-
1
-
-
85115374351
-
Algorithms for quantum computation: Discrete logarithms and factoring
-
NM, Nov., Cupertino, CA: IEEE Computer Society Press
-
P. W. Shot, "Algorithms for quantum computation: Discrete logarithms and factoring," in Proc. 35th Annu. Symp. Foundations of Computer Science (Santa Fe, NM, Nov. 1994). Cupertino, CA: IEEE Computer Society Press, 1994, pp. 124-134.
-
(1994)
Proc. 35th Annu. Symp. Foundations of Computer Science (Santa Fe
, pp. 124-134
-
-
Shot, P.W.1
-
2
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
3
-
-
0017495002
-
An extension of the Shannon theory approach to crypotgraphy
-
Mar
-
M. E. Hellman, "An extension of the Shannon theory approach to crypotgraphy," IEEE Trans. Inf. Theory, vol. IT-23, no. 2, pp. 289-294, Mar. 1977.
-
(1977)
IEEE Trans. Inf. Theory
, vol.IT-23
, Issue.2
, pp. 289-294
-
-
Hellman, M.E.1
-
4
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
New York, Dec
-
C. H. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proc. Int. Conf. Computers, Systems and Signal Processing, New York, Dec. 1984, p. 175.
-
(1984)
Proc. Int. Conf. Computers, Systems and Signal Processing
, pp. 175
-
-
Bennett, C.H.1
Brassard, G.2
-
5
-
-
0027629488
-
Common randomness in information theory and cryptography - Part I: Secret sharing
-
Jul
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography - Part I: Secret sharing," IEEE Trans. Inf. Theory vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
6
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
7
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels III: Privacy amplification
-
Apr
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels III: Privacy amplification," IEEE Trans. Inf. Theory vol. 49, no. 4, pp. 839-851, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.1
Wolf, S.2
-
8
-
-
0016562514
-
Wire-tap channel concept
-
A. Wyner, "Wire-tap channel concept," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.1
-
9
-
-
0017973511
-
Broadcast channel with confidential messages
-
Mar
-
I. Csiszár and J. Körner, "Broadcast channel with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 2, pp. 339-348, Mar. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.2
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
10
-
-
0019631740
-
Non-asymptotic estimates for efficiency of code jammmg in a wiretap channel
-
V. Korjik and V. Yakovlev, "Non-asymptotic estimates for efficiency of code jammmg in a wiretap channel," Probl. Inf. Transm., vol. 17, pp. 223-22, 1981.
-
(1981)
Probl. Inf. Transm
, vol.17
, pp. 223-322
-
-
Korjik, V.1
Yakovlev, V.2
-
11
-
-
45249091440
-
Capacity of communication channel with inner random coding
-
V. Korjik and V. Yakovlev, "Capacity of communication channel with inner random coding," Probl. Inf. Transm., vol. 28, pp. 317-325, 1992.
-
(1992)
Probl. Inf. Transm
, vol.28
, pp. 317-325
-
-
Korjik, V.1
Yakovlev, V.2
-
13
-
-
77951458752
-
Information-theoretically secure secret-key agreement by not authenticated public discussion
-
Berlin, Germany: Springer-Verlag
-
U. Maurer, "Information-theoretically secure secret-key agreement by not authenticated public discussion," in Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1997, vol. 1233, pp. 209-223.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 209-223
-
-
Maurer, U.1
-
14
-
-
78149248764
-
-
U. Maurer, Protocols for secret key agreement by public discussion based on common information, in Proc. CRYPTO (Lecture Notes in Computer Science), E. F. Brickell, Ed. Berlin, Germany: Springer-Verlag, 1992, 740, pp. 461-470.
-
U. Maurer, "Protocols for secret key agreement by public discussion based on common information," in Proc. CRYPTO (Lecture Notes in Computer Science), E. F. Brickell, Ed. Berlin, Germany: Springer-Verlag, 1992, vol. 740, pp. 461-470.
