-
1
-
-
0027629488
-
Common randomness in information theory and cryptography-part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-part I: Secret sharing, " IEEE Trans. Inf. Theory, vol.39, no.4, pp.1121-1132, July 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
3
-
-
1442337635
-
Reconciliation of a quantum-distributed Gaussian key
-
Feb.
-
G.V. Assche, J. Cardinal, and N.J. Cerf, "Reconciliation of a quantum-distributed Gaussian key, " IEEE Trans. Inf. Theory, vol.50, no.2, pp.394-400, Feb. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.2
, pp. 394-400
-
-
Assche, G.V.1
Cardinal, J.2
Cerf, N.J.3
-
4
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C.H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, "Generalized privacy amplification, " IEEE Trans. Inf. Theory, vol.41, no.6, pp.1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.4
-
5
-
-
0016037985
-
A simple converse for broadcast channels with additive white Gaussian noise
-
March
-
P.P. Bergmans, "A simple converse for broadcast channels with additive white Gaussian noise, " IEEE Trans. Inf. Theory, vol.20, no.2, pp.279-280, March 1974.
-
(1974)
IEEE Trans. Inf. Theory
, vol.20
, Issue.2
, pp. 279-280
-
-
Bergmans, P.P.1
-
6
-
-
45249104850
-
Wireless information-theoretic security
-
June
-
M. Bloch, J. Barros, M.R.D. Rodrigues, and S.W. McLaughlin, "Wireless information-theoretic security, " IEEE Trans. Inf. Theory, vol.54, no.6, pp.2515-2534, June 2008
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
7
-
-
69249208566
-
An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
-
Article ID 370970
-
R. Bustin, R. Liu, H.V. Poor, and S. Shamai, "An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel, " EURASIP Journal on Wireless Communication and Networking, vol.2009, Article ID 370970, 2009.
-
(2009)
EURASIP Journal on Wireless Communication and Networking
, vol.2009
-
-
Bustin, R.1
Liu, R.2
Poor, H.V.3
Shamai, S.4
-
8
-
-
0018456171
-
Universal classes of hash functions
-
J.L. Carter and M.N. Wegman, "Universal classes of hash functions, " J. Comput. Syst. Sci., vol.18, pp.143-154, 1979.
-
(1979)
J. Comput. Syst. Sci.
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
10
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages, " IEEE Trans. Inf. Theory, vol.24, no.3, pp.339-348, May 1979.
-
(1979)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
11
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
March
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper, " IEEE Trans. Inf. Theory, vol.46, no.2, pp.344-366, March 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
12
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals, " IEEE Trans. Inf. Theory, vol.50, no.12, pp.3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
13
-
-
0037448569
-
Quantum key distribution using Gaussian-modulated coherent states
-
Jan.
-
F. Grosshans, G.V. Assche, J. Wenger, R. Brouri, N.J. Cerf, and P. Grangier, "Quantum key distribution using Gaussian-modulated coherent states, " Nature, vol.421, pp.238-241, Jan. 2003.
-
(2003)
Nature
, vol.421
, pp. 238-241
-
-
Grosshans, F.1
Assche, G.V.2
Wenger, J.3
Brouri, R.4
Cerf, N.J.5
Grangier, P.6
-
15
-
-
0036614213
-
An information-spectrum approach to rate-distortion function with side information
-
June
-
K. Iwata and J. Muramatsu, "An information-spectrum approach to rate-distortion function with side information, " IEICE Trans. Fundamentals, vol.E85-A, no.6, pp.1387-1395, June 2002.
