-
1
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inform. Theory, vol. 41, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inform. Theory
, vol.41
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
2
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Computing, vol. 17, pp. 210-229, 1988.
-
(1988)
SIAM J. Computing
, vol.17
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
3
-
-
0004013982
-
-
Ph.D. dissertation, ETH Zürich, Hartung-Gorre Verlag, Konstanz
-
C. Cachin, "Entropy measures and unconditional security in cryptography," Ph.D. dissertation, ETH Zürich, Hartung-Gorre Verlag, Konstanz, 1997.
-
(1997)
Entropy Measures and Unconditional Security in Cryptography
-
-
Cachin, C.1
-
4
-
-
0001777508
-
Linking information reconciliation and privacy amplification
-
C. Cachin and U. M. Maurer, "Linking information reconciliation and privacy amplification," in J. Cryptol., vol. 10, 1997, pp. 97-110.
-
(1997)
J. Cryptol.
, vol.10
, pp. 97-110
-
-
Cachin, C.1
Maurer, U.M.2
-
5
-
-
0018456171
-
Universal classes of hash functions
-
J. L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Comput. Syst. Sci., vol. 18, pp. 143-154, 1979.
-
(1979)
J. Comput. Syst. Sci.
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
7
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. IT-24, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.IT-24
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
8
-
-
85013455236
-
Codes for interactive authentication
-
Advances in Cryptology - CRYPTO'93. Berlin, Germany: Springer-Verlag
-
P. Gemmell and M. Naor, "Codes for interactive authentication," in Advances in Cryptology - CRYPTO '93 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1994, vol. 773, pp. 355-367.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 355-367
-
-
Gemmell, P.1
Naor, M.2
-
9
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
10
-
-
77951458752
-
Information-theoretically secure secret-key agreement by NOT authenticated public discussion
-
Advances in Cryptology - EURO-CRYPT'97. Berlin, Germany: Springer-Verlag
-
_, "Information-theoretically secure secret-key agreement by NOT authenticated public discussion," in Advances in Cryptology - EURO-CRYPT '97 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1997, vol. 1233, pp. 209-225.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 209-225
-
-
-
11
-
-
0034228863
-
Authentication theory and hypothesis testing
-
July
-
_, "Authentication theory and hypothesis testing," IEEE Trans. Inform. Theory, vol. 46, pp. 1350-1356, July 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 1350-1356
-
-
-
12
-
-
84958670019
-
Privacy amplification secure against active adversaries
-
Advances in Cryptology - CRYPTO '97. Berlin, Germany: Springer-Verlag
-
U. M. Maurer and S. Wolf, "Privacy amplification secure against active adversaries," in Advances in Cryptology - CRYPTO '97 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1997, vol. 1294, pp. 307-321.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 307-321
-
-
Maurer, U.M.1
Wolf, S.2
-
13
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
Mar.
-
_, "Unconditionally secure key agreement and the intrinsic conditional information," IEEE Trans. Inform. Theory, vol. 45, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, pp. 499-514
-
-
-
14
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Advances in Cryptology - EUROCRYPT 2000. Berlin, Germany: Springer-Verlag
-
_, "Information-theoretic key agreement: From weak to strong secrecy for free," in Advances in Cryptology - EUROCRYPT 2000 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2000, vol. 1807, pp. 351-368.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 351-368
-
-
-
15
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result
-
Apr.
-
_, "Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result," IEEE Trans. Inform. Theory, vol. 49, pp. 822-831, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 822-831
-
-
-
16
-
-
0037399113
-
Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition
-
Apr.
-
_, "Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition," IEEE Trans. Inform. Theory, vol. 49, pp. 832-838, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 832-838
-
-
-
17
-
-
0030086632
-
Randomness is linear in space
-
N. Nisan and D. Zuckerman, "Randomness is linear in space," J. Comput. Syst. Sci., vol. 52, no. 1, pp. 43-52, 1996.
-
(1996)
J. Comput. Syst. Sci.
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
18
-
-
0032629108
-
Extracting all the randomness and reducing the error in Trevisan's extractors
-
R. Raz, O. Reingold, and S. Vadhan, "Extracting all the randomness and reducing the error in Trevisan's extractors," in Proc. Symp. Theory of Computing (STOC'99), 1999, pp. 149-158.
-
(1999)
Proc. Symp. Theory of Computing (STOC'99)
, pp. 149-158
-
-
Raz, R.1
Reingold, O.2
Vadhan, S.3
-
19
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
20
-
-
0024015453
-
A survey of information authentication
-
May
-
G. J. Simmons, "A survey of information authentication," Proc. IEEE, vol. 76, pp. 603-620, May 1988.
-
(1988)
Proc. IEEE
, vol.76
, pp. 603-620
-
-
Simmons, G.J.1
-
21
-
-
71049183202
-
Universal hashing and authentication codes
-
Advances in Cryptology - CRYPTO '91. Berlin, Germany. Springer-Verlag
-
D. R. Stinson, "Universal hashing and authentication codes," in Advances in Cryptology - CRYPTO '91 (Lecture Notes in Computer Science). Berlin, Germany. Springer-Verlag, 1992, vol. 576, pp. 74-85.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 74-85
-
-
Stinson, D.R.1
-
22
-
-
84947780088
-
Strong security against active attacks in information-theoretic secret-key agreement
-
Advances in Cryptology - ASIACRYPT '98. Berlin, Germany: Springer-Verlag
-
S. Wolf, "Strong security against active attacks in information-theoretic secret-key agreement," in Advances in Cryptology - ASIACRYPT '98 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1998, vol. 1514, pp. 405-419.
-
(1998)
Lecture Notes in Computer Science
, vol.1514
, pp. 405-419
-
-
Wolf, S.1
-
24
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
|