-
1
-
-
0027629488
-
Common Randomness in Information Theory and Cryptography - Part I: Secret Sharing
-
R. Ahlswede, I. Csiszár, "Common Randomness in Information Theory and Cryptography - Part I: Secret Sharing", IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
0036495139
-
Strong converse for identification via quantum channels
-
R. Ahlswede, A. Winter, "Strong converse for identification via quantum channels", IEEE Trans. Inf. Theory, vol. 48, no. 3, pp. 569-579, 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.48
, Issue.3
, pp. 569-579
-
-
Ahlswede, R.1
Winter, A.2
-
4
-
-
0030679850
-
Commodity-Based Cryptography
-
Extended Abstract, (El Paso, TX, 4-6 May 1997), ACM
-
th Annual ACM Symposium on the Theory of Computing (El Paso, TX, 4-6 May 1997), pp. 446-455, ACM, 1997.
-
(1997)
th Annual ACM Symposium on the Theory of Computing
, pp. 446-455
-
-
Beaver, D.1
-
6
-
-
0029405656
-
Generalized Privacy Amplification
-
C. H. Bennett, G. Brassard, C. Crépeau, U. Maurer, "Generalized Privacy Amplification", IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
7
-
-
0032184559
-
Quantum Information Theory
-
C. H. Bennett, P. W. Shor, "Quantum Information Theory", IEEE Trans. Inf. Theory, vol. 44, no. 6, pp. 2724-2742, 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.6
, pp. 2724-2742
-
-
Bennett, C.H.1
Shor, P.W.2
-
8
-
-
0003030602
-
Coin fipping by telephone: A protocol for solving impossible problems
-
M. Blum, "Coin fipping by telephone: a protocol for solving impossible problems", Proc. IEEE Computer Conference, pp. 133-137, 1982.
-
(1982)
Proc. IEEE Computer Conference
, pp. 133-137
-
-
Blum, M.1
-
9
-
-
0000867507
-
Minimum disclosure proofs of knowledge
-
G. Brassard, D. Chaum, C. Crepeau, "Minimum disclosure proofs of knowledge", J. Computer Syst. Sci. , vol. 37, pp. 156-189, 1988.
-
(1988)
J. Computer Syst. Sci.
, vol.37
, pp. 156-189
-
-
Brassard, G.1
Chaum, D.2
Crepeau, C.3
-
10
-
-
0026190385
-
Constant-round perfect zero-knowledge computationally convincing protocols
-
G. Brassard, C. Crepeau, M. Yung, "Constant-round perfect zero-knowledge computationally convincing protocols", Theoretical Computer Science, vol. 84, pp. 23-52, 1991.
-
(1991)
Theoretical Computer Science
, vol.84
, pp. 23-52
-
-
Brassard, G.1
Crepeau, C.2
Yung, M.3
-
12
-
-
0000182415
-
A measure of asymptotic eciency for tests of a hypothesis based on the sum of observations
-
H. Chernoff, "A measure of asymptotic eciency for tests of a hypothesis based on the sum of observations", Ann. Math. Statistics, vol. 23, pp. 493-507, 1952.
-
(1952)
Ann. Math. Statistics
, vol.23
, pp. 493-507
-
-
Chernoff, H.1
-
13
-
-
0010074899
-
Efficient Cryptographic Protocols Based on Noisy Channels
-
Springer
-
C. Crépeau, "Efficient Cryptographic Protocols Based on Noisy Channels", Advances in Cryptology: Proc. EUROCRYPT 1997 , pp. 306-317, Springer 1997.
-
(1997)
Advances in Cryptology: Proc. EUROCRYPT 1997
, pp. 306-317
-
-
Crépeau, C.1
-
14
-
-
0024132071
-
Achieving oblivious transfer using weakened security assumptions
-
IEEE
-
th FOCS, pp. 42-52. IEEE, 1988.
-
(1988)
th FOCS
, pp. 42-52
-
-
Crépeau, C.1
Kilian, J.2
-
16
-
-
84957697395
-
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
-
Springer
-
I. B. Damgård, J. Kilian, L. Salvail, "On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions", Advances in Cryptology: EUROCRYPT 1999, pp. 56-73, Springer 1999.
