This course focuses on secure communication built on information theory, which does not assume that an adversary has computational limitations. We will begin from the basics of information theory, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results