| CARVIEW |
Select Language
HTTP/2 200
server: GitHub.com
content-type: text/html; charset=utf-8
last-modified: Sat, 16 Aug 2025 20:41:01 GMT
access-control-allow-origin: *
strict-transport-security: max-age=31556952
etag: W/"68a0ecdd-1005"
expires: Tue, 30 Dec 2025 16:08:48 GMT
cache-control: max-age=600
content-encoding: gzip
x-proxy-cache: MISS
x-github-request-id: 9C9D:2118F1:A312EB:B73C4E:6953F6B8
accept-ranges: bytes
age: 0
date: Tue, 30 Dec 2025 15:58:48 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210065-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1767110329.546140,VS0,VE203
vary: Accept-Encoding
x-fastly-request-id: cfa6a6faf231e3de36f5749e0a5ca20955b84d39
content-length: 1768
Information-Theoretic Cryptography Conference
ITC replaces the International Conference on Information Theoretic Security (ICITS), which was dedicated to the same topic and ran 2005-2017. ITC can be seen as a reboot of ICITS with a new name, a new steering committee and a renewed excitement.
Conference on Information-Theoretic Cryptography (ITC)
In Cooperation With
Information-theoretic cryptography aims at achieving security in the presence of computationally unbounded adversaries. Research on information-theoretic cryptography includes in particular:
-
The design and implementation of cryptographic protocols
and primitives with unconditional security guarantees.
The usage of information-theoretic tools and techniques
in achieving other forms of security, including security against
computationally-bounded and quantum attackers.
ITC is a venue dedicated to serving two fundamental goals:
-
To present and disseminate research advances on all
aspects of information-theoretic security.
To foster the creation of a community bringing together researchers
from several areas, including coding theory, information theory
(classical and quantum), theory of computation, privacy, and
cryptography.
Areas of interest include, but are not restricted to:
-
Secure multi-party computation
Information-theoretic reductions
Information theoretic proof systems
Idealized models (e.g.,ideal channels, random oracle, generic group model)
Bounded storage models
Secret sharing
Authentication codes and non-malleable codes
Randomness extraction and privacy amplification
Private information retrieval and locally decodable codes
Differential privacy
Quantum information processing
Information-theoretic foundations of physical-layer security
ITC replaces the International Conference on Information Theoretic Security (ICITS), which was dedicated to the same topic and ran 2005-2017. ITC can be seen as a reboot of ICITS with a new name, a new steering committee and a renewed excitement.