Book contents
- Frontmatter
- Dedication
- Contents
- Preface
- 1 Introduction
- Part I External Adversary: Encryption, Authentication, Secret Key
- 2 Basic Information Theory
- 3 Secret Keys and Encryption
- 4 Universal Hash Families
- 5 Hypothesis Testing
- 6 Information Reconciliation
- 7 Random Number Generation
- 8 Authentication
- 9 Computationally Secure Encryption and Authentication
- 10 Secret Key Agreement
- Part II Internal Adversary: Secure Computation
- Appendix Solutions to Selected Problems
- References
- Symbol Index
- Index
2 - Basic Information Theory
from Part I - External Adversary: Encryption, Authentication, Secret Key
Published online by Cambridge University Press: 23 March 2023
- Frontmatter
- Dedication
- Contents
- Preface
- 1 Introduction
- Part I External Adversary: Encryption, Authentication, Secret Key
- 2 Basic Information Theory
- 3 Secret Keys and Encryption
- 4 Universal Hash Families
- 5 Hypothesis Testing
- 6 Information Reconciliation
- 7 Random Number Generation
- 8 Authentication
- 9 Computationally Secure Encryption and Authentication
- 10 Secret Key Agreement
- Part II Internal Adversary: Secure Computation
- Appendix Solutions to Selected Problems
- References
- Symbol Index
- Index
Summary

- Type
- Chapter
- Information
- Information-theoretic Cryptography , pp. 15 - 46Publisher: Cambridge University PressPrint publication year: 2023