-
1
-
-
0031701886
-
Common randomness in information theory and cryptography - Part II: CR capacity
-
Jan
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography - Part II: CR capacity", IEEE Trans. Inform. Theory, vol. IT-44, pp. 225-240, Jan. 1998.
-
(1998)
IEEE Trans. Inform. Theory
, vol.IT-44
, pp. 225-240
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
33750056552
-
Almost independence and secrecy capacity
-
I. Csiszár, "Almost independence and secrecy capacity", Problems of Information Transmission, vol. 32, no. 1, pp. 40-47, 1996.
-
(1996)
Problems of Information Transmission
, vol.32
, Issue.1
, pp. 40-47
-
-
Csiszár, I.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages", IEEE Trans. Inform. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
10644270917
-
Secret key capacity for multiple terminals
-
Dec
-
I. Csiszár and P. Narayan, "Secret key capacity for multiple terminals", IEEE Trans. Inform. Theory, vol. IT-50, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.IT-50
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
5
-
-
0018456171
-
Universal classes of hash functions
-
J. L. Carter and M. N. Wegman, "Universal classes of hash functions", J. Comput. Syst. Sci., vol. 18, pp. 143-154, 1979.
-
(1979)
J. Comput. Syst. Sci.
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
6
-
-
79957636296
-
Exponential decreasing rate of leaked information in universal random privacy amplification
-
Jun
-
M. Hayashi, "Exponential decreasing rate of leaked information in universal random privacy amplification", IEEE Trans. Inform. Theory, vol. IT-57, pp. 3989-4001, Jun. 2011.
-
(2011)
IEEE Trans. Inform. Theory
, vol.IT-57
, pp. 3989-4001
-
-
Hayashi, M.1
-
8
-
-
77951574913
-
Hash property and coding theorems for sparse matrices and maximal-likelihood coding
-
May
-
J. Muramatsu and S. Miyake, "Hash property and coding theorems for sparse matrices and maximal-likelihood coding", IEEE Trans. Inform. Theory, vol. IT-56, no. 5, pp. 2143-2167, May 2010.
-
(2010)
IEEE Trans. Inform. Theory
, vol.IT-56
, Issue.5
, pp. 2143-2167
-
-
Muramatsu, J.1
Miyake, S.2
-
9
-
-
80054819082
-
-
Sep
-
Corrections: vol. IT-56, no. 9, p. 4762, Sep. 2010.
-
(2010)
Corrections
, vol.IT-56
, Issue.9
, pp. 4762
-
-
-
10
-
-
80054804713
-
Construction of codes for wiretap channel and secret key agreement from correlated source outputs based on hash property
-
submitted to, available at arXiv:0903.0414cs. IT
-
J. Muramatsu and S. Miyake, "Construction of codes for wiretap channel and secret key agreement from correlated source outputs based on hash property", submitted to IEEE Trans. Inform. Theory, available at arXiv:0903.0414[cs. IT], 2009.
-
(2009)
IEEE Trans. Inform. Theory
-
-
Muramatsu, J.1
Miyake, S.2
-
11
-
-
80054818134
-
Construction of Slepian-Wolf source code and broadcast channel code based on hash property
-
submitted to, available at arXiv:1006.5271cs. IT
-
J. Muramatsu and S. Miyake, "Construction of Slepian-Wolf source code and broadcast channel code based on hash property", submitted to IEEE Trans. Inform. Theory, available at arXiv:1006.5271[cs. IT], 2010.
-
(2010)
IEEE Trans. Inform. Theory
-
-
Muramatsu, J.1
Miyake, S.2
-
12
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel", Bell Syst. Tech J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
|