-
1
-
-
0027629488
-
Common randomness in information theory and cryptography-part i: Secret sharing
-
Ahlswede, R., Csiszár, I.: Common randomness in information theory and cryptography-part i: Secret sharing. IEEE Trans. Inf. Theory 39(4), 1121-1132 (1993)
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
0029405656
-
Generalized privacy amplification
-
Bennett, C.H., Brassard, G., Crépeau, C., Maurer, U.M.: Generalized privacy amplification. IEEE Trans. Inf. Theory 41(6), 1915-1923 (1995)
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
3
-
-
0023985539
-
Privacy amplification by public discussion
-
Bennett, C.H., Brassard, G., Robert, J.M.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210-229 (1988)
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.M.3
-
4
-
-
4243216277
-
Mixed-state entanglement and quantum error correction
-
Bennett, C.H., DiVincenzo, D.P., Smolin, J.A., Wootters, W.K.: Mixed-state entanglement and quantum error correction. Phys. Rev. A 54, 3824-3851 (1996)
-
(1996)
Phys. Rev. A
, vol.54
, pp. 3824-3851
-
-
Bennett, C.H.1
DiVincenzo, D.P.2
Smolin, J.A.3
Wootters, W.K.4
-
5
-
-
84957375876
-
Smooth entropy and Rényi entropy
-
Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
-
Cachin, C.: Smooth entropy and Rényi entropy. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 193-208. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 193-208
-
-
Cachin, C.1
-
6
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
also, see Cryptology ePrint Archive, Report 2000/067
-
Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. Proc. Annual Symposium on Foundations of Computer Science (also, see Cryptology ePrint Archive, Report 2000/067), 136-145 (2001)
-
(2001)
Proc. Annual Symposium on Foundations of Computer Science
, pp. 136-145
-
-
Canetti, R.1
-
7
-
-
0036818574
-
Multipartite classical and quantum secrecy monotones
-
Cerf, N., Massar, S., Schneider, S.: Multipartite classical and quantum secrecy monotones. Physical Review A 66(4), 042309 (2002)
-
(2002)
Physical Review A
, vol.66
, Issue.4
, pp. 042309
-
-
Cerf, N.1
Massar, S.2
Schneider, S.3
-
10
-
-
0141938910
-
A property of the intrinsic mutual information
-
June
-
Christandl, M., Renner, R., Wolf, S.: A property of the intrinsic mutual information. In: Proc. IEEE International Symposium on Information Theory, p. 258 (June 2003)
-
(2003)
Proc. IEEE International Symposium on Information Theory
, pp. 258
-
-
Christandl, M.1
Renner, R.2
Wolf, S.3
-
11
-
-
0029706655
-
Almost independence and secrecy capacity
-
Csiszár, I.: Almost independence and secrecy capacity. Prob. Pered. Inform. 32(1), 48-57 (1996)
-
(1996)
Prob. Pered. Inform.
, vol.32
, Issue.1
, pp. 48-57
-
-
Csiszár, I.1
-
13
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Csiszár, I., Narayan, P.: Secrecy capacities for multiple terminals. IEEE Trans. Inf. Theory 50(12), 3047-3061 (2004)
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
14
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing 38(1), 97-139 (2008)
-
(2008)
SIAM Journal on Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
15
-
-
77954600460
-
Information-theoretic key agreement of multiple terminals part i
-
Gohari, A.A., Anantharam, V.: Information-theoretic key agreement of multiple terminals part i. IEEE Trans. Inf. Theory 56(8), 3973-3996 (2010)
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3973-3996
-
-
Gohari, A.A.1
Anantharam, V.2
-
16
-
-
0038444459
-
General formulas for capacity of classical-quantum channels
-
Hayashi, M., Nagaoka, H.: General formulas for capacity of classical-quantum channels. IEEE Trans. Inf. Theory 49(7), 1753-1768 (2003)
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.7
, pp. 1753-1768
-
-
Hayashi, M.1
Nagaoka, H.2
-
17
-
-
0024866111
-
Pseudo-random generation from oneway functions
-
Impagliazzo, R., Levin, L.A., Luby, M.: Pseudo-random generation from oneway functions. In: Proc. Annual Symposium on Theory of Computing, pp. 12-24 (1989)
-
(1989)
