-
1
-
-
0027629488
-
-
1993.
-
R. Ahlswede and I. Csiszär, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, pp. 1121-1132, July 1993.
-
And I. Csiszär, "Common Randomness in Information Theory and Cryptography-Part I: Secret Sharing," IEEE Trans. Inform. Theory, Vol. 39, Pp. 1121-1132, July
-
-
Ahlswede, R.1
-
2
-
-
0026626314
-
-
1992.
-
C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, "Experimental quantum cryptography," J. CryptoL, vol. 5, no. 1, pp. 3-28, 1992.
-
F. Bessette, G. Brassard, L. Salvail, and J. Smolin, "Experimental Quantum Cryptography," J. CryptoL, Vol. 5, No. 1, Pp. 3-28
-
-
Bennett, C.H.1
-
4
-
-
84957356475
-
-
306-317.
-
C. Crépeau, "Efficient cryptographic protocols based on noisy channels," in Advances in Cryptology-EUROCRYPT'97, Lecture Notes in Computer Science, vol. 1233. Berlin, Germany: Springer-Verlag, 1997, pp. 306-317.
-
"Efficient Cryptographic Protocols Based on Noisy Channels," in Advances in Cryptology-EUROCRYPT'97, Lecture Notes in Computer Science, Vol. 1233. Berlin, Germany: Springer-Verlag, 1997, Pp.
-
-
Crépeau, C.1
-
6
-
-
0017973511
-
-
1978.
-
I. Csiszar and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. IT-24, pp. 339-348, 1978.
-
And J. Körner, "Broadcast Channels with Confidential Messages," IEEE Trans. Inform. Theory, Vol. IT-24, Pp. 339-348
-
-
Csiszar, I.1
-
7
-
-
33747172478
-
-
1997.
-
M. van Dijk, "Secret key sharing and secret key generation," Ph.D. dissertation, Technische Universiteit Eindhoven, Eindhoven, The Netherlands, 1997.
-
Secret Key Sharing and Secret Key Generation," Ph.D. Dissertation, Technische Universiteit Eindhoven, Eindhoven, the Netherlands
-
-
Van Dijk, M.1
-
9
-
-
0008814479
-
-
1996.
-
M.J. Fischer and R. N. Wright, "Bounds on secret key exchange using a random deal of cards," J. CryptoL, vol. 9, no. 2, pp. 71-99, 1996.
-
And R. N. Wright, "Bounds on Secret Key Exchange Using A Random Deal of Cards," J. CryptoL, Vol. 9, No. 2, Pp. 71-99
-
-
Fischer, M.J.1
-
10
-
-
77951458752
-
-
209-225.
-
U.M. Maurer, "Information-theoretically secure secret-key agreement by NOT authenticated public discussion," in Advances in Cryptology-EUROCRYPT'97, Lecture Notes in Computer Science, vol. 1233. Berlin, Germany: Springer-Verlag, 1997, pp. 209-225.
-
"Information-theoretically Secure Secret-key Agreement by NOT Authenticated Public Discussion," in Advances in Cryptology-EUROCRYPT'97, Lecture Notes in Computer Science, Vol. 1233. Berlin, Germany: Springer-Verlag, 1997, Pp.
-
-
Maurer, U.M.1
-
12
-
-
33747166107
-
-
46170.
-
"Protocols for secret key agreement based on common information," in Advances in Cryptology-CRYPTO'92, Lecture Notes in Computer Science, vol. 740. Berlin, Germany: Springer-Verlag, 1993, pp. 46170.
-
Protocols for Secret Key Agreement Based on Common Information," in Advances in Cryptology-CRYPTO'92, Lecture Notes in Computer Science, Vol. 740. Berlin, Germany: Springer-Verlag, 1993, Pp.
-
-
-
14
-
-
84958670019
-
-
307-321.
-
U.M. Maurer and S. Wolf, "Privacy amplification secure against active adversaries," in Advances in Cryptology-CRYPTO'97, Lecture Notes in Computer Science, vol. 1294. Berlin, Germany: Springer-Verlag, 1996, pp. 307-321.
-
And S. Wolf, "Privacy Amplification Secure Against Active Adversaries," in Advances in Cryptology-CRYPTO'97, Lecture Notes in Computer Science, Vol. 1294. Berlin, Germany: Springer-Verlag, 1996, Pp.
-
-
Maurer, U.M.1
-
16
-
-
84955584118
-
-
196-209.
-
"Towards characterizing when information-theoretic secret key agreement is possible," in Advances in Cryptology-ASIACRYPT'96, Lecture Notes in Computer Science, vol. 1163. Berlin, Germany: Springer-Verlag, 1996, pp. 196-209.
-
Towards Characterizing When Information-theoretic Secret Key Agreement Is Possible," in Advances in Cryptology-ASIACRYPT'96, Lecture Notes in Computer Science, Vol. 1163. Berlin, Germany: Springer-Verlag, 1996, Pp.
-
-
-
17
-
-
84890522850
-
-
1949.
-
C.E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
-
"Communication Theory of Secrecy Systems," Bell Syst. Tech. J., Vol. 28, Pp. 656-715, Oct.
-
-
Shannon, C.E.1
-
18
-
-
84947780088
-
-
40519.
-
S. Wolf, "Strong security against active attacks in information-theoretic secret-key agreement," in Advances in Cryptology-ASIACRYPT'98, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1998, vol. 1514, pp. 40519.
-
"Strong Security Against Active Attacks in Information-theoretic Secret-key Agreement," in Advances in Cryptology-ASIACRYPT'98, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1998, Vol. 1514, Pp.
-
-
Wolf, S.1
-
19
-
-
0016562514
-
-
1975.
-
A.D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
"The Wire-tap Channel," Bell Syst. Tech. J., Vol. 54, No. 8, Pp. 1355-1387
-
-
Wyner, A.D.1
-
20
-
-
0026155039
-
-
1991.
-
R.W. Yeoung, "A new outlook on Shannon's information measures," IEEE Trans. Inform. Theory, vol. 37, pp. 466-474, May 1991.
-
"A New Outlook on Shannon's Information Measures," IEEE Trans. Inform. Theory, Vol. 37, Pp. 466-474, May
-
-
Yeoung, R.W.1
|