We study the universal coding under side-channel attacks posed and
inves...
This paper studies the computation of error and correct decoding probabi...
We analyze the fundamental trade-off of secret key-based authentication
...
We are interested in investigating the security of source encryption wit...
We pose and investigate the distributed secure source coding based on th...
In the present paper, we investigate the fundamental trade-off of
identi...
We study the determination problem of the channel capacity for the discr...
Information leakage in Wyner's wiretap channel model is usually defined ...
We consider the secure communication problem for broadcasting of two
enc...
We consider the secure communication problem for broadcasting of two
enc...
In this paper we provide a new inequality useful for the proofs of stron...
In this paper we provide a new inequality useful for the proofs of stron...
This paper proposed the application of post-encryption-compression (PEC)...
We study side-channel attacks for the Shannon cipher system. To pose sid...