-
1
-
-
0023985539
-
Privacy amplification by public discussion
-
C. Bennett, G. Brassard, and J.-M. Robert. Privacy amplification by public discussion. SIAM Journal on Computing, 17(2):210-229, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.1
Brassard, G.2
Robert, J.-M.3
-
2
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer. Generalized privacy amplification. IEEE Transactions on Information Theory, 41(6):1915-1923, 1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
3
-
-
24944501364
-
Secure remote authentication using biometric data
-
R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005, Springer-Verlag
-
X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith. Secure remote authentication using biometric data. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005, volume 3494 of LNCS, pages 147-163. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 147-163
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
5
-
-
33749541274
-
Robust fuzzy extractors and authenticated key agreement from close secrets
-
C. Dwork, editor, Advances in Cryptology - CRYPTO 2006, Springer-Verlag, 20-24 Aug.
-
Y. Dodis, J. Katz, L. Reyzin, and A. Smith. Robust fuzzy extractors and authenticated key agreement from close secrets. In C. Dwork, editor, Advances in Cryptology - CRYPTO 2006, volume 4117 of LNCS, pages 232-250. Springer-Verlag, 20-24 Aug. 2006.
-
(2006)
LNCS
, vol.4117
, pp. 232-250
-
-
Dodis, Y.1
Katz, J.2
Reyzin, L.3
Smith, A.4
-
6
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
arXiv:cs/0602007
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38(1):97-139, 2008. arXiv:cs/0602007.
-
(2008)
SIAM Journal on Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
9
-
-
77952379198
-
Extracting correlations
-
IEEE
-
Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai. Extracting correlations. In 50th Annual Symposium on Foundations of Computer Science, Atlanta, Georgia, Oct. 2009. IEEE.
-
50th Annual Symposium on Foundations of Computer Science, Atlanta, Georgia, Oct. 2009
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
10
-
-
52149090133
-
An improved robust fuzzy extractor
-
R. Ostrovsky, R. D. Prisco, and I. Visconti, editors, Sixth Conference on Security and Cryptography in Networks SCN '08, Sept.
-
B. Kanukurthi and L. Reyzin. An improved robust fuzzy extractor. In R. Ostrovsky, R. D. Prisco, and I. Visconti, editors, Sixth Conference on Security and Cryptography in Networks SCN '08, volume 5229 of LNCS, pages 206-223, Sept. 2008.
-
(2008)
LNCS
, vol.5229
, pp. 206-223
-
-
Kanukurthi, B.1
Reyzin, L.2
-
12
-
-
67650671123
-
Key agreement from close secrets over unsecured channels
-
A. Joux, editor, Advances in Cryptology - EUROCRYPT 2009, Springer
-
B. Kanukurthi and L. Reyzin. Key agreement from close secrets over unsecured channels. In A. Joux, editor, Advances in Cryptology - EUROCRYPT 2009, volume 5479 of LNCS. Springer, 2009.
-
LNCS
, vol.5479
, pp. 2009
-
-
Kanukurthi, B.1
Reyzin, L.2
-
13
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions and reversals
-
Feb.
-
V. I. Levenshtein. Binary codes capable of correcting deletions, insertions and reversals. Soviet Physics Doklady, 10:707-710, Feb. 1966.
-
(1966)
Soviet Physics Doklady
, vol.10
, pp. 707-710
-
-
Levenshtein, V.I.1
-
14
-
-
77951458752
-
Information-theoretically secure secret-key agreement by NOT authenticated public discussion
-
W. Fumy, editor, Advances in Cryptology - EUROCRYPT 97, Springer-Verlag
-
U. Maurer. Information-theoretically secure secret-key agreement by NOT authenticated public discussion. In W. Fumy, editor, Advances in Cryptology - EUROCRYPT 97, volume 1233 of LNCS, pages 209-225. Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 209-225
-
-
Maurer, U.1
-
15
-
-
84958670019
-
Privacy amplification secure against active adversaries
-
B. S. Kaliski, Jr., editor, Advances in Cryptology - CRYPTO '97, Springer-Verlag
-
U. Maurer and S. Wolf. Privacy amplification secure against active adversaries. In B. S. Kaliski, Jr., editor, Advances in Cryptology - CRYPTO '97, volume 1294 of LNCS, pages 307-321. Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 307-321
-
-
Maurer, U.1
Wolf, S.2
-
16
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification
-
U. Maurer and S. Wolf. Secret-key agreement over unauthenticated public channels - Part III: Privacy amplification. IEEE Trans. Info. Theory, 49(4):839-851, 2003.
-
(2003)
IEEE Trans. Info. Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.1
Wolf, S.2
-
18
-
-
0002956996
-
Bounds for dispersers, extractors, and depth-two superconcentrators
-
J. Radhakrishnan and A. Ta-Shma. Bounds for dispersers, extractors, and depth-two superconcentrators. SIAM Journal on Computing, 13(1):2-24, 2000.
-
(2000)
SIAM Journal on Computing
, vol.13
, Issue.1
, pp. 2-24
-
-
Radhakrishnan, J.1
Ta-Shma, A.2
-
19
-
-
35048874991
-
Unconditional authenticity and privacy from an arbitrarily weak secret
-
D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, Springer-Verlag
-
R. Renner and S. Wolf. Unconditional authenticity and privacy from an arbitrarily weak secret. In D. Boneh, editor, Advances in Cryptology - CRYPTO 2003, volume 2729 of LNCS, pages 78-95. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 78-95
-
-
Renner, R.1
Wolf, S.2
-
20
-
-
27144457211
-
The exact price for unconditionally secure asymmetric cryptography
-
C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, Springer-Verlag
-
R. Renner and S. Wolf. The exact price for unconditionally secure asymmetric cryptography. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages 109-125. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 109-125
-
-
Renner, R.1
Wolf, S.2
-
21
-
-
0033349233
-
Asymptotically good codes correcting insertions, deletions, and transpositions
-
L. J. Schulman and D. Zuckerman. Asymptotically good codes correcting insertions, deletions, and transpositions. IEEE Transactions on Information Theory, 45(7):2552-2557, 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.7
, pp. 2552-2557
-
-
Schulman, L.J.1
Zuckerman, D.2
-
22
-
-
84947780088
-
Strong security against active attacks in information-theoretic secret-key agreement
-
K. Ohta and D. Pei, editors, Advances in Cryptology - ASIACRYPT '98, Springer-Verlag
-
S. Wolf. Strong security against active attacks in information-theoretic secret-key agreement. In K. Ohta and D. Pei, editors, Advances in Cryptology - ASIACRYPT '98, volume 1514 of LNCS, pages 405-419. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1514
, pp. 405-419
-
-
Wolf, S.1
|