-
1
-
-
84990678058
-
Simple Construction of Almost k-wise Independent Random Variables
-
N. Alon and O. Goldreich and J. Håstad and R. Peralta, Simple Construction of Almost k-wise Independent Random Variables, Random Structures and Algorithms 3(3): 289-304, 1992.
-
(1992)
Random Structures and Algorithms
, vol.3
, Issue.3
, pp. 289-304
-
-
Alon, N.1
Goldreich, O.2
Håstad, J.3
Peralta, R.4
-
2
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett and G. Brassard and C. Crépeau and U. M. Maurer, Generalized privacy amplification, IEEE Transactions on Information Theory 41(6): 1915-1923, 1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
3
-
-
0023985539
-
Privacy Amplification by Public Discussion
-
C. H. Bennett and G. Brassard and J. M. Robert, Privacy Amplification by Public Discussion, SIAM J. Comput. 17(2): 210-229, 1988
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.M.3
-
5
-
-
0023985259
-
Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
-
B. Chor and O. Goldreich, Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity, SIAM J. on Computing 17(2): 230-261, 1988.
-
(1988)
SIAM J. on Computing
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
10
-
-
68549120859
-
Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes
-
V. Guruswami and C. Umans and S. Vadhan, Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes, Journal of the ACM (JACM) 56(4): 1-34, 2009.
-
(2009)
Journal of the ACM (JACM)
, vol.56
, Issue.4
, pp. 1-34
-
-
Guruswami, V.1
Umans, C.2
Vadhan, S.3
-
13
-
-
78149248764
-
Protocols for Secret Key Agreement by Public Discussion Based on Common Information
-
U. M. Maurer, Protocols for Secret Key Agreement by Public Discussion Based on Common Information, Advance in Cryptology - CRYPTO '92: 461-470, 1992.
-
(1992)
Advance in Cryptology - CRYPTO '92
, pp. 461-470
-
-
Maurer, U.M.1
-
14
-
-
77951458752
-
Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion
-
U. M. Maurer, Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion, Advance in Cryptology - EUROCRYPT '97: 209-225, 1997.
-
(1997)
Advance in Cryptology - EUROCRYPT '97
, pp. 209-225
-
-
Maurer, U.M.1
-
15
-
-
0037396951
-
EmphSecret-key agreement over unauthenticated public channels III: Privacy amplification
-
U. M. Maurer and S. Wolf, emphSecret-key agreement over unauthenticated public channels III: Privacy amplification, IEEE Transactions on Information Theory 49(4): 839-851, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.M.1
Wolf, S.2
-
16
-
-
84958670019
-
Privacy Amplification Secure Against Active Adversaries
-
U. M. Maurer and S. Wolf, Privacy Amplification Secure Against Active Adversaries, Advance in Cryptology - CRYPTO '97: 307-321, 1997.
-
(1997)
Advance in Cryptology - CRYPTO '97
, pp. 307-321
-
-
Maurer, U.M.1
Wolf, S.2
-
17
-
-
0027641832
-
Small-Bias Probability Spaces: Efficient Constructions and Applications
-
J. Naor and M. Naor, Small-Bias Probability Spaces: Efficient Constructions and Applications, SIAM J. on Computing 22(4): 838-856, 1993.
-
(1993)
SIAM J. on Computing
, vol.22
, Issue.4
, pp. 838-856
-
-
Naor, J.1
Naor, M.2
-
20
-
-
35048874991
-
Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret
-
R. Renner and S. Wolf, Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret, Advance in Cryptology - CRYPTO '03: 78-95, 2003.
-
(2003)
Advance in Cryptology - CRYPTO '03
, pp. 78-95
-
-
Renner, R.1
Wolf, S.2
-
21
-
-
84947780088
-
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement
-
S. Wolf, Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement, Advance in Cryptology - ASIACRYPT '98: 405-419, 1998.
-
(1998)
Advance in Cryptology - ASIACRYPT '98
, pp. 405-419
-
-
Wolf, S.1
|