| CARVIEW |
Select Language
HTTP/2 200
server: GitHub.com
content-type: text/html; charset=utf-8
last-modified: Sat, 16 Aug 2025 20:41:01 GMT
access-control-allow-origin: *
strict-transport-security: max-age=31556952
etag: W/"68a0ecdd-1005"
expires: Tue, 30 Dec 2025 13:51:51 GMT
cache-control: max-age=600
content-encoding: gzip
x-proxy-cache: MISS
x-github-request-id: 789D:2D8B9D:A22E0A:B619B2:6953D69E
accept-ranges: bytes
age: 0
date: Tue, 30 Dec 2025 13:41:51 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210074-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1767102112.648252,VS0,VE205
vary: Accept-Encoding
x-fastly-request-id: 9ca46302daaa9f757b7dbf441f92bff6aeea46c0
content-length: 1768
Information-Theoretic Cryptography Conference
ITC replaces the International Conference on Information Theoretic Security (ICITS), which was dedicated to the same topic and ran 2005-2017. ITC can be seen as a reboot of ICITS with a new name, a new steering committee and a renewed excitement.
Conference on Information-Theoretic Cryptography (ITC)
In Cooperation With
Information-theoretic cryptography aims at achieving security in the presence of computationally unbounded adversaries. Research on information-theoretic cryptography includes in particular:
-
The design and implementation of cryptographic protocols
and primitives with unconditional security guarantees.
The usage of information-theoretic tools and techniques
in achieving other forms of security, including security against
computationally-bounded and quantum attackers.
ITC is a venue dedicated to serving two fundamental goals:
-
To present and disseminate research advances on all
aspects of information-theoretic security.
To foster the creation of a community bringing together researchers
from several areas, including coding theory, information theory
(classical and quantum), theory of computation, privacy, and
cryptography.
Areas of interest include, but are not restricted to:
-
Secure multi-party computation
Information-theoretic reductions
Information theoretic proof systems
Idealized models (e.g.,ideal channels, random oracle, generic group model)
Bounded storage models
Secret sharing
Authentication codes and non-malleable codes
Randomness extraction and privacy amplification
Private information retrieval and locally decodable codes
Differential privacy
Quantum information processing
Information-theoretic foundations of physical-layer security
ITC replaces the International Conference on Information Theoretic Security (ICITS), which was dedicated to the same topic and ran 2005-2017. ITC can be seen as a reboot of ICITS with a new name, a new steering committee and a renewed excitement.