-
1
-
-
84865454990
-
-
Available at arxiv.org/abs/1006.3573
-
Andersson, M., Rathi, V., Thobaben, R., Kliewer, J., Skoglund, M.: Nested polar codes for wiretap and relay channels. Available at arxiv.org/abs/1006. 3573 (2010)
-
(2010)
Nested Polar Codes for Wiretap and Relay Channels
-
-
Andersson, M.1
Rathi, V.2
Thobaben, R.3
Kliewer, J.4
Skoglund, M.5
-
2
-
-
67650099990
-
Channel polarization: A method for constructing capacity achieving codes for symmetric binary-input memoryless channels
-
Arikan, E.: Channel polarization: A method for constructing capacity achieving codes for symmetric binary-input memoryless channels. IEEE Transactions on Information Theory 55(7), 3051-3073 (2009)
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, Issue.7
, pp. 3051-3073
-
-
Arikan, E.1
-
3
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
IEEE Computer Society Press October
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: 38th FOCS, pp. 394-403. IEEE Computer Society Press (October 1997)
-
(1997)
38th FOCS
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
4
-
-
84865467916
-
Polynomial-time, semantically-secure encryption achieving the secrecy capacity
-
Available as arxiv.org/abs/1201.3160 and Eprint Archive Report 2012/022 January
-
Bellare, M., Tessaro, S.: Polynomial-time, semantically-secure encryption achieving the secrecy capacity. Available as arxiv.org/abs/1201.3160 and Cryptology Eprint Archive Report 2012/022 (January 2012)
-
(2012)
Cryptology
-
-
Bellare, M.1
Tessaro, S.2
-
5
-
-
84865447746
-
A cryptographic treatment of the wiretap channel
-
Available as arxiv.org/abs/1201.2205 and Eprint Archive Report 2012/15 January
-
Bellare, M., Tessaro, S., Vardy, A.: A cryptographic treatment of the wiretap channel. Available as arxiv.org/abs/1201.2205 and Cryptology Eprint Archive Report 2012/15 (January 2012)
-
(2012)
Cryptology
-
-
Bellare, M.1
Tessaro, S.2
Vardy, A.3
-
7
-
-
64549110900
-
On the secrecy capacity of arbitrary wiretap channels
-
September
-
Bloch, M., Laneman, J.N.: On the secrecy capacity of arbitrary wiretap channels. In: Proceedings of the 46th Allerton Conference on Communications, Control, and Computing, pp. 818-825 (September 2008)
-
(2008)
Proceedings of the 46th Allerton Conference on Communications, Control, and Computing
, pp. 818-825
-
-
Bloch, M.1
Laneman, J.N.2
-
8
-
-
84856860359
-
Invertible extractors and wiretap protocols
-
Cheraghchi, M., Didier, F., Shokrollahi, A.: Invertible extractors and wiretap protocols. IEEE Transactions on Information Theory 58(2), 1254-1274 (2012)
-
(2012)
IEEE Transactions on Information Theory
, vol.58
, Issue.2
, pp. 1254-1274
-
-
Cheraghchi, M.1
Didier, F.2
Shokrollahi, A.3
-
12
-
-
0000489740
-
Information-type measures of difference of probability distributions and indirect observations
-
Csiszár, I.: Information-type measures of difference of probability distributions and indirect observations. Studia Scientiarum Mathematicarum Hungarica 2, 299-318 (1967)
-
(1967)
Studia Scientiarum Mathematicarum Hungarica
, vol.2
, pp. 299-318
-
-
Csiszár, I.1
-
13
-
-
33750056552
-
Almost independence and secrecy capacity
-
Csiszár, I.: Almost independence and secrecy capacity. Problems of Information Transmission 32(1), 40-47 (1996)
-
(1996)
Problems of Information Transmission
, vol.32
, Issue.1
, pp. 40-47
-
-
Csiszár, I.1
-
15
-
-
0032073057
-
Statistical secrecy and multibit commitments
-
Damgard, I., Pedersen, T., Pfitzmann, B.: Statistical secrecy and multibit commitments. IEEE Transactions on Information Theory 44(3), 1143-1151 (1998)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.3
, pp. 1143-1151
-
-
Damgard, I.1
Pedersen, T.2
Pfitzmann, B.3
-
16
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing 38(1), 97-139 (2008)
-
(2008)
SIAM Journal on Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
17
-
-
35048865463
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
