-
1
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, pp. 733-742, 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.1
-
2
-
-
0027629488
-
Common randomness in information theory and cryptography part 1: Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography part 1: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1979.
-
(1979)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
0018456171
-
Universal classes of hash functions
-
L. Carter and M. Wegman, "Universal classes of hash functions," J. Comput. Syst. Sci., vol. 18, no. 2, pp. 143-154, 1979.
-
(1979)
J. Comput. Syst. Sci.
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, L.1
Wegman, M.2
-
6
-
-
84991939136
-
-
Lecture Notes in Computer Science, Springer-Verlag
-
H. Krawczyk, in Proc. LFSR-Based Hashing and Authentication. Advances in Cryptology-CRYPTO'94, 1994, vol. 839, pp. 129-139, Lecture Notes in Computer Science, Springer-Verlag.
-
(1994)
Proc. LFSR-Based Hashing and Authentication Advances in Cryptology-CRYPTO'94
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
7
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, pp. 1915-1923, 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.M.4
-
8
-
-
33645727315
-
General non-asymptotic and asymptotic formulas in channel resolvability and identification capacity and its application to wire-tap channel
-
Apr.
-
M. Hayashi, "General non-asymptotic and asymptotic formulas in channel resolvability and identification capacity and its application to wire-tap channel," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562-1575, Apr. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.4
, pp. 1562-1575
-
-
Hayashi, M.1
-
9
-
-
0020152857
-
Algebraic constructions of Shannon codes for regular channels
-
P. Delsarte and P. Piret, "Algebraic constructions of Shannon codes for regular channels," IEEE Trans. Inf. Theory, vol. 28, no. 4, pp. 593-599, Apr. 1982. (Pubitemid 12525111)
-
(1982)
IEEE Transactions on Information Theory
, vol.IT-28
, Issue.4
, pp. 593-599
-
-
Delsarte Philippe1
Piret Philippe2
-
10
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell. Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell. Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
11
-
-
12444299059
-
The private classical capacity and quantum capacity of a quantum channel
-
DOI 10.1109/TIT.2004.839515
-
I. Devetak, "The private classical information capacity and quantum information capacity of a quantum channel," IEEE Trans. Inf. Theory, vol. 51, no. 1, pp. 44-55, Jan. 2005. (Pubitemid 40145986)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.1
, pp. 44-55
-
-
Devetak, I.1
-
12
-
-
23944463739
-
Commitment capacity of discrete memoryless channels
-
Berlin, Germany, LNCS 2989 Springer, cs.CR/0304014 (2003)
-
A. Winter, A. C. A. Nascimento, and H. Imai, "Commitment capacity of discrete memoryless channels," in Proc. 9th Cirencester Crypto and Coding Conf, Berlin, Germany, 2003, pp. 35-51, LNCS 2989, Springer, cs.CR/0304014 (2003).
-
(2003)
Proc. 9th Cirencester Crypto and Coding Conf
, pp. 35-51
-
-
Winter, A.1
Nascimento, A.C.A.2
Imai, H.3
-
14
-
-
33846181385
-
-
Ph.D. dissertation, Dipl. Phys. ETH, Switzerland, arXiv:quantph/0512258
-
R. Renner, "Security of QuantumKey Distribution," Ph.D. dissertation, Dipl. Phys. ETH, Switzerland, 2005, arXiv:quantph/0512258.
-
(2005)
Security of Quantum Key Distribution
-
-
Renner, R.1
-
15
-
-
33747886952
-
Secret key agreement from correlated source outputs using low density parity check matrices
-
DOI 10.1093/ietfec/e89-a.7.2036
-
J. Muramatsu, "Secret key agreement from correlated source outputs using low density parity check matrices," IEICE Trans. Fundam., vol. E89-A, no. 7, pp. 2036-2046, 2006. (Pubitemid 44290411)
-
(2006)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E89-A
, Issue.7
, pp. 2036-2046
-
-
Muramatsu, J.1
-
16
-
-
33646767482
-
Simple and tight bounds for information reconciliation and privacy amplification
-
DOI 10.1007/11593447-11, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
R. Renner and S. Wolf, "Simple and tight bounds for information reconciliation and privacy amplification," in Proc. ASIACRYPT, 2005, vol. 3788, pp. 199-216, Lecture Notes in Computer Science, Springer-Verlag. (Pubitemid 43763476)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3788
, pp. 199-216
-
-
Renner, R.1
Wolf, S.2
-
17
-
-
33750056552
-
Almost independence and secrecy capacity
-
I. Csiszár, "Almost independence and secrecy capacity," Probl. Inf. Transm., vol. 32, no. 1, pp. 40-47, 1996.
-
(1996)
Probl. Inf. Transm.
, vol.32
, Issue.1
, pp. 40-47
-
-
Csiszár, I.1
-
18
-
-
77952327973
-
Secret key agreement by soft-decision of signals in Gaussian Maurer's model
-
M. Naito, S. Watanabe, R. Matsumoto, and T. Uyematsu, "Secret key agreement by soft-decision of signals in Gaussian Maurer's model," IEICE Trans. Fundam., vol. 92, no. 2, pp. 525-534, 2009.
-
(2009)
IEICE Trans. Fundam.
, vol.92
, Issue.2
, pp. 525-534
-
-
Naito, M.1
Watanabe, S.2
Matsumoto, R.3
Uyematsu, T.4
-
20
-
-
79957643904
-
-
private communication
-
S. Watanabe, 2007, private communication.
-
(2007)
-
-
Watanabe, S.1
-
21
-
-
0035163054
-
Universal composable security: A new paradigm for cryptographic protocols
-
Oct.
-
R. Cannetti, "Universal composable security: A new paradigm for cryptographic protocols," in Proc. 42nd IEEE FOCS, Oct. 2001, pp. 136-145.
-
(2001)
Proc. 42nd IEEE FOCS
, pp. 136-145
-
-
Cannetti, R.1
|