-
1
-
-
0027629488
-
Common randomness in information theory and cryptography-I: Secret sharing
-
Jul
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
45249098450
-
On oblivious transfer capacity
-
Nice, France, Jun
-
R. Ahlswede and I. Csiszár, "On oblivious transfer capacity," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007, pp. 2061-2064.
-
(2007)
Proc IEEE Int. Symp. Inf. Theory
, pp. 2061-2064
-
-
Ahlswede, R.1
Csiszár, I.2
-
3
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J. M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.M.3
-
4
-
-
0029405656
-
Generalized privacy amplification
-
Nov
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
5
-
-
0019566096
-
An achievable rate region for the multiple-access channel with feedback
-
May
-
T. M. Cover and C. S. K. Leung, "An achievable rate region for the multiple-access channel with feedback," IEEE Trans. Inf. Theory, vol. 27, no. 3, pp. 292-298, May 1981.
-
(1981)
IEEE Trans. Inf. Theory
, vol.27
, Issue.3
, pp. 292-298
-
-
Cover, T.M.1
Leung, C.S.K.2
-
6
-
-
0029706655
-
Almost independence and secrecy capacity
-
I. Csiszár, "Almost independence and secrecy capacity," Probl. Pered. Inform. (Special Issue Devoted to M. S. Pinsker), vol. 32, no. 1, pp. 48-57, 1996.
-
(1996)
Probl. Pered. Inform. (Special Issue Devoted to M. S. Pinsker)
, vol.32
, Issue.1
, pp. 48-57
-
-
Csiszár, I.1
-
7
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
9
-
-
10644270917
-
The secret key capacity of multiple terminals
-
Dec
-
I. Csiszár and P. Narayan, "The secret key capacity of multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
10
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
Jun
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csiszár, I.1
Narayan, P.2
-
11
-
-
70449515425
-
Secrecy generation for multiple input multiple output channel models
-
Seoul, Korea, Jun./Jul
-
I. Csiszár and P. Narayan, "Secrecy generation for multiple input multiple output channel models," in Proc. IEEE Int. Symp. Inf. Theory, Seoul, Korea, Jun./Jul. 2009, pp. 2447-2451.
-
(2009)
Proc IEEE Int. Symp. Inf. Theory
, pp. 2447-2451
-
-
Csiszár, I.1
Narayan, P.2
-
12
-
-
77954600460
-
Information-theoretic key agreement of multiple terminals-Part I: Source model
-
Aug.
-
A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-Part I: Source model," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3973-3996, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3973-3996
-
-
Gohari, A.1
Anantharam, V.2
-
13
-
-
77954570193
-
Information-theoretic key agreement of multiple terminals-Part II: Channel model
-
Aug.
-
A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-Part II: Channel model," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3997-4010, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3997-4010
-
-
Gohari, A.1
Anantharam, V.2
-
14
-
-
84871739161
-
Dependence balance bounds for multiple access channels with feedback and equal output two-way channels
-
Mierlo, The Netherlands May
-
A. P. Hekstra and F. M. J. Willems, "Dependence balance bounds for multiple access channels with feedback and equal output two-way channels," in Proc. Zesde Symp. Over Informatie Theory de Benelux, Mierlo, The Netherlands, May 1985, pp. 193-198.
-
(1985)
Proc. Zesde Symp. over Informatie Theory de Benelux
, pp. 193-198
-
-
Hekstra, A.P.1
Willems, F.M.J.2
-
15
-
-
34447344072
-
Generalized entropy power inequalities and monotonicity properties of information
-
DOI 10.1109/TIT.2007.899484
-
M. Madiman and A. Barron, "Generalized entropy power inequalities and monotonicity properties of information," IEEE Trans. Inf. Theory, vol. 53, no. 7, pp. 2317-2329, Jul. 2007. (Pubitemid 47061898)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.7
, pp. 2317-2329
-
-
Madiman, M.1
Barron, A.2
-
16
-
-
77957602848
-
Information inequalities for joint distributions, with interpretations and applications
-
Jun.
-
M. Madiman and P. Tetali, "Information inequalities for joint distributions, with interpretations and applications," IEEE Trans. Inf. Theory, vol. 56, no. 6, pp. 2699-2713, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.6
, pp. 2699-2713
-
-
Madiman, M.1
Tetali, P.2
-
17
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
18
-
-
0005059185
-
The strong secret key rate of discrete random triples
-
R. E. Blahut D. J. Costello Jr., U. Maurer, and T. Mittelholzer, Eds. Norwell, MA: Kluwer ch. 26
-
U. M. Maurer, "The Strong Secret Key Rate of Discrete Random Triples," in Communications and Cryptography: Two Sides of One Tapestry, R. E. Blahut, D. J. Costello Jr., U. Maurer, and T. Mittelholzer, Eds. Norwell, MA: Kluwer, 1994, ch. 26, pp. 271-285.
-
(1994)
Communications and Cryptography: Two Sides of One Tapestry
, pp. 271-285
-
-
Maurer, U.M.1
-
19
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
Mar
-
U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and the intrinsic conditional information," IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
20
-
-
0009801824
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proc. EUROCRYPT, 2000, pp. 352-368.
-
(2000)
Proc. EUROCRYPT
, pp. 352-368
-
-
Maurer, U.M.1
Wolf, S.2
-
21
-
-
35248888499
-
New bounds in secret-key agreement: The gap between formation and secrecy extraction
-
R. Renner and S. Wolf, "New bounds in secret-key agreement: The gap between formation and secrecy extraction," in Proc. EUROCRYPT, 2003, pp. 562-577.
-
(2003)
Proc. EUROCRYPT
, pp. 562-577
-
-
Renner, R.1
Wolf, S.2
-
22
-
-
0019343146
-
The feedback capacity region of a class of discrete memoryless multiple access channels
-
Jan
-
F. M. J. Willems, "The feedback capacity region of a class of discrete memoryless multiple access channels," IEEE Trans. Inf. Theory, vol. 28, no. 1, pp. 93-95, Jan. 1982.
-
(1982)
IEEE Trans. Inf. Theory
, vol.28
, Issue.1
, pp. 93-95
-
-
Willems, F.M.J.1
-
23
-
-
0021518188
-
On multiple access channels with feedback
-
Nov
-
F. M. J. Willems, "On multiple access channels with feedback," IEEE Trans. Inf. Theory, vol. 30, no. 6, pp. 842-845, Nov. 1984.
-
(1984)
IEEE Trans. Inf. Theory
, vol.30
, Issue.6
, pp. 842-845
-
-
Willems, F.M.J.1
-
24
-
-
0016562514
-
The wiretap channel
-
A. D. Wyner, "The wiretap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
|