18
-
-
0001173821
-
Concatenated codes and their multilevel generalizations
-
Elsevier
-
Dumer, I.: Concatenated codes and their multilevel generalizations. In: The Handbook of Coding Theory, pp. 1191-1988. Elsevier (1998)
-
(1998)
The Handbook of Coding Theory
, pp. 1191-1988
-
-
Dumer, I.1
-
20
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM Journal on Computing 28(4), 1364-1396 (1999)
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
22
-
-
78649397864
-
The interplay between entropy and variational distance
-
Ho, S., Yeung, R.: The interplay between entropy and variational distance. IEEE Transactions on Information Theory 56(12), 5906-5929 (2010)
-
(2010)
IEEE Transactions on Information Theory
, vol.56
, Issue.12
, pp. 5906-5929
-
-
Ho, S.1
Yeung, R.2
-
28
-
-
68349116049
-
Information theoretic security
-
Liang, Y., Poor, H., Shamai, S.: Information theoretic security. Foundations and Trends in Communications and Information Theory 5(4), 355-580 (2008)
-
(2008)
Foundations and Trends in Communications and Information Theory
, vol.5
, Issue.4
, pp. 355-580
-
-
Liang, Y.1
Poor, H.2
Shamai, S.3
-
30
-
-
80053941690
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
Mahdavifar, H., Vardy, A.: Achieving the secrecy capacity of wiretap channels using polar codes. IEEE Transactions on Information Theory 57(10), 6428-6443 (2011)
-
(2011)
IEEE Transactions on Information Theory
, vol.57
, Issue.10
, pp. 6428-6443
-
-
Mahdavifar, H.1
Vardy, A.2
-
31
-
-
0005059185
-
The strong secret key rate of discrete random triples
-
Blahut, R.E. (ed.) Kluwer
-
Maurer, U.: The strong secret key rate of discrete random triples. In: Blahut, R.E. (ed.) Communication and Cryptography - Two Sides of One Tapestry, pp. 271-285. Kluwer (1994)
-
(1994)
Communication and Cryptography - Two Sides of One Tapestry
, pp. 271-285
-
-
Maurer, U.1
-
32
-
-
84948960386
-
Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Maurer, U.M., Wolf, S.: Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 351-368. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 351-368
-
-
Maurer, U.M.1
Wolf, S.2
-
34
-
-
85017588958
-
Wire-Tap Channel II
-
Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. Springer, Heidelberg
-
Ozarow, L.H., Wyner, A.D.: Wire-Tap Channel II. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 33-50. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.209
, pp. 33-50
-
-
Ozarow, L.H.1
Wyner, A.D.2
-
36
-
-
33646767482
-
Simple and Tight Bounds for Information Reconciliation and Privacy Amplification
-
Roy, B. (ed.) ASIACRYPT 2005. Springer, Heidelberg
-
Renner, R., Wolf, S.: Simple and Tight Bounds for Information Reconciliation and Privacy Amplification. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 199-216. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 199-216
-
-
Renner, R.1
Wolf, S.2
-
38
-
-
80051953037
-
Strong secrecy for erasure wiretap channels
-
IEEE
-
Suresh, A., Subramanian, A., Thangaraj, A., Bloch, M., McLaughlin, S.W.: Strong secrecy for erasure wiretap channels. In: Proc. of the IEEE Information Theory Workshop (ITW 2010). IEEE (2010)
-
(2010)
Proc. of the IEEE Information Theory Workshop (ITW 2010)
-
-
Suresh, A.1
Subramanian, A.2
Thangaraj, A.3
Bloch, M.4
McLaughlin, S.W.5
-
40
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
Thangaraj, A., Dihidar, S., Calderbank, A., McLaughlin, S., Merolla, J.: Applications of LDPC codes to the wiretap channel. IEEE Transactions on Information Theory 53(8), 2933-2945 (2007)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.3
McLaughlin, S.4
Merolla, J.5
-
41
-
-
0016562514
-
The wire-tap channel
-
Wyner, A.D.: The wire-tap channel. Bell Systems Tech. Journal 54(8), 1355-1387 (1975)
-
(1975)
Bell Systems Tech. Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
42
-
-
84865457738
-
-
Ziva corporation, http://www.ziva-corp.com/
-
-
-
|