Proc. Annual Symposium on Theory of Computing
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
20
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 39(3), 733-742 (1993)
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
21
-
-
0033097504
-
Unconditionally secure key agreement and the intrinsic conditional information
-
Maurer, U.M., Wolf, S.: Unconditionally secure key agreement and the intrinsic conditional information. IEEE Trans. Inf. Theory 45(2), 499-514 (1999)
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
22
-
-
0013317517
-
Communication with secrecy constraints
-
Orlitsky, A., Gamal, A.E.: Communication with secrecy constraints. In: STOC, pp. 217-224 (1984)
-
(1984)
STOC
, pp. 217-224
-
-
Orlitsky, A.1
Gamal, A.E.2
-
23
-
-
3242749566
-
-
Ph. D. Dissertation, Massachussetts Institute of Technology
-
Pappu, R.S.: Physical one-way functions. Ph. D. Dissertation, Massachussetts Institute of Technology (2001)
-
(2001)
Physical One-way Functions
-
-
Pappu, R.S.1
-
24
-
-
77951624674
-
Channel coding rate in the finite blocklength regime
-
Polyanskiy, Y., Poor, H.V., Verdú, S.: Channel coding rate in the finite blocklength regime. IEEE Trans. Inf. Theory 56(5), 2307-2359 (2010)
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.5
, pp. 2307-2359
-
-
Polyanskiy, Y.1
Poor, H.V.2
Verdú, S.3
-
26
-
-
35248888499
-
New bounds in secret-key agreement: The gap between formation and secrecy extraction
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Renner, R., Wolf, S.: New bounds in secret-key agreement: The gap between formation and secrecy extraction. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 562-577. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 562-577
-
-
Renner, R.1
Wolf, S.2
-
27
-
-
33646767482
-
Simple and tight bounds for information reconciliation and privacy amplification
-
DOI 10.1007/11593447-11, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
Renner, R., Wolf, S.: Simple and tight bounds for information reconciliation and privacy amplification. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 199-216. Springer, Heidelberg (2005) (Pubitemid 43763476)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3788 LNCS
, pp. 199-216
-
-
Renner, R.1
Wolf, S.2
-
28
-
-
70549105910
-
Trade-offs in information-theoretic multiparty one-way key agreement
-
Desmedt, Y. (ed.) ICITS 2007. Springer, Heidelberg
-
Renner, R., Wolf, S., Wullschleger, J.: Trade-offs in information-theoretic multiparty one-way key agreement. In: Desmedt, Y. (ed.) ICITS 2007. LNCS, vol. 4883, pp. 65-75. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.4883
, pp. 65-75
-
-
Renner, R.1
Wolf, S.2
Wullschleger, J.3
-
30
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C.E.: Communication theory of secrecy systems. Bell System Technical Journal 28, 656-715 (1949)
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
32
-
-
84882971734
-
How many queries will resolve common randomness?
-
Tyagi, H., Narayan, P.: How many queries will resolve common randomness? IEEE Trans. Inf. Theory 59(9), 5363-5378 (2013)
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.9
, pp. 5363-5378
-
-
Tyagi, H.1
Narayan, P.2
-
33
-
-
80053961199
-
When is a function securely computable?
-
Tyagi, H., Narayan, P., Gupta, P.: When is a function securely computable? IEEE Trans. Inf. Theory 57(10), 6337-6350 (2011)
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6337-6350
-
-
Tyagi, H.1
Narayan, P.2
Gupta, P.3
-
34
-
-
0032025985
-
Entanglement measures and purification procedures
-
Vedral, V., Plenio, M.B.: Entanglement measures and purification procedures. Phys. Rev. A 57, 1619-1633 (1998)
-
(1998)
Phys. Rev. A
, vol.57
, pp. 1619-1633
-
-
Vedral, V.1
Plenio, M.B.2
-
35
-
-
84861651671
-
One-shot classical-quantum capacity and hypothesis testing
-
Wang, L., Renner, R.: One-shot classical-quantum capacity and hypothesis testing. Phys. Rev. Lett. 108(20), 200501 (2012)
-
(2012)
Phys. Rev. Lett.
, vol.108
, Issue.20
, pp. 200501
-
-
Wang, L.1
Renner, R.2
|