-
1
-
-
0027629488
-
Common randomness in information theory and cryptography. I. Secret sharing
-
Jul.
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography. I. Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
3
-
-
0023985539
-
Privacy amplification by public discussion
-
Apr.
-
C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, pp. 210-229, Apr. 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
6
-
-
0020152829
-
Linear codes for sources and source networks: error exponents, universal coding
-
I. Csiszár, "Linear codes for sources and source networks: Error exponents, universal coding," IEEE Trans. Inf. Theory, vol. 28, no. 4, pp. 585-592, Jul. 1982. (Pubitemid 12525110)
-
(1982)
IEEE Transactions on Information Theory
, vol.IT-28
, Issue.4
, pp. 585-592
-
-
Csiszar, I.1
-
7
-
-
0029706655
-
Almost independence and secrecy capacity
-
I. Csiszár, "Almost independence and secrecy capacity," Probl. Pered. Inf., vol. 32, pp. 48-57, 1996.
-
(1996)
Probl. Pered. Inf.
, vol.32
, pp. 48-57
-
-
Csiszár, I.1
-
8
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
DOI 10.1109/18.825796
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000. (Pubitemid 30582727)
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
9
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
10
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
Jun.
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csiszár, I.1
Narayan, P.2
-
12
-
-
5144221013
-
Achieving abc on the awgn channel with lattice encoding and decoding
-
Oct.
-
U. Erez and R. Zamir, "Achieving Abc on the AWGN channel with lattice encoding and decoding," IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2293-2314, Oct. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.10
, pp. 2293-2314
-
-
Erez, U.1
Zamir, R.2
-
13
-
-
26844546304
-
Lattices which are good for (almost) everything
-
DOI 10.1109/TIT.2005.855591
-
U. Erez, S. Litsyn, and R. Zamir, "Lattices which are good for (almost) everything," IEEE Trans. Inf. Theory, vol. 51, no. 10, pp. 3401-3416, Oct. 2005. (Pubitemid 41448587)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.10
, pp. 3401-3416
-
-
Erez, U.1
Litsyn, S.2
Zamir, R.3
-
15
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. S. Shitz, "Information theoretic security," Found. Trends Commun. Inf. Theory, vol. 5, pp. 355-580, 2008.
-
(2008)
Found. Trends Commun. Inf. Theory
, vol.5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shitz, S.S.3
-
16
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
17
-
-
0005059185
-
The strong secret key rate of discrete random triples
-
ch. 26
-
U. M. Maurer, "The strong secret key rate of discrete random triples," in Communications and Cryptography: Two Sides of One Tapestry, R. E. Blahut, Ed. et al. Norwell, MA: Kluwer, 1994, ch. 26, pp. 271-285.
-
(1994)
Communications and Cryptography: Two Sides of One Tapestry, R. E. Blahut, Ed. et al. Norwell, MA: Kluwer
, pp. 271-285
-
-
Maurer, U.M.1
-
18
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
New York: Springer-Verlag LNCS-1807
-
U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Advances in Cryptology-EUROCRYPT 2000. New York: Springer-Verlag, 2000, vol. LNCS-1807, pp. 352-368.
-
(2000)
Advances in Cryptology-EUROCRYPT
, vol.2000
, pp. 352-368
-
-
Maurer, U.M.1
Wolf, S.2
-
19
-
-
0028384933
-
On coding without restrictions for the awgn channel
-
Mar.
-
G. Poltyrev, "On coding without restrictions for the AWGN channel," IEEE Trans. Inf. Theory, vol. 40, no. 2, pp. 409-417, Mar. 1994.
-
(1994)
IEEE Trans. Inf. Theory
, vol.40
, Issue.2
, pp. 409-417
-
-
Poltyrev, G.1
-
20
-
-
43749085773
-
Rate region of the quadratic Gaussian two-encoder source-coding problem
-
DOI 10.1109/TIT.2008.920343
-
A. B. Wagner, S. Tavildar, and P. Viswanath, "Rate region of the quadratic Gaussian two-encoder source-coding problem," IEEE Trans. Inf. Theory, vol. 54, no. 5, pp. 1938-1961, May 2008. (Pubitemid 351689542)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.5
, pp. 1938-1961
-
-
Wagner, A.B.1
Tavildar, S.2
Viswanath, P.3
-
21
-
-
80051770683
-
Secret key agreement from vector gaussian sources by rate limited communication
-
Sep.
-
S. Watanabe and Y. Oohama, "Secret key agreement from vector Gaussian sources by rate limited communication," IEEE Trans. Inf. Forensics Security., vol. 6, no. 3, pp. 1556-6013, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security.
, vol.6
, Issue.3
, pp. 1556-6013
-
-
Watanabe, S.1
Oohama, Y.2
-
22
-
-
0016882596
-
The rate-distortion function for source coding with side information at the decoder
-
Jan.
-
A. D.Wyner and J. Ziv, "The rate-distortion function for source coding with side information at the decoder," IEEE Trans. Inf. Theory, vol. 22, no. 1, pp. 1-10, Jan. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.1
, pp. 1-10
-
-
Wyner, A.D.1
Ziv, J.2
-
23
-
-
0026837870
-
On universal quantization by randomized uniform/lattice quantizer
-
Mar.
-
R. Zamir and M. Feder, "On universal quantization by randomized uniform/lattice quantizer," IEEE Trans. Inf. Theory, vol. 38, no. 2, pp. 428-436, Mar. 1992.
-
(1992)
IEEE Trans. Inf. Theory
, vol.38
, Issue.2
, pp. 428-436
-
-
Zamir, R.1
Feder, M.2
-
24
-
-
0030191118
-
On lattice quantization noise
-
PII S0018944896044197
-
R. Zamir and M. Feder, "On lattice quantization noise," IEEE Trans. Inf. Theory, vol. 42, no. 4, pp. 1152-1159, Jul. 1996. (Pubitemid 126773745)
-
(1996)
IEEE Transactions on Information Theory
, vol.42
, Issue.4
, pp. 1152-1159
-
-
Zamir, R.1
Feder, M.2
-
25
-
-
0036611624
-
Nested linear/lattice codes for structured multiterminal binning
-
DOI 10.1109/TIT.2002.1003821, PII S0018944802048022
-
R. Zamir, S. Shamai, and U. Erez, "Nested linear/lattice codes for structured multiterminal binning," IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1250-1276, Jun. 2002. (Pubitemid 34759844)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.6
, pp. 1250-1276
-
-
Zamir, R.1
Shamai, S.2
Erez, U.3
|