quantum Computations},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_14},
  doi          = {10.1007/978-3-540-85093-9\_14},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/JakobyLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KurosawaK08,
  author       = {Kaoru Kurosawa and
                  Takeshi Koshiba},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Simple Direct Reduction of String (1, 2)-OT to Rabin's {OT} without
                  Privacy Amplification},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {199--209},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_19},
  doi          = {10.1007/978-3-540-85093-9\_19},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/KurosawaK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Lutkenhaus08,
  author       = {Norbert L{\"{u}}tkenhaus},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Theory of Quantum Key Distribution: The Road Ahead (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {120},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_13},
  doi          = {10.1007/978-3-540-85093-9\_13},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Lutkenhaus08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Patarin08,
  author       = {Jacques Patarin},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {A Proof of Security in O(2n) for the Xor of Two Random Permutations},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {232--248},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_22},
  doi          = {10.1007/978-3-540-85093-9\_22},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Patarin08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/StandaertMY08,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Does Physical Security of Cryptographic Devices Need a Formal Study?
                  (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {70},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_7},
  doi          = {10.1007/978-3-540-85093-9\_7},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/StandaertMY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2008,
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9},
  doi          = {10.1007/978-3-540-85093-9},
  isbn         = {978-3-540-85092-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/0002LPS07,
  author       = {Luis Antunes and
                  Sophie Laplante and
                  Alexandre Pinto and
                  Liliana C. M. Salvador},
  editor       = {Yvo Desmedt},
  title        = {Cryptographic Security of Individual Instances},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {195--210},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_17},
  doi          = {10.1007/978-3-642-10230-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/0002LPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BrassardBFGT07,
  author       = {Gilles Brassard and
                  Anne Broadbent and
                  Joseph F. Fitzsimons and
                  S{\'{e}}bastien Gambs and
                  Alain Tapp},
  editor       = {Yvo Desmedt},
  title        = {Anonymous Quantum Communication - (Extended Abstract)},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {181--182},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_15},
  doi          = {10.1007/978-3-642-10230-1\_15},
  timestamp    = {Mon, 13 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/BrassardBFGT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DArcoS07,
  author       = {Paolo D'Arco and
                  Alfredo De Santis},
  editor       = {Yvo Desmedt},
  title        = {Optimising {SD} and {LSD} in Presence of Non-uniform Probabilities
                  of Revocation},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {46--64},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_4},
  doi          = {10.1007/978-3-642-10230-1\_4},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DArcoS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/HaraSSM07,
  author       = {Yuki Hara and
                  Takenobu Seito and
                  Junji Shikata and
                  Tsutomu Matsumoto},
  editor       = {Yvo Desmedt},
  title        = {Unconditionally Secure Blind Signatures},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {23--43},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_2},
  doi          = {10.1007/978-3-642-10230-1\_2},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/HaraSSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/ImaiMN07,
  author       = {Hideki Imai and
                  Kirill Morozov and
                  Anderson C. A. Nascimento},
  editor       = {Yvo Desmedt},
  title        = {Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from
                  Any Non-trivial Noisy Correlation},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {183--194},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_16},
  doi          = {10.1007/978-3-642-10230-1\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/ImaiMN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KasperNN07,
  author       = {Emilia K{\"{a}}sper and
                  Ventzislav Nikov and
                  Svetla Nikova},
  editor       = {Yvo Desmedt},
  title        = {Strongly Multiplicative Hierarchical Threshold Secret Sharing},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {148--168},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_13},
  doi          = {10.1007/978-3-642-10230-1\_13},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KasperNN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Kerenidis07,
  author       = {Iordanis Kerenidis},
  editor       = {Yvo Desmedt},
  title        = {Introduction to Quantum Information Theory},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {146--147},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_12},
  doi          = {10.1007/978-3-642-10230-1\_12},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Kerenidis07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KitadaHMI07,
  author       = {Wataru Kitada and
                  Goichiro Hanaoka and
                  Kanta Matsuura and
                  Hideki Imai},
  editor       = {Yvo Desmedt},
  title        = {Unconditionally Secure Chaffing-and-Winnowing for Multiple Use},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {133--145},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_11},
