-
1
-
-
0027629488
-
Common randomness in information theory and cryptography. Part I: Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszár, "Common Randomness in Information Theory and Cryptography. Part I: Secret sharing," IEEE Trans. Inf. Theory, vol.39, no.4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol.24, no.3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Korner, J.2
-
5
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol.50, no.12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
6
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
Jun.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Trans. Inf. Theory, vol.54, no.6, pp. 2437-2452, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csiszár, I.1
Narayan, P.2
-
7
-
-
35248888499
-
New bounds in secret-key agreement: The gap between formation and secrecy extraction
-
May, LNCS, Springer-Verlag
-
R. Renner and S. Wolf, "New bounds in secret-key agreement: The gap between formation and secrecy extraction," in Proc. EUROCRYPT, May 2003, vol.2656, pp. 562-577, LNCS, Springer-Verlag.
-
(2003)
Proc. EUROCRYPT
, vol.2656
, pp. 562-577
-
-
Renner, R.1
Wolf, S.2
-
8
-
-
45249097538
-
Communication for omniscience by a neutral observer and information-theoretic key agreement of multiple terminals
-
A. A. Gohari and V. Anantharam, "Communication for omniscience by a neutral observer and information-theoretic key agreement of multiple terminals," in Proc. Int. Symp. Information Theory, 2007, pp. 2056-2060.
-
(2007)
Proc. Int. Symp. Information Theory
, pp. 2056-2060
-
-
Gohari, A.A.1
Anantharam, V.2
-
9
-
-
77952412339
-
Unbreakable keys from random noise
-
New York: Springer-Verlag
-
U. M. Maurer,R. Renner, and S.Wolf, "Unbreakable keys from random noise," in Security With Noisy Data. New York: Springer-Verlag, 2007, pp. 21-44.
-
(2007)
Security with Noisy Data
, pp. 21-44
-
-
Maurer, U.M.1
Renner, R.2
Wolf, S.3
-
10
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol.39, no.3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
12
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
Mar.
-
U. M. Maurer and S.Wolf, "Unconditionally secure key agreement and the intrinsic conditional information," IEEE Trans. Inf. Theory, vol.45, no.2, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
13
-
-
0029706655
-
Almost independence and secrecy capacity
-
Jan. (in. Russian)
-
I. Csiszár, "Almost independence and secrecy capacity," Problems of Information Transmission (PPI), vol.32, no.1, pp. 48-57, Jan. 1996, (in. Russian).
-
(1996)
Problems of Information Transmission (PPI)
, vol.32
, Issue.1
, pp. 48-57
-
-
Csiszár, I.1
-
15
-
-
64549106932
-
An outer bound to the admissible source region of broadcast channels with arbitrarily correlated sources and channel variations
-
A. A. Gohari and V. Anantharam, "An outer bound to the admissible source region of broadcast channels with arbitrarily correlated sources and channel variations," in Proc. 46th Annu. Allerton Conf. Communications, Control and Computing, 2008, pp. 301-308.
-
(2008)
Proc. 46th Annu. Allerton Conf. Communications, Control and Computing
, pp. 301-308
-
-
Gohari, A.A.1
Anantharam, V.2
-
17
-
-
0016562514
-
The wiretap channel
-
Oct.
-
A. D. Wyner, "The wiretap channel," Bell Syst. Tech. J., vol.54, no.8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
18
-
-
34548771769
-
Key rate of quantum key distribution with hashed two-way classical communication
-
Sept.
-
S. Watanabe, R. Matsumoto, T. Uyematsu, and Y. Kawano, "Key rate of quantum key distribution with hashed two-way classical communication," Phys. Rev. A, vol.76, no.3, pp. 032312-, Sept. 2007.
-
(2007)
Phys. Rev. A
, vol.76
, Issue.3
, pp. 032312
-
-
Watanabe, S.1
Matsumoto, R.2
Uyematsu, T.3
Kawano, Y.4
-
19
-
-
0141938910
-
A property of the intrinsic mutual information
-
M. Christandl, R. Renner, and S. Wolf, "A property of the intrinsic mutual information," in Proc. Int. Symp. Information Theory (ISIT), 2003, pp. 258-.
-
(2003)
Proc. Int. Symp. Information Theory (ISIT)
, pp. 258
-
-
Christandl, M.1
Renner, R.2
Wolf, S.3
-
20
-
-
84890522850
-
Communication theory of secrecy
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy," Bell Syst. Tech. J., vol.28, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
|