-
1
-
-
0026626314
-
Experimental quantum cryptography
-
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” Journal of Cryptology, vol. 5, no. 1, pp. 3-28, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
2
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, “Generalized privacy amplification,” IEEE Transactions on Information Theory, vol. 41, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crepeau, C.3
Maurer, U.M.4
-
3
-
-
84950117252
-
How to reduce your enemys information
-
Springer-Verlag
-
C. H. Bennett, G. Brassard, and J.-M. Robert, “How to reduce your enemy’s information,” in Advances in Cryptology–CRYPTO’85 (H. C. Williams, ed.), vol. 218 of Lecture Notes in Computer Science, pp. 468-476, Springer-Verlag, 1986.
-
(1986)
Advances in Cryptology–CRYPTO’85 (H. C. Williams, Ed.), Vol. 218 of Lecture Notes in Computer Science
, pp. 468-476
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
4
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. Bennett, G. Brassard, and J.-M. Robert, “Privacy amplification by public discussion,” SIAM Journal on Computing, vol. 17, pp. 210-229, Apr. 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
5
-
-
0012182948
-
25 years of quantum cryptography
-
G. Brassard and C. Crepeau, “25 years of quantum cryptography,” SIG ACT News, vol. 27, no. 3, pp. 13-24, 1996.
-
(1996)
SIG ACT News
, vol.27
, Issue.3
, pp. 13-24
-
-
Brassard, G.1
Crepeau, C.2
-
10
-
-
0010074899
-
Efficient cryptographic protocols based on noisy channels
-
C. Crepeau, “Efficient cryptographic protocols based on noisy channels.” Proceedings of EUROCRYPT’97, 1997.
-
(1997)
Proceedings of EUROCRYPT’97
-
-
Crepeau, C.1
-
11
-
-
33745533362
-
-
Tech. Rep. 91-068, International Computer Science Institute (ICSI), Berkeley
-
T. Hastad, R. Impagliazzo, L. A. Levin, and M. Luby, “Construction of a pseudorandom generator from any one-way function,” Tech. Rep. 91-068, International Computer Science Institute (ICSI), Berkeley, 1991.
-
(1991)
Construction of a Pseudorandom Generator from Any One-Way Function
-
-
Hastad, T.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
12
-
-
0024866111
-
Pseudo-random generation from oneway functions
-
R. Impagliazzo, L. A. Levin, and M. Luby, “Pseudo-random generation from oneway functions,” in Proc. 21st Annual ACM Symposium on Theory of Computing (STOC), pp. 12-24, 1989.
-
(1989)
Proc. 21St Annual ACM Symposium on Theory of Computing (STOC)
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
16
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. M. Maurer, “Secret key agreement by public discussion from common information,” IEEE Transactions on Information Theory, vol. 39, pp. 733-742, May 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
18
-
-
0002408684
-
On measures of entropy and information
-
(Berkeley), Univ. of Calif. Press
-
A. Renyi, “On measures of entropy and information,” in Proc. 4th Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, (Berkeley), pp. 547-561, Univ. of Calif. Press, 1961.
-
(1961)
Proc. 4Th Berkeley Symposium on Mathematical Statistics and Probability
, vol.1
, pp. 547-561
-
-
Renyi, A.1
-
19
-
-
0029375649
-
Generating random bits from an arbitrary source: Fundamental limits
-
S. Vembu and S. Verdu, “Generating random bits from an arbitrary source: Fundamental limits,” IEEE Transactions on Information Theory, vol. 41, pp. 1322-1332, Sept. 1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, pp. 1322-1332
-
-
Vembu, S.1
Verdu, S.2
-
20
-
-
0001023343
-
Simulating BPP using a general weak random source
-
Preliminary version presented at 32nd FOCS (1991)
-
D. Zuckerman, “Simulating BPP using a general weak random source,” Algorith-mica, vol. 16, pp. 367-391, 1996. Preliminary version presented at 32nd FOCS (1991).
-
(1996)
Algorith-Mica
, vol.16
, pp. 367-391
-
-
Zuckerman, D.1
|