Abstract is missing.
- How to Construct Strongly Secure Network Coding SchemeKaoru Kurosawa, Hiroyuki Ohta, Kenji Kakuta. 1-17 [doi]
- Secure Two-Party Computation: A Visual WayPaolo D'Arco, Roberto De Prisco. 18-38 [doi]
- Measure-Independent Characterization of Contrast Optimal Visual Cryptography SchemesPaolo D'Arco, Roberto De Prisco, Alfredo De Santis. 39-55 [doi]
- On $$(k, n)$$ ( k , n ) Visual Cryptography Scheme with $$t$$ t Essential PartiesTeng Guo, Feng Liu, Chuan-Kun Wu, YaWei Ren, Wen Wang. 56-68 [doi]
- New Lower Bounds for Privacy in Communication ProtocolsIordanis Kerenidis, Mathieu Laurière, David Xiao. 69-89 [doi]
- On the Transmit Beamforming for MIMO Wiretap Channels: Large-System AnalysisMaksym A. Girnyk, Frederic Gabry, Mikko Vehkaperä, Lars K. Rasmussen, Mikael Skoglund. 90-102 [doi]
- Information Theoretic Security for Encryption Based on Conditional Rényi EntropiesMitsugu Iwamoto, Junji Shikata. 103-121 [doi]
- Insider-Proof Encryption with Applications for Quantum Key DistributionMatthew McKague, Lana Sheridan. 122-141 [doi]
- Superposition Attacks on Cryptographic ProtocolsIvan Damgård, Jakob Funder, Jesper Buus Nielsen, Louis Salvail. 142-161 [doi]
- Overcoming Weak Expectations via the R $$\acute{e}$$ e ' nyi Entropy and the Expanded Computational EntropyYanqing Yao, Zhoujun Li. 162-178 [doi]
- Modulus Computational EntropyMaciej Skorski. 179-199 [doi]
- Broadcast (and Round) Efficient Verifiable Secret SharingJuan A. Garay, Clint Givens, Rafail Ostrovsky, Pavel Raykov. 200-219 [doi]
- Leakage Resilience of the Blom's Key Distribution SchemeMichal Jastrzebski, Stefan Dziembowski. 220-237 [doi]
- Detection of Algebraic Manipulation in the Presence of LeakageHadi Ahmadi, Reihaneh Safavi-Naini. 238-258 [doi]