-
1
-
-
0027629488
-
Common randomness in information theory and cryptography, Part I: Secret sharing
-
Jul
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inf. Theory vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
3
-
-
0029706655
-
Almost independence and secrecy capacity
-
I. Csiszár, "Almost independence and secrecy capacity," Probl. Pered. Inform., vol. 32, no. 1, pp. 48-57, 1996.
-
(1996)
Probl. Pered. Inform
, vol.32
, Issue.1
, pp. 48-57
-
-
Csiszár, I.1
-
4
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
6
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
Mar
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
7
-
-
10644270917
-
The secret key capacity of multiple terminals
-
Dec
-
I. Csiszár and P. Narayan, "The secret key capacity of multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
9
-
-
45249097538
-
Communication for omniscience by a neutral observer and information-theoretic key agreement of multiple terminals
-
Nice, France, Jun
-
A. Gohari and V. Anantharam, "Communication for omniscience by a neutral observer and information-theoretic key agreement of multiple terminals," in Proc. 2007 IEEE Int. Symp. Information Theory, Nice, France, Jun. 2007, pp. 2056-2060.
-
(2007)
Proc. 2007 IEEE Int. Symp. Information Theory
, pp. 2056-2060
-
-
Gohari, A.1
Anantharam, V.2
-
11
-
-
34447344072
-
Generalized entropy power inequalities and monotonicity properties of information
-
Jul
-
M. Madiman and A. Barron, "Generalized entropy power inequalities and monotonicity properties of information," IEEE Trans. Inf. Theory, vol. 53, no. 7, pp. 2317-2329, Jul. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.7
, pp. 2317-2329
-
-
Madiman, M.1
Barron, A.2
-
12
-
-
33749446548
-
Provably secure key distribution based on independent channels
-
presented at the, Eindhoven, The Netherlands, Jun
-
U. M. Maurer, "Provably secure key distribution based on independent channels," presented at the IEEE Workshop Information Theory, Eindhoven, The Netherlands, Jun. 1990.
-
(1990)
IEEE Workshop Information Theory
-
-
Maurer, U.M.1
-
13
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
14
-
-
45249108187
-
-
U. M. Maurer, The strong secret key rate of discrete random triples, in Communications and Cryptography: Two Sides of One Tapestry, R. E. Blahut, Ed. et al. Norwell, MA: Kluwer, 1994, ch. 26, pp. 271-285.
-
U. M. Maurer, "The strong secret key rate of discrete random triples," in Communications and Cryptography: Two Sides of One Tapestry, R. E. Blahut, Ed. et al. Norwell, MA: Kluwer, 1994, ch. 26, pp. 271-285.
-
-
-
-
15
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
Mar
-
U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditional information," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
16
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Proc. EUROCRYPT 2000 , Berlin, Germany: Springer-Verlag
-
U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proc. EUROCRYPT 2000 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2000, pp. 352-368.
-
(2000)
Lecture Notes in Computer Science
, pp. 352-368
-
-
Maurer, U.M.1
Wolf, S.2
-
17
-
-
35248888499
-
New bounds in secret-key agreement: The gap between formation and secrecy extraction
-
Proc. EUROCRYPT 2003 , Berlin, Germany: Springer-Verlag
-
R. Renner and S. Wolf, "New bounds in secret-key agreement: The gap between formation and secrecy extraction," in Proc. EUROCRYPT 2003 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2003, vol. 2656, pp. 526-577.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 526-577
-
-
Renner, R.1
Wolf, S.2
-
18
-
-
0016562514
-
The wiretap channel
-
A. D. Wyner, "The wiretap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
|