-
3
-
-
84865467916
-
Polynomial-time, semantically-secure encryption achieving the secrecy capacity
-
M. Bellare and S. Tessaro, "Polynomial-time, semantically-secure encryption achieving the secrecy capacity, " Cryptology ePrint Archive, Report 2012/022, 2012, http://eprint.iacr.org/.
-
(2012)
Cryptology EPrint Archive, Report 2012/022
-
-
Bellare, M.1
Tessaro, S.2
-
4
-
-
84865447746
-
A cryptographic treatment of the wiretap channel
-
M. Bellare, S. Tessaro, and A. Vardy, "A cryptographic treatment of the wiretap channel, " Cryptology ePrint Archive, Report 2012/015, 2012, http://eprint.iacr.org/.
-
(2012)
Cryptology EPrint Archive, Report 2012/015
-
-
Bellare, M.1
Tessaro, S.2
Vardy, A.3
-
5
-
-
84865478919
-
Semantic security for the wiretap channel
-
LNCS, vol. 7417
-
M. Bellare, S. Tessaro, and A. Vardy, "Semantic security for the wiretap channel, " CRYPTO, LNCS, vol. 7417, pp. 294-311, 2012.
-
(2012)
CRYPTO
, pp. 294-311
-
-
Bellare, M.1
Tessaro, S.2
Vardy, A.3
-
6
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion, " SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
7
-
-
0018456171
-
Universal classes of hash functions
-
J. L. Carter and M. N. Wegman, "Universal classes of hash functions, " Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143 - 154, 1979.
-
(1979)
Journal of Computer and System Sciences
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
8
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
December
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals, " IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, December 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
9
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali, "Probabilistic encryption, " Journal of Computer and System Sciences, vol. 28, no. 2, pp. 270 - 299, 1984.
-
(1984)
Journal of Computer and System Sciences
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
11
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
R. Impagliazzo, L. A. Levin, and M. Luby, "Pseudo-random generation from one-way functions, " in Proc. ACM Symposium on Theory of Computing (STOC), 1989, pp. 12-24.
-
(1989)
Proc. ACM Symposium on Theory of Computing (STOC)
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
13
-
-
84860253232
-
Least squares superposition codes of moderate dictionary size are reliable at rates up to capacity
-
A. Joseph and A. R. Barron, "Least squares superposition codes of moderate dictionary size are reliable at rates up to capacity, " IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 2541-2557, 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.5
, pp. 2541-2557
-
-
Joseph, A.1
Barron, A.R.2
-
14
-
-
84991939136
-
LFSR-based hashing and authentication
-
LNCS, vol. 839
-
H. Krawczyk, "LFSR-based hashing and authentication, " CRYPTO, LNCS, vol. 839, pp. 129-139, 1994.
-
(1994)
CRYPTO
, pp. 129-139
-
-
Krawczyk, H.1
-
15
-
-
0017996501
-
The Gaussian wiretap channel
-
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wiretap channel, " IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-cheong, S.1
Hellman, M.2
-
16
-
-
84883187820
-
Semantically secure lattice codes for the gaussian wiretap channel
-
vol. abs/1210.6673v3
-
C. Ling, L. Luzzi, J.-C. Belfiore, and D. Stehlé, "Semantically secure lattice codes for the gaussian wiretap channel, " CoRR, vol. abs/1210.6673v3, 2013.
-
(2013)
CoRR
-
-
Ling, C.1
Luzzi, L.2
Belfiore, J.-C.3
Stehlé, D.4
-
18
-
-
33646767482
-
Simple and tight bounds for information reconciliation and privacy amplification
-
R. Renner and S. Wolf, "Simple and tight bounds for information reconciliation and privacy amplification, " in Proc. ASIACRYPT, 2005, pp. 199-216.
-
(2005)
Proc. ASIACRYPT
, pp. 199-216
-
-
Renner, R.1
Wolf, S.2
-
20
-
-
84873104997
-
Volumes of generalized unit balls
-
X. Wang, "Volumes of generalized unit balls, " Mathematics Magazine, vol. 78, no. 5, 2005.
-
(2005)
Mathematics Magazine
, vol.78
, Issue.5
-
-
Wang, X.1
-
21
-
-
0016562514
-
The wiretap channel
-
October
-
A. D. Wyner, "The wiretap channel, " Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1367, October 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
|