-
1
-
-
0027629488
-
"Common randomness in information theory and cryptography, part I: Secret sharing"
-
July
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
0031701886
-
"Common randomness in information theory and cryptography, part II: CR capacity"
-
Jan
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, part II: CR capacity," IEEE Trans. Inform. Theory vol. 44, pp. 225-240, Jan. 1998.
-
(1998)
IEEE Trans. Inform. Theory
, vol.44
, pp. 225-240
-
-
Ahlswede, R.1
Csiszár, I.2
-
3
-
-
0016486048
-
"A proof of the data compression theorem of Slepian and Wolf for ergodic sources"
-
Mar
-
T. M. Cover, "A proof of the data compression theorem of Slepian and Wolf for ergodic sources," IEEE Trans. Inform. Theory, vol. IT-21, pp. 226-228, Mar. 1975.
-
(1975)
IEEE Trans. Inform. Theory
, vol.IT-21
, pp. 226-228
-
-
Cover, T.M.1
-
5
-
-
0029706655
-
"Almost independence and secrecy capacity"
-
I. Csiszár, "Almost independence and secrecy capacity," Probl. Pered. Inform., vol. 32, no. 1, pp. 48-57, 1996.
-
(1996)
Probl. Pered. Inform.
, vol.32
, Issue.1
, pp. 48-57
-
-
Csiszár, I.1
-
6
-
-
0033891095
-
"Common randomness and secret key generation with a helper"
-
Mar
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inform. Theory, vol. 46, pp. 344-366, Mar. 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
8
-
-
0027599802
-
"Secret key agreement by public discussion from common information"
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
9
-
-
0005059185
-
"The strong secret key rate of discrete random triples"
-
R. E. Blahut et al., Eds. Norwell, MA: Kluwer, ch. 26
-
U. M. Maurer, "The strong secret key rate of discrete random triples," in Communications and Cryptography: Two Sides of One Tapestry, R. E. Blahut et al., Eds. Norwell, MA: Kluwer, 1994, ch. 26, pp. 271-285.
-
(1994)
Communications and Cryptography: Two Sides of One Tapestry
, pp. 271-285
-
-
Maurer, U.M.1
-
10
-
-
84958670019
-
"Privacy amplification secure against active adversaries"
-
B. Kaliski, Ed. New York: Springer-Verlag
-
U. Maurer and S. Wolf, "Privacy amplification secure against active adversaries," in Advances in Cryptology-CRYPTO'97 (Lecture Notes in Computer Science), B. Kaliski, Ed. New York: Springer-Verlag, 1997, pp. 307-321.
-
(1997)
Advances in Cryptology-CRYPTO'97 (Lecture Notes in Computer Science)
, pp. 307-321
-
-
Maurer, U.1
Wolf, S.2
-
11
-
-
84948960386
-
"Information-theoretic key agreement: From weak to strong secrecy for free"
-
Berlin, Germany: Springer-Verlag
-
U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proc. EUROCRYPT 2000 (Lecture notes in Computer Science). Berlin, Germany: Springer-Verlag, 2000, pp. 352-368.
-
(2000)
Proc. EUROCRYPT 2000 (Lecture Notes in Computer Science)
, pp. 352-368
-
-
Maurer, U.M.1
Wolf, S.2
-
12
-
-
35248888499
-
"New bounds in secret-key agreement: The gap between formation and secrecy extraction"
-
Berlin, Germany: Springer-Verlag
-
R. Renner and S. Wolf, "New bounds in secret-key agreement: The gap between formation and secrecy extraction," in Proc. EUROCRYPT 2003 (Lecture notes in Computer Science). Berlin, Germany: Springer-Verlag, 2003.
-
(2003)
Proc. EUROCRYPT 2003 (Lecture Notes in Computer Science)
-
-
Renner, R.1
Wolf, S.2
-
14
-
-
0036611983
-
"Communicating via a processing broadcast satellite"
-
June
-
A. D. Wyner, J. K. Wolf, and F. M. J. Willems, "Communicating via a processing broadcast satellite," IEEE Trans. Inform. Theory, vol. 48, pp. 1243-1249, June 2002.
-
(2002)
IEEE Trans. Inform. Theory
, vol.48
, pp. 1243-1249
-
-
Wyner, A.D.1
Wolf, J.K.2
Willems, F.M.J.3
|