-
-
-
-
15
-
-
84958670019
-
Privacy amplification secure against active adversaries
-
Berlin, Germany: Springer-Verlag
-
U. Maurer and S. Wolf, "Privacy amplification secure against active adversaries," in Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1997, vol. 1294, pp. 307-321.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 307-321
-
-
Maurer, U.1
Wolf, S.2
-
16
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result
-
Apr
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 822-831
-
-
Maurer, U.1
Wolf, S.2
-
17
-
-
0037399113
-
Secret-key agreement over unauthenticated public channels II: The simulatability condition
-
Apr
-
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels II: The simulatability condition," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 832-838
-
-
Maurer, U.1
Wolf, S.2
-
18
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
Mar
-
U. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditional information," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.1
Wolf, S.2
-
19
-
-
84955584118
-
-
U. Maurer and S. Wolf, Towards characterizing when information-theoretic secret key agreement is possible, in Proc. ASIACRYPT (Lecture Notes in Computer Science), K. Kim and T. Matsumoto, Eds. Berlin, Germany: Springer-Verlag, 1996, 1163, pp. 196-209.
-
U. Maurer and S. Wolf, "Towards characterizing when information-theoretic secret key agreement is possible," in Proc. ASIACRYPT (Lecture Notes in Computer Science), K. Kim and T. Matsumoto, Eds. Berlin, Germany: Springer-Verlag, 1996, vol. 1163, pp. 196-209.
-
-
-
-
20
-
-
35248865664
-
Achievability of the key-capacity in a scenario of key sharing by public discussion in the presence of passive eavesdropper
-
Proc. Workshop on MMM-ACNS , Berlin, Germany: Springer-Verlag
-
V. Korzhik, V. Yakovlev, and A. Sinuk, "Achievability of the key-capacity in a scenario of key sharing by public discussion in the presence of passive eavesdropper," in Proc. Workshop on MMM-ACNS (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2003, vol. 2776, pp. 308-315.
-
(2003)
Lecture Notes in Computer Science
, vol.2776
, pp. 308-315
-
-
Korzhik, V.1
Yakovlev, V.2
Sinuk, A.3
-
21
-
-
35248843427
-
Key distribution based on noisy channel and error detecting codes
-
Proc. Workshop MMM-ACNS , Berlin, Germany: Springer-Verlag
-
V. Korzhik, V. Yakovlev, and A. Sinuk, "Key distribution based on noisy channel and error detecting codes," in Proc. Workshop MMM-ACNS (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2001, vol. 2052, pp. 242-250.
-
(2001)
Lecture Notes in Computer Science
, vol.2052
, pp. 242-250
-
-
Korzhik, V.1
Yakovlev, V.2
Sinuk, A.3
-
22
-
-
0028195832
-
Estimating the mutual interference of two sources in multiple access channel
-
V. Yakovlev, "Estimating the mutual interference of two sources in multiple access channel," Probl. Inf. Transm., vol. 30, pp. 11-26, 1994.
-
(1994)
Probl. Inf. Transm
, vol.30
, pp. 11-26
-
-
Yakovlev, V.1
-
23
-
-
0038309373
-
Extracting all the randomness and reducing the error in trevisan's extractors
-
R. Raz, O. Reingold, and S. P. Vadhan, "Extracting all the randomness and reducing the error in trevisan's extractors," J. Comput. Syst. Sci., vol. 65, no. 1, pp. 97-128, 2002.
-
(2002)
J. Comput. Syst. Sci
, vol.65
, Issue.1
, pp. 97-128
-
-
Raz, R.1
Reingold, O.2
Vadhan, S.P.3
-
24
-
-
0032624550
-
Construction of extractors using pseudo-random generators (extended abstract)
-
Atlanta, GA, May
-
L. Trevisan, "Construction of extractors using pseudo-random generators (extended abstract)," in Proc. 31st Annu. ACM Symp. Theory of Computing (STOC), Atlanta, GA, May 1999, pp. 141-148.
