-
1
-
-
0027629488
-
Common Randomness in information theory and cryptography-part I: Secret sharing
-
R. Ahlswede and I. Csiszar, Common Randomness in information theory and cryptography-part I: secret sharing, IEEE Transactions on Information Theory, Vol. IT-39, 1993, pp. 1121-1132.
-
(1993)
IEEE Transactions on Information Theory
, vol.39 IT
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
2
-
-
0026626314
-
Experimental quantum cryptography
-
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin, “Experimental quantum cryptography”, Journal of Cryptology, Vol. 5, no. 1, 1992, pp. 3-28.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
3
-
-
0029405656
-
Generalized privacy amplification
-
C.H. Bennett, G. Brassard, C. Crepeau, and U.M. Maurer, “Generalized privacy amplification”, to appear in IEEE Transactions on Information Theory, Nov. 1995.
-
(1995)
IEEE Transactions on Information Theory
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.M.4
-
4
-
-
0023985539
-
Privacy amplification by public discussion
-
C.H. Bennett, G. Brassard and J.-M. Robert, “Privacy amplification by public discussion”, SIAM Journal on Computing, Vol. 17, no. 2, April 1988, pp. 210-229.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
8
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszar and J. Korner, “Broadcast channels with confidential messages”, IEEE Transactions on Information Theory, Vol. IT-24, no. 3, 1978, pp. 339-348.
-
(1978)
IEEE Transactions on Information Theory
, vol.24 IT
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
10
-
-
85013455236
-
-
Springer-Verlag, Berlin
-
P. Gemmell and M. Naor, Codes for interactive authentication Advances in Cryptology–Proceedings of Crypto’93, Lecture Notes in Computer Science, Vol. 773, Springer-Verlag, Berlin, 1994, pp. 355-367.
-
(1994)
Codes for Interactive Authentication Advances in Cryptology–Proceedings of Crypto’93, Lecture Notes in Computer Science
, vol.773
, pp. 355-367
-
-
Gemmell, P.1
Naor, M.2
-
11
-
-
0016038540
-
Codes which detect deception
-
E.N. Gilbert, F. J. Mac Williams, and N.J. A. Sloane, Codes which detect deception, Bell Syst. Tech. J., Vol. 53, No. 3, 1974, pp. 405-424.
-
(1974)
Bell Syst. Tech. J.
, vol.53
, Issue.3
, pp. 405-424
-
-
Gilbert, E.N.1
Mac Williams, F.J.2
Sloane, N.J.A.3
-
13
-
-
78149248764
-
Protocols for secret key agreement by public discussion based on common information
-
Berlin: Springer-Verlag
-
U.M. Maurer, Protocols for secret key agreement by public discussion based on common information, Advances in Cryptology-CRYPTO’92, Lecture Notes in Computer Science, Berlin: Springer-Verlag, vol. 740, pp. 461-470, 1993.
-
(1993)
Advances in Cryptology-CRYPTO’92, Lecture Notes in Computer Science
, vol.740
, pp. 461-470
-
-
Maurer, U.M.1
-
14
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer, Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, vol. IT-39, 1993, pp. 733-742.
-
(1993)
IEEE Transactions on Information Theory
, vol.39 IT
, pp. 733-742
-
-
Maurer, U.M.1
-
15
-
-
0005059185
-
The strong secret key rate of discrete random triples
-
E. Blahut et al. (editors), Kluwer Academic Publishers
-
U. M. Maurer, The strong secret key rate of discrete random triples, Communications and Cryptography, Two Sides of one Tapestry, R.E. Blahut et al. (editors), Kluwer Academic Publishers, 1994, pp. 271-285.
-
(1994)
Communications and Cryptography, Two Sides of One Tapestry
, pp. 271-285
-
-
Maurer, U.M.1
-
16
-
-
0030232808
-
A calculus for security bootstrapping in distributed systems
-
U. M. Maurer and P.E. Schmid, A calculus for security bootstrapping in distributed systems, Journal of Computer Security, vol. 4, no. 1, pp. 55-80, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.1
, pp. 55-80
-
-
Maurer, U.M.1
Schmid, P.E.2
-
17
-
-
21444457448
-
Towards characterizing when information-theoretic secret key agreement is possible
-
K. Kim and T. Matsumoto (Eds.), Lecture Notes in Computer Science, Berlin: Springer-Verlag
-
U. M. Maurer and S. Wolf, Towards characterizing when information-theoretic secret key agreement is possible, Advances in Cryptology-ASIACRYPT’96, K. Kim and T. Matsumoto (Eds.), Lecture Notes in Computer Science, Berlin: Springer-Verlag, vol. 1163, pp. 145-158, 1996.
-
(1996)
Advances in Cryptology-ASIACRYPT’96
, vol.1163
, pp. 145-158
-
-
Maurer, U.M.1
Wolf, S.2
-
18
-
-
0030720571
-
The intrinsic conditional mutual information and perfect secrecy
-
Ulm, Germany, June 29-July 4
-
U.M. Maurer and S. Wolf, The intrinsic conditional mutual information and perfect secrecy, to appear in Proc. 1997 IEEE Symposium on Information Theory, (Abstracts), Ulm, Germany, June 29-July 4, 1997.
-
(1997)
Proc. 1997 IEEE Symposium on Information Theory, (Abstracts)
-
-
Maurer, U.M.1
Wolf, S.2
-
20
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21, No. 2, 1978, pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
21
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28, October 1949, pp. 656-715.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
22
-
-
84983269168
-
Authentication theory/coding theory
-
G.R. Blakley and D. Chaum (Eds.), Lecture Notes in Computer Science, No. 196, Berlin: Springer Verlag
-
G. J. Simmons, Authentication theory/coding theory, in Advances in Cryptology-CRYPTO 84, G.R. Blakley and D. Chaum (Eds.), Lecture Notes in Computer Science, No. 196, Berlin: Springer Verlag, 1985, pp. 411-431.
-
(1985)
Advances in Cryptology-Crypto 84
, pp. 411-431
-
-
Simmons, G.J.1
-
23
-
-
71049183202
-
Universal hashing and authentication codes
-
Springer-Verlag, Berlin
-
D.R. Stinson, Universal hashing and authentication codes, Advances in Cryptology–Proceedings of Crypto’91, Lecture Notes in Computer Science, Vol. 576, Springer-Verlag, Berlin, 1994, pp. 74-85.
-
(1994)
Advances in Cryptology–Proceedings of Crypto’91, Lecture Notes in Computer Science
, vol.576
, pp. 74-85
-
-
Stinson, D.R.1
-
24
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman and J. L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, Vol. 22, 1981, pp. 265-279.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
-
25
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, The wire-tap channel, Bell System Technical Journal, Vol. 54, no. 8, 1975, pp. 1355-1387.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
|