---
_id: '1645'
abstract:
- lang: eng
  text: Secret-key constructions are often proved secure in a model where one or more
    underlying components are replaced by an idealized oracle accessible to the attacker.
    This model gives rise to information-theoretic security analyses, and several
    advances have been made in this area over the last few years. This paper provides
    a systematic overview of what is achievable in this model, and how existing works
    fit into this view.
article_number: '7133163'
article_processing_charge: No
author:
- first_name: Peter
  full_name: Gazi, Peter
  id: 3E0BFE38-F248-11E8-B48F-1D18A9856A87
  last_name: Gazi
- first_name: Stefano
  full_name: Tessaro, Stefano
  last_name: Tessaro
citation:
  ama: 'Gazi P, Tessaro S. Secret-key cryptography from ideal primitives: A systematic
    verview. In: <i>2015 IEEE Information Theory Workshop</i>. IEEE; 2015. doi:<a
    href="https://doi.org/10.1109/ITW.2015.7133163">10.1109/ITW.2015.7133163</a>'
  apa: 'Gazi, P., &#38; Tessaro, S. (2015). Secret-key cryptography from ideal primitives:
    A systematic verview. In <i>2015 IEEE Information Theory Workshop</i>. Jerusalem,
    Israel: IEEE. <a href="https://doi.org/10.1109/ITW.2015.7133163">https://doi.org/10.1109/ITW.2015.7133163</a>'
  chicago: 'Gazi, Peter, and Stefano Tessaro. “Secret-Key Cryptography from Ideal
    Primitives: A Systematic Verview.” In <i>2015 IEEE Information Theory Workshop</i>.
    IEEE, 2015. <a href="https://doi.org/10.1109/ITW.2015.7133163">https://doi.org/10.1109/ITW.2015.7133163</a>.'
  ieee: 'P. Gazi and S. Tessaro, “Secret-key cryptography from ideal primitives: A
    systematic verview,” in <i>2015 IEEE Information Theory Workshop</i>, Jerusalem,
    Israel, 2015.'
  ista: 'Gazi P, Tessaro S. 2015. Secret-key cryptography from ideal primitives: A
    systematic verview. 2015 IEEE Information Theory Workshop. ITW: Information Theory
    Workshop, 7133163.'
  mla: 'Gazi, Peter, and Stefano Tessaro. “Secret-Key Cryptography from Ideal Primitives:
    A Systematic Verview.” <i>2015 IEEE Information Theory Workshop</i>, 7133163,
    IEEE, 2015, doi:<a href="https://doi.org/10.1109/ITW.2015.7133163">10.1109/ITW.2015.7133163</a>.'
  short: P. Gazi, S. Tessaro, in:, 2015 IEEE Information Theory Workshop, IEEE, 2015.
conference:
  end_date: 2015-05-01
  location: Jerusalem, Israel
  name: 'ITW: Information Theory Workshop'
  start_date: 2015-04-26
date_created: 2018-12-11T11:53:13Z
date_published: 2015-06-24T00:00:00Z
date_updated: 2025-07-10T11:51:12Z
day: '24'
department:
- _id: KrPi
doi: 10.1109/ITW.2015.7133163
ec_funded: 1
language:
- iso: eng
month: '06'
oa_version: None
project:
- _id: 258C570E-B435-11E9-9278-68D0E5697425
  call_identifier: FP7
  grant_number: '259668'
  name: Provable Security for Physical Cryptography
publication: 2015 IEEE Information Theory Workshop
publication_status: published
publisher: IEEE
publist_id: '5506'
quality_controlled: '1'
scopus_import: '1'
status: public
title: 'Secret-key cryptography from ideal primitives: A systematic verview'
type: conference
user_id: 2DF688A6-F248-11E8-B48F-1D18A9856A87
year: '2015'
...
