-
2
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Cŕepeau, and U. M. Maurer, Generalized privacy amplification, IEEE Trans, on Information Theory, Vol. 41, No. 6, 1915-1923, 1995.
-
(1995)
IEEE Trans, on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Cŕepeau, C.3
Maurer, U.M.4
-
3
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert, Privacy amplification by public discussion, SIAM Journal on Computing, Vol. 17, 210-229, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
4
-
-
0004013982
-
-
Ph. D. Thesis, ETH Zürich, Hartung-Gorre Verlag, Konstanz
-
C. Cachin, Entropy measures and unconditional security in cryptography, Ph. D. Thesis, ETH Zürich, Hartung-Gorre Verlag, Konstanz, 1997.
-
(1997)
Entropy Measures and Unconditional Security in Cryptography
-
-
Cachin, C.1
-
6
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszár and J. Körner, Broadcast channels with confidential messages, IEEE Trans, on Information Theory, Vol. 24, 339-348, 1978.
-
(1978)
IEEE Trans, on Information Theory
, vol.24
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
7
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Trans, on Information Theory, Vol. 22, No. 6, 644-654, 1976.
-
(1976)
IEEE Trans, on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
8
-
-
35048889704
-
Fooling an unbounded adversary with a short key: A notion of indistinguishability
-
manuscript
-
Y. Dodis and A. Smith, Fooling an unbounded adversary with a short key: a notion of indistinguishability, relations to extractors, and lower bounds, manuscript, 2003.
-
(2003)
Relations to Extractors, and Lower Bounds
-
-
Dodis, Y.1
Smith, A.2
-
9
-
-
0036957025
-
On the (non)universality of the one-time pad
-
Y. Dodis and J. Spencer, On the (non)universality of the one-time pad, Proceedings of FOCS 2002, 376-385, 2002.
-
(2002)
Proceedings of FOCS 2002
, pp. 376-385
-
-
Dodis, Y.1
Spencer, J.2
-
10
-
-
0004137776
-
-
Massachusetts Institute of Technology, Cambridge, Massachusetts
-
G. D. Forney Jr., Concatenated codes, Massachusetts Institute of Technology, Cambridge, Massachusetts, 1966.
-
(1966)
Concatenated Codes
-
-
Forney Jr., G.D.1
-
11
-
-
85013455236
-
Codes for interactive authentication
-
LNCS, Springer-Verlag
-
P. Gemmell and M. Naor, Codes for interactive authentication, Advances in Cryptology - CRYPTO '93, LNCS, Vol. 773, 355-367, Springer-Verlag, 1993.
-
(1993)
Advances in Cryptology - CRYPTO '93
, vol.773
, pp. 355-367
-
-
Gemmell, P.1
Naor, M.2
-
13
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer, Secret key agreement by public discussion from common information, IEEE Trans, on Information Theory, Vol. 39, No. 3, 733-742, 1993.
-
(1993)
IEEE Trans, on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
14
-
-
77951458752
-
Information-theoretically secure secret-key agreement by NOT authenticated public discussion
-
LNCS, Springer-Verlag
-
U. M. Maurer, Information-theoretically secure secret-key agreement by NOT authenticated public discussion, Advances in Cryptology - EUROCRYPT '97, LNCS, Vol. 1233, 209-225, Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology - EUROCRYPT '97
, vol.1233
, pp. 209-225
-
-
Maurer, U.M.1
-
15
-
-
84957050617
-
Information-theoretic cryptography
-
LNCS, Springer-Verlag
-
U. M. Maurer, Information-theoretic cryptography, Advances in Cryptology - CRYPTO '99, LNCS, Vol. 1666, 47-64, Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology - CRYPTO '99
, vol.1666
, pp. 47-64
-
-
Maurer, U.M.1
-
16
-
-
0030232808
-
A calculus for security bootstrapping in distributed systems
-
U. M. Maurer and P. Schmid, A calculus for security bootstrapping in distributed systems, Journal of Computer Security, Vol. 4, No. 1, 55-80, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.1
, pp. 55-80
-
-
Maurer, U.M.1
Schmid, P.2
-
17
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels - Parts I-III
-
U. M. Maurer and S. Wolf, Secret-key agreement over unauthenticated public channels - Parts I-III, IEEE Trans, on Information Theory, Vol. 49, No. 4, 822-851, 2003.
-
(2003)
IEEE Trans, on Information Theory
, vol.49
, Issue.4
, pp. 822-851
-
-
Maurer, U.M.1
Wolf, S.2
-
18
-
-
0012524233
-
On the impossibility of private key cryptography with weakly random keys
-
LNCS, Springer-Verlag, 1990.
-
J. L. McInnes and B. Pinkas, On the impossibility of private key cryptography with weakly random keys, Advances in Cryptology - CRYPTO '90, LNCS, Vol. 537, 4421-4436, Springer-Verlag, 1990.
-
Advances in Cryptology - CRYPTO '90
, vol.537
, pp. 4421-4436
-
-
McInnes, J.L.1
Pinkas, B.2
-
19
-
-
35048874991
-
Unconditional authenticity and privacy from an arbitrarily weak secret and completely insecure communication
-
Springer-Verlag LNCS
-
R. Renner and S. Wolf, Unconditional authenticity and privacy from an arbitrarily weak secret and completely insecure communication, Advances in Cryptology - CRYPTO 2003, LNCS, Vol. 2729, 78-95, Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology - CRYPTO 2003
, vol.2729
, pp. 78-95
-
-
Renner, R.1
Wolf, S.2
-
20
-
-
84947270656
-
How to fool an unbounded adversary with a short key
-
LNCS, Springer-Verlag
-
A. Russell and H. Wang, How to fool an unbounded adversary with a short key, Advances in Cryptology - EUROCRYPT 2002, LNCS, Vol. 2332, 133-148, Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology - EUROCRYPT 2002
, vol.2332
, pp. 133-148
-
-
Russell, A.1
Wang, H.2
-
21
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28, 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
22
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, The wire-tap channel, Bell System Technical Journal, Vol. 54, No. 8, 1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
|