-
1
-
-
0027629488
-
Common randomness in information theory and cryptography - Part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inform. Theory, vol. 41, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inform. Theory
, vol.41
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
3
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, pp. 210-229, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
5
-
-
0018456171
-
Universal classes of hash functions
-
J. L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Comput. Syst. Sci., vol. 18, pp. 143-154, 1979.
-
(1979)
J. Comput. Syst. Sci.
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
7
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. IT-24, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.IT-24
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
8
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inform. Theory, vol. IT-22, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
9
-
-
85013455236
-
Codes for interactive authentication
-
Advances in Cryptology - Proceedings of Crypto'93. Berlin, Germany; Springer-Verlag
-
P. Gemmell and M. Naor, "Codes for interactive authentication," in Advances in Cryptology - Proceedings of Crypto'93 (Lecture Notes in Computer Science). Berlin, Germany; Springer-Verlag, 1994, vol. 773, pp. 355-367.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 355-367
-
-
Gemmell, P.1
Naor, M.2
-
10
-
-
0141922749
-
Linking classical and quantum key agreement: Is there a classical analog to bound entanglement?
-
N. Gisin, R. Renner, and S. Wolf, "Linking classical and quantum key agreement: Is there a classical analog to bound entanglement?," Algorithmica, vol. 34, pp. 389-412, 2002.
-
(2002)
Algorithmica
, vol.34
, pp. 389-412
-
-
Gisin, N.1
Renner, R.2
Wolf, S.3
-
11
-
-
84974621399
-
Linking classical and quantum key agreement: Is there "bound information"?
-
Proceedings of CRYPTO 2000. Berlin, Germany: Springer-Verlag
-
N. Gisin and S. Wolf, "Linking classical and quantum key agreement: Is there "bound information"?," in Proceedings of CRYPTO 2000 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2000, vol. 1880, pp. 482-500.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 482-500
-
-
Gisin, N.1
Wolf, S.2
-
12
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
13
-
-
77951458752
-
Information-theoretically secure secret-key agreement by NOT authenticated public discussion
-
Advances in Cryptology - EUROCRYPT'97. Berlin, Germany: Springer-Verlag
-
_. "Information-theoretically secure secret-key agreement by NOT authenticated public discussion," in Advances in Cryptology - EUROCRYPT'97 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1997, vol. 1233, pp. 209-225.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 209-225
-
-
-
14
-
-
84955584118
-
Towards characterizing when information-theoretic secret key agreement is possible
-
Advances in Cryptology - ASIACRYPT'96. Berlin, Germany: Springer-Verlag
-
U. M. Maurer and S. Wolf, "Towards characterizing when information-theoretic secret key agreement is possible," in Advances in Cryptology - ASIACRYPT'96 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1996, vol. 1163, pp. 196-209.
-
(1996)
Lecture Notes in Computer Science
, vol.1163
, pp. 196-209
-
-
Maurer, U.M.1
Wolf, S.2
-
15
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
Mar.
-
_, "Unconditionally secure key agreement and the intrinsic conditional information," IEEE Trans. Inform. Theory, vol. 45, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, pp. 499-514
-
-
-
16
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Advances in Cryptology - EUROCRYPT 2000. Berlin, Germany: Springer-Verlag
-
_, "Information-theoretic key agreement: From weak to strong secrecy for free," in Advances in Cryptology - EUROCRYPT 2000 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2000, vol. 1807, pp. 351-368.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 351-368
-
-
-
17
-
-
0037399113
-
Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition
-
Apr.
-
_, "Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition," IEEE Trans. Inform. Theory, vol. 49, pp. 832-838, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 832-838
-
-
-
18
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification
-
Apr.
-
_, "Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification," IEEE Trans. Inform. Theory, vol. 49, pp. 839-851, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 839-851
-
-
-
19
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
20
-
-
71049183202
-
Universal hashing and authentication codes
-
Advances in Cryptology - CRYPTO'91. Berlin, Germany: Springer-Verlag
-
D. R. Stinson, "Universal hashing and authentication codes," in Advances in Cryptology - CRYPTO'91 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1992, vol. 576, pp. 74-85.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 74-85
-
-
Stinson, D.R.1
-
21
-
-
0003617018
-
-
Ph.D. dissertation no. 13138, ETH Zürich, Zürich, Switzerland
-
S. Wolf, "Information-theoretically and computationally secure key agreement in cryptography," Ph.D. dissertation no. 13138, ETH Zürich, Zürich, Switzerland, 1999.
-
(1999)
Information-theoretically and Computationally Secure Key Agreement in Cryptography
-
-
Wolf, S.1
-
22
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
|