-
(1999)
Proc. 31st Annu. ACM Symp. Theory of Computing (STOC)
, pp. 141-148
-
-
Trevisan, L.1
-
25
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
Nov
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Trans. Antennas Propag., vol. 53, no. 11, pp. 3776-3784, Nov. 2005.
-
(2005)
IEEE Trans. Antennas Propag
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
26
-
-
18844455568
-
A scheme of private key agreement based on the channel characteristics in OFDM land mobile radio
-
A. Kitaura and H. Sasaoka, "A scheme of private key agreement based on the channel characteristics in OFDM land mobile radio," Electronics and Communications in Japan (Part III: Fundamental Electronic Science) vol. 88, no. 9, pp. 1-10, 2005.
-
(2005)
Electronics and Communications in Japan (Part III: Fundamental Electronic Science)
, vol.88
, Issue.9
, pp. 1-10
-
-
Kitaura, A.1
Sasaoka, H.2
-
27
-
-
45249117643
-
Performance Estimation of Secret Key Agreement System Exploiting an ESPAR Antenna and a Received Signal Strength Indicator, Institute of Electronics, Information and Communication Engineers, IEIC Tech
-
Rep. 682 RCS2003353-389
-
H. Mori, H. Sasaoka, and T. Ohira, Performance Estimation of Secret Key Agreement System Exploiting an ESPAR Antenna and a Received Signal Strength Indicator, Institute of Electronics, Information and Communication Engineers, IEIC Tech. Rep. 682 (RCS2003353-389), 2004, pp. 19-24.
-
(2004)
, pp. 19-24
-
-
Mori, H.1
Sasaoka, H.2
Ohira, T.3
-
28
-
-
38549116073
-
On the possibility of key agreement using variable directional antenna
-
Seoul, Korea, Sep
-
H. Imai, K. Kobara, and K. Morozov, "On the possibility of key agreement using variable directional antenna," in Proc. 1st Joint Workshop on Information Security, Seoul, Korea, Sep. 2006, pp. 1432-1436.
-
(2006)
Proc. 1st Joint Workshop on Information Security
, pp. 1432-1436
-
-
Imai, H.1
Kobara, K.2
Morozov, K.3
-
29
-
-
35248884195
-
Privacy amplification theorem for noisy main channel
-
Berlin, Germany: Springer-Verlag
-
V. Korjik, G. Morales-Luna, and V. Balakirsky, "Privacy amplification theorem for noisy main channel," in Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2001, vol. 2200, pp. 18-26.
-
(2001)
Lecture Notes in Computer Science
, vol.2200
, pp. 18-26
-
-
Korjik, V.1
Morales-Luna, G.2
Balakirsky, V.3
-
30
-
-
71049183202
-
Universal hashing and authentication codes
-
Berlin, Germany: Springer-Verlag
-
D. Stinson, "Universal hashing and authentication codes," in Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1992, vol. 576, pp. 74-85.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 74-85
-
-
Stinson, D.1
-
31
-
-
45249109952
-
Hybrid authentication based on noisy channels
-
V. I. Korzhik and G. Morales-Luna, "Hybrid authentication based on noisy channels," Int. J. Inf. Sec., vol. 1, no. 4, pp. 203-210, 2003.
-
(2003)
Int. J. Inf. Sec
, vol.1
, Issue.4
, pp. 203-210
-
-
Korzhik, V.I.1
Morales-Luna, G.2
-
32
-
-
0034449415
-
Information-theoretically secure keyless authentication
-
Sorrento, Italy, Jun
-
V. Korjik and M. Bakin, "Information-theoretically secure keyless authentication," in Proc. IEEE Int. Symp. Information Theory, Sorrento, Italy, Jun. 2000, p. 20.
-
(2000)
Proc. IEEE Int. Symp. Information Theory
, pp. 20
-
-
Korjik, V.1
Bakin, M.2
-
33
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.M.4
|