메뉴 건너뛰기




Volumn 3027, Issue , 2004, Pages 109-125

The exact price for unconditionally secure asymmetric cryptography

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMPUTATION THEORY; CRYPTOGRAPHY; INFORMATION THEORY; PUBLIC KEY CRYPTOGRAPHY;

EID: 27144457211     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24676-3_7     Document Type: Article
Times cited : (32)

References (22)
  • 8
    • 35048889704 scopus 로고    scopus 로고
    • Fooling an unbounded adversary with a short key: A notion of indistinguishability
    • manuscript
    • Y. Dodis and A. Smith, Fooling an unbounded adversary with a short key: a notion of indistinguishability, relations to extractors, and lower bounds, manuscript, 2003.
    • (2003) Relations to Extractors, and Lower Bounds
    • Dodis, Y.1    Smith, A.2
  • 9
    • 0036957025 scopus 로고    scopus 로고
    • On the (non)universality of the one-time pad
    • Y. Dodis and J. Spencer, On the (non)universality of the one-time pad, Proceedings of FOCS 2002, 376-385, 2002.
    • (2002) Proceedings of FOCS 2002 , pp. 376-385
    • Dodis, Y.1    Spencer, J.2
  • 10
    • 0004137776 scopus 로고
    • Massachusetts Institute of Technology, Cambridge, Massachusetts
    • G. D. Forney Jr., Concatenated codes, Massachusetts Institute of Technology, Cambridge, Massachusetts, 1966.
    • (1966) Concatenated Codes
    • Forney Jr., G.D.1
  • 11
    • 85013455236 scopus 로고
    • Codes for interactive authentication
    • LNCS, Springer-Verlag
    • P. Gemmell and M. Naor, Codes for interactive authentication, Advances in Cryptology - CRYPTO '93, LNCS, Vol. 773, 355-367, Springer-Verlag, 1993.
    • (1993) Advances in Cryptology - CRYPTO '93 , vol.773 , pp. 355-367
    • Gemmell, P.1    Naor, M.2
  • 13
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. M. Maurer, Secret key agreement by public discussion from common information, IEEE Trans, on Information Theory, Vol. 39, No. 3, 733-742, 1993.
    • (1993) IEEE Trans, on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 14
    • 77951458752 scopus 로고    scopus 로고
    • Information-theoretically secure secret-key agreement by NOT authenticated public discussion
    • LNCS, Springer-Verlag
    • U. M. Maurer, Information-theoretically secure secret-key agreement by NOT authenticated public discussion, Advances in Cryptology - EUROCRYPT '97, LNCS, Vol. 1233, 209-225, Springer-Verlag, 1997.
    • (1997) Advances in Cryptology - EUROCRYPT '97 , vol.1233 , pp. 209-225
    • Maurer, U.M.1
  • 15
    • 84957050617 scopus 로고    scopus 로고
    • Information-theoretic cryptography
    • LNCS, Springer-Verlag
    • U. M. Maurer, Information-theoretic cryptography, Advances in Cryptology - CRYPTO '99, LNCS, Vol. 1666, 47-64, Springer-Verlag, 1999.
    • (1999) Advances in Cryptology - CRYPTO '99 , vol.1666 , pp. 47-64
    • Maurer, U.M.1
  • 16
    • 0030232808 scopus 로고    scopus 로고
    • A calculus for security bootstrapping in distributed systems
    • U. M. Maurer and P. Schmid, A calculus for security bootstrapping in distributed systems, Journal of Computer Security, Vol. 4, No. 1, 55-80, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.1 , pp. 55-80
    • Maurer, U.M.1    Schmid, P.2
  • 17
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels - Parts I-III
    • U. M. Maurer and S. Wolf, Secret-key agreement over unauthenticated public channels - Parts I-III, IEEE Trans, on Information Theory, Vol. 49, No. 4, 822-851, 2003.
    • (2003) IEEE Trans, on Information Theory , vol.49 , Issue.4 , pp. 822-851
    • Maurer, U.M.1    Wolf, S.2
  • 18
    • 0012524233 scopus 로고    scopus 로고
    • On the impossibility of private key cryptography with weakly random keys
    • LNCS, Springer-Verlag, 1990.
    • J. L. McInnes and B. Pinkas, On the impossibility of private key cryptography with weakly random keys, Advances in Cryptology - CRYPTO '90, LNCS, Vol. 537, 4421-4436, Springer-Verlag, 1990.
    • Advances in Cryptology - CRYPTO '90 , vol.537 , pp. 4421-4436
    • McInnes, J.L.1    Pinkas, B.2
  • 19
    • 35048874991 scopus 로고    scopus 로고
    • Unconditional authenticity and privacy from an arbitrarily weak secret and completely insecure communication
    • Springer-Verlag LNCS
    • R. Renner and S. Wolf, Unconditional authenticity and privacy from an arbitrarily weak secret and completely insecure communication, Advances in Cryptology - CRYPTO 2003, LNCS, Vol. 2729, 78-95, Springer-Verlag, 2003.
    • (2003) Advances in Cryptology - CRYPTO 2003 , vol.2729 , pp. 78-95
    • Renner, R.1    Wolf, S.2
  • 20
    • 84947270656 scopus 로고    scopus 로고
    • How to fool an unbounded adversary with a short key
    • LNCS, Springer-Verlag
    • A. Russell and H. Wang, How to fool an unbounded adversary with a short key, Advances in Cryptology - EUROCRYPT 2002, LNCS, Vol. 2332, 133-148, Springer-Verlag, 2002.
    • (2002) Advances in Cryptology - EUROCRYPT 2002 , vol.2332 , pp. 133-148
    • Russell, A.1    Wang, H.2
  • 21
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28, 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 22
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, The wire-tap channel, Bell System Technical Journal, Vol. 54, No. 8, 1355-1387, 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.