-
1
-
-
0027629488
-
Common randomness in information theory and cryptography - Part 1: Secret sharing
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography-part 1: Secret sharing," IEEE Trans. Inf. Theory, vol.39, no.4, pp.1121-1132, 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
2
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipat fading channel
-
Nov.
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipat fading channel," IEEE Trans. Antennas Propag., vol.53, no.11, pp.3776-3784, Nov. 2005.
-
(2005)
IEEE Trans. Antennas Propag.
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
3
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C.H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol.41, no.6, pp.1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
4
-
-
0023985539
-
Privacy amplification by public discussion
-
April
-
C.H. Bennett, G. Brassard, and J.M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol.17, no.2, pp.210-229, April 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.M.3
-
5
-
-
0018456171
-
Universal classes of hash functions
-
J.L. Carter and M.N. Wegman, "Universal classes of hash functions," J. Comput. Syst. Sci., vol.18, pp.143-154, 1979.
-
(1979)
J. Comput. Syst. Sci.
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
6
-
-
33746621346
-
Lowcomplexity approaches to Slepian & Wolf near-lossless distributed data compression
-
Aug.
-
T.P. Coleman, A.H. Lee, M. Médard, and M. Effros, "Lowcomplexity approaches to Slepian & Wolf near-lossless distributed data compression," IEEE Trans. Inf. Theory, vol.52, no.8, pp.3546-3561, Aug. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.8
, pp. 3546-3561
-
-
Coleman, T.P.1
Lee, A.H.2
Médard, M.3
Effros, M.4
-
8
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol.24, no.3, pp.339-348, May 1979.
-
(1979)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
9
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol.50, no.12, pp.3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
12
-
-
0024866111
-
Pseudo-random generation from one-way function
-
ACM Press
-
R. Impagliazzo, L.A. Levin, and M. Luby, "Pseudo-random generation from one-way function," Proc. 21st Annual ACM Symposium on Theory of Computing (STO'89), pp.12-24, ACM Press, 1989.
-
(1989)
Proc. 21st Annual ACM Symposium on Theory of Computing (STO'89)
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
15
-
-
0017996501
-
The Gaussian wiretap channel
-
July
-
S.K. Leung-Yan-Cheong and M.E. Hellman, "The Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol.24, no.4, pp.451-456, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
16
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol.39, no.3, pp.733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
17
-
-
84948960386
-
Infromation-theoretic key agreement: From weak to strong secrecy for free
-
Springer-Verlag
-
U. Maurer and S. Wolf, "Infromation-theoretic key agreement: From weak to strong secrecy for free," Advances in Cryptology-EUROCRYPT 2000, Lecture Notes in Computer Science, vol.1807, pp.351-368, Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology-EUROCRYPT 2000, Lecture Notes in Computer Science
, vol.1807
, pp. 351-368
-
-
Maurer, U.1
Wolf, S.2
-
18
-
-
26844487465
-
Low-density parity-check matrices for coding of correlated sources
-
Oct.
-
J. Muramatsu, T. Uyematsu, and T. Wadayama, "Low-density parity-check matrices for coding of correlated sources," IEEE Trans. Inf. Theory, vol.51, no.10, pp.3645-3654, Oct. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.10
, pp. 3645-3654
-
-
Muramatsu, J.1
Uyematsu, T.2
Wadayama, T.3
-
19
-
-
45249088577
-
The commitment capacity of the gaussian channel is infinite
-
July
-
A.C.A. Nascimento, J. Barros, S. Skludarek, and H. Imai, "The commitment capacity of the gaussian channel is infinite," IEEE Trans. Inf. Theory, vol.54, no.6, pp.2785-2789, July 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2785-2789
-
-
Nascimento, A.C.A.1
Barros, J.2
Skludarek, S.3
Imai, H.4
-
20
-
-
33846181385
-
-
Ph.D. Thesis, Dipl. Phys. ETH, Switzerland. arXiv:quant-ph/0512258
-
R. Renner, Security of quantum key distribution, Ph.D. Thesis, Dipl. Phys. ETH, Switzerland, 2005. arXiv:quant-ph/0512258.
-
(2005)
Security of Quantum Key Distribution
-
-
Renner, R.1
-
21
-
-
0015648934
-
Noiseless coding of correlated information sources
-
July
-
D. Slepian and J.K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inf. Theory, vol.19, no.4, pp.471-480, July 1973.
-
(1973)
IEEE Trans. Inf. Theory
, vol.19
, Issue.4
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.K.2
-
23
-
-
30444442452
-
Unconditional security in cryptography
-
Springer
-
S.Wolf, "Unconditional security in cryptography," Lectures on Data Security, Lecture Notes in Computer Science, vol.1561, pp.217-250, Springer, 1999.
-
(1999)
Lectures on Data Security, Lecture Notes in Computer Science
, vol.1561
, pp. 217-250
-
-
Wolf, S.1
-
24
-
-
0016562514
-
The wire-tap channel
-
A.D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol.54, no.8, pp.1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
|