[{"ec_funded":1,"language":[{}],"publication_status":"published","month":"06","scopus_import":1,"oa_version":"None","abstract":[{"lang":"eng"}],"department":[{"tree":[{"_id":"ResearchGroups"},{"_id":"IST"}],"_id":"KrPi"}],"creator":{"id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","login":"dernst"},"date_updated":"2021-01-12T06:52:13Z","status":"public","conference":{"name":"ITW 2015: IEEE Information Theory Workshop","location":"Jerusalem, Israel","end_date":"2015-05-01","start_date":"2015-04-26"},"type":"conference","_id":"1645","date_created":"2018-12-11T11:53:13Z","date_published":"2015-06-24T00:00:00Z","uri_base":"https://research-explorer.ista.ac.at","dc":{"relation":["info:eu-repo/semantics/altIdentifier/doi/10.1109/ITW.2015.7133163","info:eu-repo/grantAgreement/EC/FP7/259668"],"source":["Gazi P, Tessaro S. Secret-key cryptography from ideal primitives: A systematic verview. In: 2015 IEEE Information Theory Workshop. IEEE; 2015. doi:10.1109/ITW.2015.7133163"],"description":["Secret-key constructions are often proved secure in a model where one or more underlying components are replaced by an idealized oracle accessible to the attacker. This model gives rise to information-theoretic security analyses, and several advances have been made in this area over the last few years. This paper provides a systematic overview of what is achievable in this model, and how existing works fit into this view."],"identifier":["https://research-explorer.ista.ac.at/record/1645"],"date":["2015"],"publisher":["IEEE"],"type":["info:eu-repo/semantics/conferenceObject","doc-type:conferenceObject","text","http://purl.org/coar/resource_type/c_5794"],"rights":["info:eu-repo/semantics/closedAccess"],"language":["eng"],"creator":["Gazi, Peter","Tessaro, Stefano"],"title":["Secret-key cryptography from ideal primitives: A systematic verview"]},"publication":"2015 IEEE Information Theory Workshop","day":"24","quality_controlled":"1","author":[{"last_name":"Gazi","id":"3E0BFE38-F248-11E8-B48F-1D18A9856A87","first_name":"Peter"},{"last_name":"Tessaro","first_name":"Stefano"}],"publist_id":"5506","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","dini_type":"doc-type:conferenceObject","citation":{"chicago":"Gazi, Peter, and Stefano Tessaro. “Secret-Key Cryptography from Ideal Primitives: A Systematic Verview.” In 2015 IEEE Information Theory Workshop. IEEE, 2015. https://doi.org/10.1109/ITW.2015.7133163.","ista":"Gazi P, Tessaro S. 2015. Secret-key cryptography from ideal primitives: A systematic verview. 2015 IEEE Information Theory Workshop. ITW 2015: IEEE Information Theory Workshop, 7133163.","mla":"Gazi, Peter, and Stefano Tessaro. “Secret-Key Cryptography from Ideal Primitives: A Systematic Verview.” 2015 IEEE Information Theory Workshop, 7133163, IEEE, 2015, doi:10.1109/ITW.2015.7133163.","ieee":"P. Gazi and S. Tessaro, “Secret-key cryptography from ideal primitives: A systematic verview,” in 2015 IEEE Information Theory Workshop, Jerusalem, Israel, 2015.","short":"P. Gazi, S. Tessaro, in:, 2015 IEEE Information Theory Workshop, IEEE, 2015.","apa":"Gazi, P., & Tessaro, S. (2015). Secret-key cryptography from ideal primitives: A systematic verview. In 2015 IEEE Information Theory Workshop. Jerusalem, Israel: IEEE. https://doi.org/10.1109/ITW.2015.7133163"},"project":[{"call_identifier":"FP7","_id":"258C570E-B435-11E9-9278-68D0E5697425","name":"Provable Security for Physical Cryptography"}],"article_number":"7133163"}]