-
1
-
-
0027629488
-
Common randomness in information theory and cryptography, Part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C. H. Bennett, G. Brassard, C. Crépeau and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inform. Theory, vol. 41, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inform. Theory
, vol.41
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
4
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
March
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inform. Theory, vol. 46, pp. 344-366, March 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
5
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals, " IEEE Trans. Inform. Theory, vol. 50, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
6
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
7
-
-
0005059185
-
The strong secret key rate of discrete random triples
-
R.E. Blahut et al., Eds, Kluwer, Norwell, MA, Ch. 26
-
U. M. Maurer, "The strong secret key rate of discrete random triples," Communications and Cryptography: Two Sides of One Tapestry, R.E. Blahut et al., Eds, Kluwer, Norwell, MA, Ch. 26, pp. 271-285, 1994.
-
(1994)
Communications and Cryptography: Two Sides of One Tapestry
, pp. 271-285
-
-
Maurer, U.M.1
-
8
-
-
84958670019
-
Privacy amplification secure against active adversaries
-
B. Kaliski, Ed., New York, NY: Springer
-
U. Maurer and S. Wolf, "Privacy amplification secure against active adversaries," in Advances in Cryptology-CRYPTO'97, Lecture Notes in Computer Science, B. Kaliski, Ed., New York, NY: Springer, 1997, pp. 307-321.
-
(1997)
Advances in Cryptology-CRYPTO'97, Lecture Notes in Computer Science
, pp. 307-321
-
-
Maurer, U.1
Wolf, S.2
-
9
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
Mar.
-
U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditional information," IEEE Trans. Inform. Theory, vol. 45, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
10
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Lecture notes in Computer Science, Springer Verlag
-
U. M. Maurer and S. Wolf, "Information-theoretic key agreement: from weak to strong secrecy for free," Proc. EUROCRYPT 2000, Lecture notes in Computer Science, pp. 352-368, Springer Verlag, 2000.
-
(2000)
Proc. EUROCRYPT 2000
, pp. 352-368
-
-
Maurer, U.M.1
Wolf, S.2
-
11
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result
-
Apr.
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part I: Definitions and a completeness result," IEEE Trans. Inform. Theory, vol. 49, pp. 822-831, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 822-831
-
-
Maurer, U.1
Wolf, S.2
-
12
-
-
0037399113
-
Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition
-
Apr.
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels - Part II: The simulatability condition," IEEE Trans. Inform. Theory, vol. 49, pp. 832-838, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 832-838
-
-
Maurer, U.1
Wolf, S.2
-
13
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels-Part III: Privacy amplification
-
Apr.
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part III: Privacy amplification," IEEE Trans. Inform. Theory, vol. 49, pp. 839-851, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 839-851
-
-
Maurer, U.1
Wolf, S.2
-
14
-
-
35248888499
-
New bounds in secret-key agreement: The gap between formation and secrecy extraction
-
E. Biham, Ed., Heidelberg, Germany: Springer-Verlag
-
R. Renner and S. Wolf, "New bounds in secret-key agreement: the gap between formation and secrecy extraction," Proc. EUROCRYPT'03, Lecture Notes in Computer Science, E. Biham, Ed., Heidelberg, Germany: Springer-Verlag, 2003, pp. 562-577.
-
(2003)
Proc. EUROCRYPT'03, Lecture Notes in Computer Science
, pp. 562-577
-
-
Renner, R.1
Wolf, S.2
-
15
-
-
5044250721
-
The private key capacity region for three terminals
-
Chicago, USA, June
-
C. Ye and P. Narayan, "The private key capacity region for three terminals," 2004 IEEE Intl. Symp. Inform. Theory, p. 44, Chicago, USA, June 2004.
-
(2004)
2004 IEEE Intl. Symp. Inform. Theory
, pp. 44
-
-
Ye, C.1
Narayan, P.2
|