-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
77951458752
-
Information-theoretically secure secret-key agreement by not authenticated public discussion
-
U. M. Maurer, "Information-theoretically secure secret-key agreement by not authenticated public discussion," in Proc. of EUROCRYPT'97, 1997, pp. 209-225.
-
(1997)
Proc. of EUROCRYPT'97
, pp. 209-225
-
-
Maurer, U.M.1
-
3
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels i: Definitions and a completeness result
-
U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels i: Definitions and a completeness result," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 822-831
-
-
Maurer, U.M.1
Wolf, S.2
-
4
-
-
0027629488
-
Common randomness in information theory and cryptography-i: Secret sharing
-
R. Ahlswede and I. Csisźar, "Common randomness in information theory and cryptography-i: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csisźar, I.2
-
5
-
-
0030259976
-
Cryptographic key agreement for mobile radio
-
A. A. Hassan, W. E. Stark, J. E. Hershey, and S. Chennakeshu, "Cryptographic key agreement for mobile radio," Digital Signal Processing, vol. 6, pp. 207-212, 1996.
-
(1996)
Digital Signal Processing
, vol.6
, pp. 207-212
-
-
Hassan, A.A.1
Stark, W.E.2
Hershey, J.E.3
Chennakeshu, S.4
-
6
-
-
60149088258
-
Robust key generation from signal envelopes in wireless networks
-
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in Proc. of CCS'07, 2007, pp. 401-410.
-
(2007)
Proc. of CCS'07
, pp. 401-410
-
-
Azimi-Sadjadi, B.1
Kiayias, A.2
Mercado, A.3
Yener, B.4
-
7
-
-
60149097098
-
Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
-
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: extracting a secret key from an unauthenticated wireless channel," in Proc. MobiCom'08, 2008, pp. 128-139.
-
(2008)
Proc. MobiCom'08
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
8
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strength in real environments," in Proc. MobiCom'09, 2009, pp. 321-332.
-
(2009)
Proc. MobiCom'09
, pp. 321-332
-
-
Jana, S.1
Premnath, S.N.2
Clark, M.3
Kasera, S.K.4
Patwari, N.5
Krishnamurthy, S.V.6
-
10
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in uwb channels
-
R. Wilson, D. Tse, R. A. Scholtz, and L. Fellow, "Channel identification: Secret sharing using reciprocity in uwb channels," IEEE Trans. Inf. Forens. Security, pp. 364-375, 2007.
-
(2007)
IEEE Trans. Inf. Forens. Security
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
Fellow, L.4
-
11
-
-
0016102201
-
Single-tone parameter estimation from discrete-time observations
-
Sep.
-
D. Rife and R. Boorstyn, "Single-tone parameter estimation from discrete-time observations," IEEE Trans. Inf. Theory, vol. 20, no. 5, pp. 591-598, Sep. 1974.
-
(1974)
IEEE Trans. Inf. Theory
, vol.20
, Issue.5
, pp. 591-598
-
-
Rife, D.1
Boorstyn, R.2
-
12
-
-
67650671123
-
Key agreement from close secrets over unsecured channels
-
B. Kanukurthi and L. Reyzin, "Key agreement from close secrets over unsecured channels," in Proc. of EUROCRYPT'09, 2009, pp. 206-223.
-
(2009)
Proc. of EUROCRYPT'09
, pp. 206-223
-
-
Kanukurthi, B.1
Reyzin, L.2
-
13
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM Journal of Computing, vol. 38, no. 1, pp. 97-139, 2008.
-
(2008)
SIAM Journal of Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
14
-
-
76249088301
-
A unified framework for key agreement over wireless fading channels
-
L. Lai and H. V. Poor, "A unified framework for key agreement over wireless fading channels," in IEEE Information Theory Workshop (ITW), 2009, pp. 100-104.
-
(2009)
IEEE Information Theory Workshop (ITW)
, pp. 100-104
-
-
Lai, L.1
Poor, H.V.2
-
15
-
-
84866891866
-
Cooperative secret key generation from phase estimation in narrowband fading channels
-
September
-
Q. Wang, K. Xu, and K. Ren, "Cooperative secret key generation from phase estimation in narrowband fading channels," Illinois Institute of Technology, Chicago, IL, Tech. Rep., September 2011, http://arxiv.org/abs/1109. 0766.
-
(2011)
Illinois Institute of Technology, Chicago, IL, Tech. Rep.
-
-
Wang, Q.1
Xu, K.2
Ren, K.3
-
16
-
-
0003822632
-
-
800th ed., National Institute of Standards and Technology, May
-
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Hechert, J. Dray, and S. Vo, A Statistical Test Suite For Random and Pseudorandom Number Generators For Cryptographic Applications, 800th ed., National Institute of Standards and Technology, May 2001.
-
(2001)
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Smid, M.4
Barker, E.5
Leigh, S.6
Levenson, M.7
Vangel, M.8
Banks, D.9
Hechert, A.10
Dray, J.11
Vo, S.12
|