<?xml version="1.0" encoding="UTF-8"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/"
         xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
         xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
<ListRecords>
<oai_dc:dc xmlns="http://www.openarchives.org/OAI/2.0/oai_dc/"
           xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/"
           xmlns:dc="http://purl.org/dc/elements/1.1/"
           xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
           xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
   	<dc:title>Secret-key cryptography from ideal primitives: A systematic verview</dc:title>
   	<dc:creator>Gazi, Peter</dc:creator>
   	<dc:creator>Tessaro, Stefano</dc:creator>
   	<dc:description>Secret-key constructions are often proved secure in a model where one or more underlying components are replaced by an idealized oracle accessible to the attacker. This model gives rise to information-theoretic security analyses, and several advances have been made in this area over the last few years. This paper provides a systematic overview of what is achievable in this model, and how existing works fit into this view.</dc:description>
   	<dc:publisher>IEEE</dc:publisher>
   	<dc:date>2015</dc:date>
   	<dc:type>info:eu-repo/semantics/conferenceObject</dc:type>
   	<dc:type>doc-type:conferenceObject</dc:type>
   	<dc:type>text</dc:type>
   	<dc:identifier>https://research-explorer.ista.ac.at/record/1645</dc:identifier>
   	<dc:source>Gazi P, Tessaro S. Secret-key cryptography from ideal primitives: A systematic verview. In: &lt;i&gt;2015 IEEE Information Theory Workshop&lt;/i&gt;. IEEE; 2015. doi:&lt;a href=&quot;https://doi.org/10.1109/ITW.2015.7133163&quot;&gt;10.1109/ITW.2015.7133163&lt;/a&gt;</dc:source>
   	<dc:language>eng</dc:language>
   	<dc:relation>info:eu-repo/semantics/altIdentifier/doi/10.1109/ITW.2015.7133163</dc:relation>
   	<dc:rights>info:eu-repo/semantics/closedAccess</dc:rights>
</oai_dc:dc>
</ListRecords>
</OAI-PMH>
