-
1
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
IEEE
-
C. H. Bennett and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175-179. IEEE, 1984.
-
(1984)
Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
2
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, Generalized privacy amplification, IEEE Transactions on Information Theory, Vol. 41, No. 6, 1915-1923, 1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
3
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J. M. Robert, Privacy amplification by public discussion. SIAM Journal on Computing, Vol. 17, pp. 210-229, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.M.3
-
4
-
-
85027496257
-
Secret-key reconciliation by public discussion
-
LNCS, Vol. 765. Springer-Verlag
-
G. Brassard and L. Salvail, Secret-key reconciliation by public discussion, EUROCRYPT '93, LNCS, Vol. 765, pp. 410-423. Springer-Verlag, 1994.
-
(1994)
EUROCRYPT '93
, pp. 410-423
-
-
Brassard, G.1
Salvail, L.2
-
5
-
-
84957375876
-
Smooth entropy and Rényi entropy
-
LNCS, Vol. 1233. Springer-Verlag
-
C. Cachin, Smooth entropy and Rényi entropy, EUROCRYPT '97, LNCS, Vol. 1233, pp. 193-208. Springer-Verlag, 1997.
-
(1997)
EUROCRYPT '97
, pp. 193-208
-
-
Cachin, C.1
-
6
-
-
0004013982
-
-
Ph. D. Thesis, ETH Zürich, Hartung-Gorre Verlag, Konstanz
-
C. Cachin, Entropy Measures and Unconditional Security in Cryptography, Ph. D. Thesis, ETH Zürich, Hartung-Gorre Verlag, Konstanz, 1997.
-
(1997)
Entropy Measures and Unconditional Security in Cryptography
-
-
Cachin, C.1
-
10
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
LNCS, Vol. 3027. Springer-Verlag
-
Y. Dodis, L. Reyzin, and A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, EUROCRYPT 2004, LNCS, Vol. 3027, pp. 523-540. Springer-Verlag, 2004.
-
(2004)
EUROCRYPT 2004
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
11
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby, A pseudorandom generator from any one-way function, SIAM Journal on Computing, Vol. 28, No. 4, pp. 1364-1396, 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
13
-
-
0024866111
-
Pseudo-random generation from one-way functions (extended abstract)
-
R. Impagliazzo, L. A. Levin, and M. Luby, Pseudo-random generation from one-way functions (extended abstract), Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing (STOC '89), pp. 12-24, 1989.
-
(1989)
Proceedings of the Twenty-first Annual ACM Symposium on Theory of Computing (STOC '89)
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
14
-
-
0004255345
-
Pairwise independence and derandomization
-
Computer Science Institute, Berkeley, CA
-
M. Luby and A. Wigderson, Pairwise independence and derandomization, Technical Report CSD-95-880, Computer Science Institute, Berkeley, CA, 1995. http://citeseer.ist.psu.edu/luby95pairwise.html.
-
(1995)
Technical Report
, vol.CSD-95-880
-
-
Luby, M.1
Wigderson, A.2
-
15
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer, Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, Vol. 39, No. 3, pp. 733-742, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
17
-
-
27144550522
-
Information-theoretic security proof for quantum-key-distribution protocols
-
R. Renner, N. Gisin, and B. Kraus, Information-theoretic security proof for quantum-key-distribution protocols, Physical Review A, Vol. 72, 012332, 2005.
-
(2005)
Physical Review A
, vol.72
, pp. 012332
-
-
Renner, R.1
Gisin, N.2
Kraus, B.3
-
18
-
-
24144485355
-
Universally composable privacy amplification against quantum adversaries
-
LNCS, Vol. 3378. Springer-Verlag
-
R. Renner and R. König, Universally composable privacy amplification against quantum adversaries, Proc. of TCC 2005, LNCS, Vol. 3378, pp. 407-425. Springer-Verlag, 2005.
-
(2005)
Proc. of TCC 2005
, pp. 407-425
-
-
Renner, R.1
König, R.2
-
22
-
-
0001998264
-
Conjugate coding
-
S. Wiesner, Conjugate coding, SIGACT News, Vol. 15, pp. 78-88, 1983.
-
(1983)
SIGACT News
, vol.15
, pp. 78-88
-
-
Wiesner, S.1
-
23
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, The wire-tap channel, Bell System Technical Journal, Vol. 54, No. 8, pp. 1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
|