Browse Dissertations and Theses - Computer Science by Author "Maji, Hemanta K."

  • Maji, Hemanta K. (2012-02-06)
    In cryptographic protocols, honest parties would prefer that their security is assured even in presence of adversarial parties who have unbounded computational power. Information theoretic secure realization of cryptographic ...

    application/pdf

    application/pdfPDF (1MB)