-
1
-
-
0027629488
-
Common randomness in information theory and cryptography - part I: Secret sharing
-
Ahlswede, R., Csiszár, I.: Common randomness in information theory and cryptography - part I: Secret sharing. IEEE Transactions on Information Theory 39(4), 1121-1132 (1993)
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
0029405656
-
Generalized privacy amplification
-
Bennett, C.H., Brassard, G., Crépeau, C., Maurer, U.: Generalized privacy amplification. IEEE Transactions on Information Theory 41(6), 1915-1923 (1995)
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
3
-
-
0023985539
-
Privacy amplification by public discussion
-
Bennett, C.H., Brassard, G., Robert, J.-M.: Privacy amplification by public discussion. SIAM Journal on Computing 17(2), 210-229 (1988)
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
4
-
-
85027496257
-
Secret-key reconciliation by public discussion
-
Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
-
Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 410-423. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 410-423
-
-
Brassard, G.1
Salvail, L.2
-
8
-
-
0016486048
-
A proof of the data compression theorem of Slepian and Wolf for ergodic sources
-
Cover, T.: A proof of the data compression theorem of Slepian and Wolf for ergodic sources. IEEE Transactions on Information Theory 21, 226-228 (1975)
-
(1975)
IEEE Transactions on Information Theory
, vol.21
, pp. 226-228
-
-
Cover, T.1
-
10
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
11
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
ACM Press, New York
-
Impagliazzo, R., Levin, L.A., Luby, M.: Pseudo-random generation from one-way functions. In: Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC 1989), pp. 12-24. ACM Press, New York (1989)
-
(1989)
Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
12
-
-
0027599802
-
Secret key agreement by public discussion
-
Maurer, U.: Secret key agreement by public discussion. IEEE Transaction on Information Theory 39(3), 733-742 (1993)
-
(1993)
IEEE Transaction on Information Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
13
-
-
0141937796
-
On the problem of generating mutually independent random sequences
-
Muramatsu, J., Koga, H., Mukouchi, T.: On the problem of generating mutually independent random sequences. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 86(5), 1275-1284 (2003)
-
(2003)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.86
, Issue.5
, pp. 1275-1284
-
-
Muramatsu, J.1
Koga, H.2
Mukouchi, T.3
-
14
-
-
84958670019
-
Privacy amplification secure against active adversaries
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Maurer, U., Wolf, S.: Privacy amplification secure against active adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 307-321. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 307-321
-
-
Maurer, U.1
Wolf, S.2
-
15
-
-
33846181385
-
-
PhD thesis, ETH Zurich, Switzerland
-
Renner, R.: Security of Quantum Key Distribution. PhD thesis, ETH Zurich, Switzerland (2005), http://arxiv.org/abs/quant-ph/0512258
-
(2005)
Security of Quantum Key Distribution
-
-
Renner, R.1
-
16
-
-
33646767482
-
Simple and tight bounds for information reconciliation and privacy amplification
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Renner, R., Wolf, S.: Simple and tight bounds for information reconciliation and privacy amplification. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 199-216. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 199-216
-
-
Renner, R.1
Wolf, S.2
-
18
-
-
84856043672
-
A mathematical theory of communication
-
Shannon, C.E.: A mathematical theory of communication. Bell System Tech. Journal 27, 379-423, 623-656 (1948)
-
(1948)
Bell System Tech. Journal
, vol.27
, Issue.379-423
, pp. 623-656
-
-
Shannon, C.E.1
-
20
-
-
38049160265
-
Oblivious-transfer amplification
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Wullschleger, J.: Oblivious-transfer amplification. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 555-572. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 555-572
-
-
Wullschleger, J.1
|