  doi          = {10.1007/978-3-642-10230-1\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KitadaHMI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KurosawaS07,
  author       = {Kaoru Kurosawa and
                  Kazuhiro Suzuki},
  editor       = {Yvo Desmedt},
  title        = {Almost Secure (1-Round, n-Channel) Message Transmission Scheme},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {99--112},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_8},
  doi          = {10.1007/978-3-642-10230-1\_8},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KurosawaS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Maurer07,
  author       = {Ueli Maurer},
  editor       = {Yvo Desmedt},
  title        = {Random Systems: Theory and Applications},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {44--45},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_3},
  doi          = {10.1007/978-3-642-10230-1\_3},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Maurer07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/PintoSM007,
  author       = {Alexandre Pinto and
                  Andr{\'{e}} Souto and
                  Armando Matos and
                  Luis Antunes},
  editor       = {Yvo Desmedt},
  title        = {Commitment and Authentication Systems},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_1},
  doi          = {10.1007/978-3-642-10230-1\_1},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/PintoSM007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/ReistadT07,
  author       = {Tord Ingolf Reistad and
                  Tomas Toft},
  editor       = {Yvo Desmedt},
  title        = {Secret Sharing Comparison by Transformation and Rotation},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {169--180},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_14},
  doi          = {10.1007/978-3-642-10230-1\_14},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/ReistadT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/RennerWW07,
  author       = {Renato Renner and
                  Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  editor       = {Yvo Desmedt},
  title        = {Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {65--75},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_5},
  doi          = {10.1007/978-3-642-10230-1\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/RennerWW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Shikata07,
  author       = {Junji Shikata},
  editor       = {Yvo Desmedt},
  title        = {Construction Methodology of Unconditionally Secure Signature Schemes},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {113--114},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_9},
  doi          = {10.1007/978-3-642-10230-1\_9},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Shikata07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/SrinathanRK07,
  author       = {K. Srinathan and
                  C. Pandu Rangan and
                  Ranjit Kumaresan},
  editor       = {Yvo Desmedt},
  title        = {On Exponential Lower Bound for Protocols for Reliable Communication
                  in Networks},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {89--98},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_7},
  doi          = {10.1007/978-3-642-10230-1\_7},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/SrinathanRK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Tomas-BuliartFS07,
  author       = {Joan Tom{\`{a}}s{-}Buliart and
                  Marcel Fernandez and
                  Miguel Soriano},
  editor       = {Yvo Desmedt},
  title        = {Improvement of Collusion Secure Convolutional Fingerprinting Information
                  Codes},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {76--88},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_6},
  doi          = {10.1007/978-3-642-10230-1\_6},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Tomas-BuliartFS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/WangS07,
  author       = {Shuhong Wang and
                  Reihaneh Safavi{-}Naini},
  editor       = {Yvo Desmedt},
  title        = {New Results on Unconditionally Secure Multi-receiver Manual Authentication},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {115--132},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_10},
  doi          = {10.1007/978-3-642-10230-1\_10},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/WangS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Blundo05,
  author       = {Carlo Blundo},
  title        = {Randomness in self-healing key distribution schemes},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {80--84},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543962},
  doi          = {10.1109/ITWTPI.2005.1543962},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Blundo05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Brassard05,
  author       = {Gilles Brassard},
  title        = {Brief history of quantum cryptography: a personal perspective},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {19--23},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543949},
  doi          = {10.1109/ITWTPI.2005.1543949},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/Brassard05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Canteaut05,
  author       = {Anne Canteaut},
  title        = {Fast correlation attacks against stream ciphers and related open problems},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {49--54},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.4638690},
  doi          = {10.1109/ITWTPI.2005.4638690},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Canteaut05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DamgardFSS05,
  author       = {Ivan Bjerre Damg{\aa}rd and
                  Serge Fehr and
                  Louis Salvail and
                  Christian Schaffner},
  title        = {Cryptography in the bounded quantum-storage model},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {24--27},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543950},
  doi          = {10.1109/ITWTPI.2005.1543950},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DamgardFSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Desmedt05,
