[{"publist_id":"5506","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","ec_funded":1,"month":"06","department":[{"_id":"KrPi"}],"date_updated":"2025-07-10T11:51:12Z","article_number":"7133163","quality_controlled":"1","title":"Secret-key cryptography from ideal primitives: A systematic verview","oa_version":"None","citation":{"ama":"Gazi P, Tessaro S. Secret-key cryptography from ideal primitives: A systematic verview. In: <i>2015 IEEE Information Theory Workshop</i>. IEEE; 2015. doi:<a href=\"https://doi.org/10.1109/ITW.2015.7133163\">10.1109/ITW.2015.7133163</a>","ieee":"P. Gazi and S. Tessaro, “Secret-key cryptography from ideal primitives: A systematic verview,” in <i>2015 IEEE Information Theory Workshop</i>, Jerusalem, Israel, 2015.","apa":"Gazi, P., &#38; Tessaro, S. (2015). Secret-key cryptography from ideal primitives: A systematic verview. In <i>2015 IEEE Information Theory Workshop</i>. Jerusalem, Israel: IEEE. <a href=\"https://doi.org/10.1109/ITW.2015.7133163\">https://doi.org/10.1109/ITW.2015.7133163</a>","ista":"Gazi P, Tessaro S. 2015. Secret-key cryptography from ideal primitives: A systematic verview. 2015 IEEE Information Theory Workshop. ITW: Information Theory Workshop, 7133163.","short":"P. Gazi, S. Tessaro, in:, 2015 IEEE Information Theory Workshop, IEEE, 2015.","mla":"Gazi, Peter, and Stefano Tessaro. “Secret-Key Cryptography from Ideal Primitives: A Systematic Verview.” <i>2015 IEEE Information Theory Workshop</i>, 7133163, IEEE, 2015, doi:<a href=\"https://doi.org/10.1109/ITW.2015.7133163\">10.1109/ITW.2015.7133163</a>.","chicago":"Gazi, Peter, and Stefano Tessaro. “Secret-Key Cryptography from Ideal Primitives: A Systematic Verview.” In <i>2015 IEEE Information Theory Workshop</i>. IEEE, 2015. <a href=\"https://doi.org/10.1109/ITW.2015.7133163\">https://doi.org/10.1109/ITW.2015.7133163</a>."},"date_published":"2015-06-24T00:00:00Z","status":"public","author":[{"first_name":"Peter","last_name":"Gazi","full_name":"Gazi, Peter","id":"3E0BFE38-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Tessaro, Stefano","first_name":"Stefano","last_name":"Tessaro"}],"_id":"1645","publisher":"IEEE","conference":{"end_date":"2015-05-01","name":"ITW: Information Theory Workshop","start_date":"2015-04-26","location":"Jerusalem, Israel"},"language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"Secret-key constructions are often proved secure in a model where one or more underlying components are replaced by an idealized oracle accessible to the attacker. This model gives rise to information-theoretic security analyses, and several advances have been made in this area over the last few years. This paper provides a systematic overview of what is achievable in this model, and how existing works fit into this view."}],"day":"24","project":[{"name":"Provable Security for Physical Cryptography","call_identifier":"FP7","grant_number":"259668","_id":"258C570E-B435-11E9-9278-68D0E5697425"}],"type":"conference","date_created":"2018-12-11T11:53:13Z","year":"2015","article_processing_charge":"No","publication":"2015 IEEE Information Theory Workshop","doi":"10.1109/ITW.2015.7133163","publication_status":"published","scopus_import":"1"}]
