-
2
-
-
0027629488
-
Common randomness in information theory and cryptography - part i: Secret sharing
-
R. Ahlswede and I. Csiszar. Common randomness in information theory and cryptography - part i: Secret sharing. In IEEE Tran. on Information Theory, volume 39, pages 1121-1132, 1993.
-
(1993)
IEEE Tran. on Information Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
3
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crepeau, and U. Maurer. Generalized privacy amplification. In IEEE Tran. on Information Theory, volume 41, pages 1915-1923, 1995.
-
(1995)
IEEE Tran. on Information Theory
, vol.41
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.4
-
4
-
-
45249104850
-
Wireless information-theoretic security
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. McLaughlin. Wireless information-theoretic security. In IEEE Tran. on Information Theory, volume 54, 2008.
-
(2008)
IEEE Tran. on Information Theory
, vol.54
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.4
-
5
-
-
0037623983
-
-
D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. In SIAM J. Computing, pages 32(3): 586-615, 2003.
-
D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. In SIAM J. Computing, pages 32(3): 586-615, 2003.
-
-
-
-
6
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszar and J. Korner. Broadcast channels with confidential messages. In IEEE Tran. on Information Theory, volume 24, pages 339-348, 1978.
-
(1978)
IEEE Tran. on Information Theory
, vol.24
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
8
-
-
80052732741
-
Robust fuzzy extractors and authenticated key agreement from close secrets
-
Y. Dodis, J. Katz, L. Reyzin, and A. Smith. Robust fuzzy extractors and authenticated key agreement from close secrets. In In Cynthia Dwork, editor, Advances in Cryptology - CRYPTO, 2006.
-
(2006)
In Cynthia Dwork, editor, Advances in Cryptology - CRYPTO
-
-
Dodis, Y.1
Katz, J.2
Reyzin, L.3
Smith, A.4
-
9
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In SIAM Journal on Computing, volume 38, 2008.
-
(2008)
SIAM Journal on Computing
, vol.38
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
10
-
-
0016562514
-
The wire-tap channel
-
A. D.Wyner. The wire-tap channel. In Bell Syst. Tech. J., volume 54, pages 1355-1367, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1367
-
-
Wyner, A.D.1
-
12
-
-
15344350656
-
An overview of public key cryptography
-
Martin E. Hellman. An overview of public key cryptography. In IEEE Communications Magazine, pages 42-49, 2002.
-
(2002)
IEEE Communications Magazine
, pp. 42-49
-
-
Hellman, M.E.1
-
13
-
-
0347337828
-
III. Secure space-time communication
-
A. O. Hero. III. Secure space-time communication. In IEEE Tran. on Information Theory, volume 49, pages 3235-3249, 2003.
-
(2003)
IEEE Tran. on Information Theory
, vol.49
, pp. 3235-3249
-
-
Hero, A.O.1
-
14
-
-
4544304392
-
A mimo system with reciprocal transceivers for the time-division duplex mode
-
V. Jungnickel, U. Kruger, G. Istoc, T. Haustein, and C. von Helmolt. A mimo system with reciprocal transceivers for the time-division duplex mode. In IEEE Intenational Symposium, Antennas and Propagation Society, 2004.
-
(2004)
IEEE Intenational Symposium, Antennas and Propagation Society
-
-
Jungnickel, V.1
Kruger, U.2
Istoc, G.3
Haustein, T.4
von Helmolt, C.5
-
15
-
-
45249092485
-
Secure broadcasting over fading channels
-
A. Khisti, A. Tchamkerten, and G.W. Wornell. Secure broadcasting over fading channels. In IEEE Tran. on Information Theory, volume 54, pages 2453-2469, 2008.
-
(2008)
IEEE Tran. on Information Theory
, vol.54
, pp. 2453-2469
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.W.3
-
17
-
-
60449113417
-
-
Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. In ACM Trans. on Sensor Networks, 5, issue 1, 2009.
-
Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. In ACM Trans. on Sensor Networks, vol. 5, issue 1, 2009.
-
-
-
-
18
-
-
77749255894
-
A randomized space-time transmission scheme for secret-key agreement
-
Baltimore, MD, USA
-
X. Li, M. Chen, and E. P. Ratazzi. A randomized space-time transmission scheme for secret-key agreement. In 39th Conference on Information Sciences and Systems, CISS, Baltimore, MD, USA, 2005.
-
(2005)
39th Conference on Information Sciences and Systems, CISS
-
-
Li, X.1
Chen, M.2
Ratazzi, E.P.3
-
20
-
-
84947597805
-
Towards the equivalence of breaking the diffie-hellman protocol and computing discrete logarithms
-
Springer-Verlag
-
U. Maurer. Towards the equivalence of breaking the diffie-hellman protocol and computing discrete logarithms. In Advances in Cryptology - Crypto '94, Springer-Verlag, pages 271-281, 1994.
-
(1994)
Advances in Cryptology - Crypto '94
, pp. 271-281
-
-
Maurer, U.1
-
21
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer. Secret key agreement by public discussion from common information. In IEEE Tran. on Information Theory, volume 39, pages 733-742, 1993.
-
(1993)
IEEE Tran. on Information Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
22
-
-
0037356065
-
Distributed source coding using syndromes (discus): Design and construction
-
S.S. Pradhan and K. Ramchandran. Distributed source coding using syndromes (discus): design and construction. In IEEE Tran. on Information Theory, volume 49, pages 626-643, 2003.
-
(2003)
IEEE Tran. on Information Theory
, vol.49
, pp. 626-643
-
-
Pradhan, S.S.1
Ramchandran, K.2
-
23
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology, Crypto '84, Lecture Notes in Computer Science, Springer-Verlag, pages vol. 196, pp. 47-53, 1984.
-
(1984)
Advances in Cryptology, Crypto '84, Lecture Notes in Computer Science, Springer-Verlag
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
24
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon. Communication theory of secrecy systems. In Bell Syst. Tech. J., volume 28, pages 656-715, 1948.
-
(1948)
Bell Syst. Tech. J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
25
-
-
0015648934
-
Noiseless coding of correlated information sources
-
D. Slepian and J. K. Wolf. Noiseless coding of correlated information sources. In IEEE Tran. on Information Theory, volume 19, pages 471-480, 1973.
-
(1973)
IEEE Tran. on Information Theory
, vol.19
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.K.2
-
26
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
Oakland, CA, USA
-
M. Strasser, C. Popper, S. Capkun, and M. Cagalj. Jamming-resistant key establishment using uncoordinated frequency hopping. In IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Strasser, M.1
Popper, C.2
Capkun, S.3
Cagalj, M.4
|