-
(1999)
Advances in Cryptology: EUROCRYPT 1999
, pp. 56-73
-
-
Damgård, I.B.1
Kilian, J.2
Salvail, L.3
-
17
-
-
84957608670
-
Efficient commitment schemes with bounded sender and unbounded receiver
-
Proc. CRYPTO 1995, Springer Verlag
-
S. Halevi, "Efficient commitment schemes with bounded sender and unbounded receiver", Proc. CRYPTO 1995, pp. 84-96. LNCS 963, Springer Verlag, 1995.
-
(1995)
LNCS
, vol.963
, pp. 84-96
-
-
Halevi, S.1
-
18
-
-
0037519332
-
Practical and Provably-Secure Commitment Schemes from Collision Free Hashing
-
Advances in Cryptology: CRYPTO 1996, pp. 201-215, Springer Verlag
-
S. Halevi, S. Micali, "Practical and Provably-Secure Commitment Schemes from Collision Free Hashing", Advances in Cryptology: CRYPTO 1996, pp. 201-215, LNCS 1109, Springer Verlag, 1996.
-
(1996)
LNCS
, vol.1109
-
-
Halevi, S.1
Micali, S.2
-
19
-
-
0002863426
-
Bounds for the quantity of information transmitted by a quantum channel
-
A. S. Holevo, "Bounds for the quantity of information transmitted by a quantum channel", Probl. Inf. Transm., vol. 9, no. 3, pp. 177-183, 1973.
-
(1973)
Probl. Inf. Transm.
, vol.9
, Issue.3
, pp. 177-183
-
-
Holevo, A.S.1
-
20
-
-
78149248764
-
Protocols for Secret Key Agreement by Public Discussion Based on Common Information
-
U. Maurer, "Protocols for Secret Key Agreement by Public Discussion Based on Common Information", Advances in Cryptology: CRYPTO 1992, pp. 461-470,
-
(1992)
Advances in Cryptology: CRYPTO
, pp. 461-470
-
-
Maurer, U.1
-
21
-
-
0027599802
-
Secret Key Agreement by Public Discussion
-
Springer 1993
-
Springer 1993. "Secret Key Agreement by Public Discussion", IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
-
22
-
-
0001336918
-
Unconditionally secure quantum bit commitment is impossible
-
D. Mayers, "Unconditionally secure quantum bit commitment is impossible", Phys. Rev. Letters, vol. 78, no. 17, pp. 3414-3417, 1997.
-
(1997)
Phys. Rev. Letters
, vol.78
, Issue.17
, pp. 3414-3417
-
-
Mayers, D.1
-
23
-
-
0001448484
-
Bit commitment using pseudo-randomness
-
M. Naor, "Bit commitment using pseudo-randomness", J. Cryptology, vol. 2, no. 2, pp. 151-158, 1991.
-
(1991)
J. Cryptology
, vol.2
, Issue.2
, pp. 151-158
-
-
Naor, M.1
-
25
-
-
85028762469
-
Secure commitments against a powerful adversary
-
Proc. STAGS 1992, Springer Verlag
-
R. Ostrovsky, R. Venkatesan, M. Yung, "Secure commitments against a powerful adversary", Proc. STAGS 1992, pp. 439-448, LNCS 577, Springer Verlag, 1992.
-
(1992)
LNCS
, vol.577
, pp. 439-448
-
-
Ostrovsky, R.1
Venkatesan, R.2
Yung, M.3
-
27
-
-
84856043672
-
A mathematical theory of communication
-
C. E. Shannon, "A mathematical theory of communication", Bell System Tech. Journal, vol. 27, pp. 379-423 and 623-656, 1948.
-
(1948)
Bell System Tech. Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
28
-
-
0016562514
-
The Wire Tap Channel
-
A. Wyner, "The Wire Tap Channel", Bell System Tech. Journal, vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell System Tech. Journal
, vol.54
, pp. 1355-1387
-
-
Wyner, A.1
|