-
(2002)
IEICE Trans. Fundamentals
, vol.E85-A
, Issue.6
, pp. 1387-1395
-
-
Iwata, K.1
Muramatsu, J.2
-
16
-
-
0017996501
-
The Gaussian wiretap channel
-
July
-
S.K. Leung-Yan-Cheong and M.E. Hellman, "The Gaussian wiretap channel, " IEEE Trans. Inf. Theory, vol.24, no.4, pp.451-456, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
17
-
-
45249119255
-
Secure communication over fading channels
-
June
-
Y. Liang, H.V. Poor, and S. Shamai, "Secure communication over fading channels, " IEEE Trans. Inf. Theory, vol.54, no.6, pp.2470- 2492, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
18
-
-
66949180834
-
A note on the secrecy capacity of the multiple-antenna wiretap channel
-
June
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multiple-antenna wiretap channel, " IEEE Trans. Inf. Theory, vol.55, no.6, pp.2547-2553, June 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
19
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information, " IEEE Trans. Inf. Theory, vol.39, no.3, pp.733- 742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
20
-
-
77952327973
-
Secret key agreement by soft-decision of signals in Gaussian Maurer's model
-
Feb., arXive:0804.2940v1
-
M. Naito, S. Watanabe, R. Matsumoto, and T. Uyematsu, "Secret key agreement by soft-decision of signals in Gaussian Maurer's model, " IEICE Trans. Fundamentals, vol.E92-A, no.2, pp.525-534, Feb. 2008. arXive:0804.2940v1.
-
(2008)
IEICE Trans. Fundamentals
, vol.E92-A
, Issue.2
, pp. 525-534
-
-
Naito, M.1
Watanabe, S.2
Matsumoto, R.3
Uyematsu, T.4
-
21
-
-
52349088850
-
Secret key generation for correlated Gaussian sources
-
Toronto, Canada, July
-
S. Nitinawarat, "Secret key generation for correlated Gaussian sources, " Proc. IEEE International Symposium on Information Theory, pp.702-706, Toronto, Canada, July 2008.
-
(2008)
Proc. IEEE International Symposium on Information Theory
, pp. 702-706
-
-
Nitinawarat, S.1
-
22
-
-
0031272758
-
Gaussian multiterminal source coding
-
Nov.
-
Y. Oohama, "Gaussian multiterminal source coding, " IEEE Trans. Inf. Theory, vol.43, no.6, pp.1912-1923, Nov. 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, Issue.6
, pp. 1912-1923
-
-
Oohama, Y.1
-
23
-
-
0019178773
-
On a source coding problem with two channels and three receivers
-
Dec.
-
L. Ozarow, "On a source coding problem with two channels and three receivers, " Bell Syst. Tech. J., vol.59, no.10, pp.1909-1921, Dec. 1980
-
(1980)
Bell Syst. Tech. J.
, vol.59
, Issue.10
, pp. 1909-1921
-
-
Ozarow, L.1
-
24
-
-
0015648934
-
Noiseless coding of correlated information sources
-
July
-
D. Slepian and J.K. Wolf, "Noiseless coding of correlated information sources, " IEEE Trans. Inf. Theory, vol.IT-19, no.4, pp.471-480, July 1973.
-
(1973)
IEEE Trans. Inf. Theory
, vol.IT-19
, Issue.4
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.K.2
-
25
-
-
70349626788
-
Remote vector Gaussian source coding with decoder side information under mutual information and distortion constraints
-
Oct.
-
C. Tian and J. Chen, "Remote vector Gaussian source coding with decoder side information under mutual information and distortion constraints, " IEEE Trans. Inf. Theory, vol.55, no.10, pp.4676-4680, Oct. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.10
, pp. 4676-4680
-
-
Tian, C.1
Chen, J.2
-
26
-
-
0016562514
-
The wire-tap channel
-
A.D. Wyner, "The wire-tap channel, " Bell Syst. Tech. J., vol.54, no.8, pp.1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
27
-
-
0016882596
-
The rate-distortion function for source coding with side information at the decoder
-
Jan.
-
A.D.Wyner and J. Ziv, "The rate-distortion function for source coding with side information at the decoder, " IEEE Trans. Inf. Theory, vol.IT-22, no.1, pp.1-10, Jan. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.1
, pp. 1-10
-
-
Wyner, A.D.1
Ziv, J.2
|