This is the eighth in a series of conferences that aims to bring together the leading researchers in the<br>areas of information theory, quantum information theory, and cryptography. ICITS covers all aspects of<br>information–theoretic security, from relevant mathematical tools to theoretical modeling to implementation.<br>Papers on all technical aspects of these topics are solicited for submission. Areas of interest include,<br>but are not restricted to:<br>Physical layer security / Multiparty computation / Codes, lattices, & cryptography / Authentication codes /<br>Randomness extraction / Cryptography from noisy channels / Wiretap channels / Bounded–storage models /<br>Information–theoretic reductions / Quantum cryptography / Quantum information theory / Nonlocality and<br>nonsignaling / Key and message rates / Secret sharing / Physical models & assumptions / Network coding<br>security / Adversarial channel models / Information–theoretic tools in computational settings /<br>Implementation challenges / Biometric security<br>
Abbrevation
ICITS
Link
City
Lugano
Country
Switzerland
Deadline Paper
Start Date
End Date
Abstract