Topics in information-theoretic cryptography
COM-622
Reading Assignment
This page is part of the content downloaded from Reading Assignment on Wednesday, 25 December 2024, 15:53. Note that some content and any files larger than 50 MB are not downloaded.
Description
I. Issa, A. B. Wagner, and S. Kamath, “An operational approach to information leakage,” IEEE Transactions on Information Theory, vol. 66, no. 3, pp. 1625–1657, 2020.