-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
5
-
-
0027629488
-
Common randomness in information theory and cryptography-Part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
6
-
-
0026626314
-
Experimental quantum cryptography
-
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, "Experimental quantum cryptography," J. Cryptology, vol. 5, no. 1, pp. 3-28, 1992.
-
(1992)
J. Cryptology
, vol.5
, Issue.1
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
7
-
-
0029234878
-
Unconventional cryptographic keying variable management
-
Jan.
-
J. E. Hershey, A. A. Hassan, and R. Yarlagadda, "Unconventional cryptographic keying variable management," IEEE Trans. Commun., vol. 43, no. 1, pp. 3-6, Jan. 1995.
-
(1995)
IEEE Trans. Commun.
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.E.1
Hassan, A.A.2
Yarlagadda, R.3
-
8
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
Nov.
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Trans. Antennas and Propagation, vol. 53, no. 11, pp. 3776-3784, Nov. 2005.
-
(2005)
IEEE Trans. Antennas and Propagation
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
9
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in UWB channels
-
Sept.
-
R.Wilson, D. Tse, and R. Scholtz, "Channel identification: secret sharing using reciprocity in UWB channels," IEEE Trans. Inform. Forensics and Security, vol. 2, no. 3, pp. 364-375, Sept. 2007.
-
(2007)
IEEE Trans. Inform. Forensics and Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.3
-
10
-
-
45249104850
-
Wireless information-theoretic security
-
June
-
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.3
McLaughlin, S.4
-
11
-
-
85027496257
-
Secret-key reconciliation by public discussion
-
Advances in Cryptology - EUROCRYPT '93
-
G. Brassard and L. Salvail, "Secret-key reconciliation by public discussion," in Advances in Cryptology - EUROCRYPT '93, Lecture Notes in Computer Science, vol. 765, 1994, pp. 410-423.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 410-423
-
-
Brassard, G.1
Salvail, L.2
-
12
-
-
1442337635
-
Reconciliation of a quantum-distributed Gaussian key
-
Feb.
-
G. Assche, J. Cardinal, and N. Cerf, "Reconciliation of a quantum-distributed Gaussian key," IEEE Trans. Inform. Theory, vol. 50, no. 2, pp. 394-400, Feb. 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, Issue.2
, pp. 394-400
-
-
Assche, G.1
Cardinal, J.2
Cerf, N.3
-
13
-
-
33751025487
-
LDPC-based Gaussian key reconciliation
-
M. Bloch, A. Thangaraj, S. McLaughlin, and J. Merolla, "LDPC-based Gaussian key reconciliation," in Proc. 2006 IEEE Inform. Theory Workshop (ITW'06), Punta del Este, Uruguay, Mar. 2006, pp. 116-120.
-
Proc. 2006 IEEE Inform. Theory Workshop (ITW'06), Punta del Este, Uruguay, Mar. 2006
, pp. 116-120
-
-
Bloch, M.1
Thangaraj, A.2
McLaughlin, S.3
Merolla, J.4
-
14
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C. Bennett, G. Brassard, C. Crépeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inform. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inform. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
15
-
-
0034296204
-
A study on secret key reconciliation protocol "Cascade"
-
Oct.
-
T. Sugimoto and K. Yamazaki, "A study on secret key reconciliation protocol "Cascade"," IEICE Trans. Fundamentals, vol. E83-A, no. 10, pp. 1987-1991, Oct. 2000.
-
(2000)
IEICE Trans. Fundamentals
, vol.E83-A
, Issue.10
, pp. 1987-1991
-
-
Sugimoto, T.1
Yamazaki, K.2
|