-
1
-
-
0027629488
-
Common randomness in information theory and cryptography. Part I: Secret sharing
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography. Part I: Secret sharing", IEEE Trans. Inf. Th., Vol. 39, No. 4, pp. 1121-1132, 1993.
-
(1993)
IEEE Trans. Inf. Th
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszár and J. Korner, "Broadcast channels with confidential messages", IEEE Trans. Inf. Th., Vol. 24, No. 3, pp. 339-348, 1978.
-
(1978)
IEEE Trans. Inf. Th
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Korner, J.2
-
4
-
-
10644270917
-
Secrecy Capacities for Multiple Terminals
-
I. Csiszár and P. Narayan, "Secrecy Capacities for Multiple Terminals", IEEE Trans. Inf. Th., Vol. 50, No. 12, 3047-3061, 2004.
-
(2004)
IEEE Trans. Inf. Th
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
5
-
-
33749441153
-
Secrecy Capacities for Multiterminal Channel Models
-
I. Csiszár and P. Narayan, "Secrecy Capacities for Multiterminal Channel Models", Proc. IEEE Int. Symp. on Inf. Th., pp. 2138-2141, 2005.
-
(2005)
Proc. IEEE Int. Symp. on Inf. Th
, pp. 2138-2141
-
-
Csiszár, I.1
Narayan, P.2
-
6
-
-
45249097538
-
Communication for omniscience by a neutral observer and information-theoretic key agreement of multiple terminals
-
Amin A. Gohari and V. Anantharam, "Communication for omniscience by a neutral observer and information-theoretic key agreement of multiple terminals", Proc. IEEE Int. Symp. on Inf. Th., pp. 2056-2060, 2007.
-
(2007)
Proc. IEEE Int. Symp. on Inf. Th
, pp. 2056-2060
-
-
Gohari, A.A.1
Anantharam, V.2
-
9
-
-
0027599802
-
Secret Key Agreement by Public Discussion From Common Information
-
Ueli M. Maurer, "Secret Key Agreement by Public Discussion From Common Information", IEEE Trans. Inf. Th., Vol. 39, No. 3, pp. 733-742, 1993.
-
(1993)
IEEE Trans. Inf. Th
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
10
-
-
0034450066
-
From Weak to Strong Information-Theoretic Key Agreement
-
Ueli M. Maurer and S. Wolf, "From Weak to Strong Information-Theoretic Key Agreement", Proc. IEEE Int. Symp. on Inf. Th., p. 18, 2000.
-
(2000)
Proc. IEEE Int. Symp. on Inf. Th
, pp. 18
-
-
Maurer, U.M.1
Wolf, S.2
-
11
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
Ueli M. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditional information", IEEE Trans. Inf. Th., Vol. 45, No. 2, pp. 499-514, 1999.
-
(1999)
IEEE Trans. Inf. Th
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
12
-
-
35248888499
-
New Bounds in Secret-Key Agreement: The Gap Between Formation and Secrecy Extraction
-
Springer-Verlag
-
R. Renner and S. Wolf, "New Bounds in Secret-Key Agreement: The Gap Between Formation and Secrecy Extraction", Proc. EUROCRYPT 2003, vol. 2656, pp. 562-577, Springer-Verlag, 2003.
-
(2003)
Proc. EUROCRYPT 2003
, vol.2656
, pp. 562-577
-
-
Renner, R.1
Wolf, S.2
-
13
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
C.E. Shannon, "Communication Theory of Secrecy Systems", Bell System Technical Journal, Vol. 28, No. 4, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
14
-
-
0016562514
-
The Wiretap Channel
-
A. D. Wyner, "The Wiretap Channel", Bell System Technical Journal, Vol. 54, No. 8, pp. 1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
|