  author       = {Yvo Desmedt},
  title        = {Unconditionally private and reliable communication in an untrusted
                  network},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {38--41},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543954},
  doi          = {10.1109/ITWTPI.2005.1543954},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Desmedt05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Dodis05,
  author       = {Yevgeniy Dodis},
  title        = {On extractors, error-correction and hiding all partial information},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {74--79},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543961},
  doi          = {10.1109/ITWTPI.2005.1543961},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Dodis05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Fitzi05,
  author       = {Matthias Fitzi},
  title        = {Broadcast and secure computation under reduced setup assumptions},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {42--47},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543955},
  doi          = {10.1109/ITWTPI.2005.1543955},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Fitzi05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Hanaoka05,
  author       = {Goichiro Hanaoka},
  title        = {Unconditionally secure signatures and its related schemes},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543947},
  doi          = {10.1109/ITWTPI.2005.1543947},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Hanaoka05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KiayiasY05,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Cryptography and decoding Reed-Solomon codes as a hard problem},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {48},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543956},
  doi          = {10.1109/ITWTPI.2005.1543956},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KiayiasY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KobayashiYO05,
  author       = {Daisuke Kobayashi and
                  Hirosuke Yamamoto and
                  Tomohiro Ogawa},
  title        = {How to attain the ordinary channel capacity securely in wiretap channels},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543948},
  doi          = {10.1109/ITWTPI.2005.1543948},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KobayashiYO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Koga05,
  author       = {Hiroki Koga},
  title        = {Coding theorems on the threshold scheme for a general source},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {67--72},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543959},
  doi          = {10.1109/ITWTPI.2005.1543959},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Koga05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Kurosawa05,
  author       = {Kaoru Kurosawa},
  title        = {Some topics related to resilient functions},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {55--60},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543957},
  doi          = {10.1109/ITWTPI.2005.1543957},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Kurosawa05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Martin05,
  author       = {Keith M. Martin},
  title        = {Dynamic access policies for unconditionally secure secret sharing
                  schemes},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {61--66},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543958},
  doi          = {10.1109/ITWTPI.2005.1543958},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Martin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/MatsumotoS05,
  author       = {Tsutomu Matsumoto and
                  Junji Shikata},
  title        = {Authenticated encryption and steganography in unconditional security
                  setting},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543946},
  doi          = {10.1109/ITWTPI.2005.1543946},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/MatsumotoS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Muller-Quade05,
  author       = {J{\"{o}}rn M{\"{u}}ller{-}Quade},
  title        = {Temporary assumptions - quantum and classical},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {31--33},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543952},
  doi          = {10.1109/ITWTPI.2005.1543952},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Muller-Quade05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Okamoto05,
  author       = {Tatsuaki Okamoto},
  title        = {Relationship of three cryptographic channels in the {UC} framework},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {73},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543960},
  doi          = {10.1109/ITWTPI.2005.1543960},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Okamoto05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Rabin05,
  author       = {Michael O. Rabin},
  title        = {Provably unbreakable hyper-encryption in the limited access model},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {34--37},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543953},
  doi          = {10.1109/ITWTPI.2005.1543953},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Rabin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Safavi-NainiW05,
  author       = {Reihaneh Safavi{-}Naini and
                  Peter R. Wild},
  title        = {Bounds on authentication systems in query model},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {85--91},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543963},
  doi          = {10.1109/ITWTPI.2005.1543963},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Safavi-NainiW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/WolfW05,
  author       = {Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  title        = {Bit commitment from weak non-locality},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {28--30},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543951},
  doi          = {10.1109/ITWTPI.2005.1543951},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/WolfW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2005,
  title        = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/10361/proceeding},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics