-
1
-
-
84894116979
-
Information theoretic security for encryption based on conditional Renyi entropies
-
Iwamoto, M., Shikata, J.: Information theoretic security for encryption based on conditional Renyi entropies. IACR Cryptology ePrint Archive, 2013/440 (2013)
-
(2013)
IACR Cryptology EPrint Archive, 2013/440
-
-
Iwamoto, M.1
Shikata, J.2
-
2
-
-
84940644968
-
A mathematical theory of communication
-
Shannon, C.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379-423 (1948)
-
(1948)
Bell Syst. Tech. J.
, vol.273
, Issue.3
, pp. 379-423
-
-
Shannon, C.1
-
3
-
-
84980082105
-
Transmission of information
-
Hartley, R.V.L.: Transmission of information. Bell Syst. Tech. J. 7(3), 535-563 (1928)
-
(1928)
Bell Syst. Tech. J.
, vol.7
, Issue.3
, pp. 535-563
-
-
Hartley, R.V.L.1
-
4
-
-
0345253860
-
A pseudorandom generator from one-way function
-
Haståd, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from one-way function. SIAM J. Comput. 22, 1364-1396 (1994)
-
(1994)
SIAM J. Comput.
, vol.22
, pp. 1364-1396
-
-
Haståd, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
5
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C.E.: Communication theory of secrecy systems. Bell Tech. J. 28, 656-715 (1949)
-
(1949)
Bell Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
6
-
-
84865034944
-
Shannon impossibility, revisited
-
Smith, A. (ed.) ICITS 2012 Springer, Heidelberg
-
Dodis, Y.: Shannon impossibility, revisited. In: Smith, A. (ed.) ICITS 2012. LNCS, vol. 7412, pp. 100-110. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7412
, pp. 100-110
-
-
Dodis, Y.1
-
7
-
-
84865014320
-
Guessing secrecy
-
Smith, A. (ed.) ICITS 2012 Springer, Heidelberg
-
Alimomeni, M., Safavi-Naini, R.: Guessing secrecy. In: Smith, A. (ed.) ICITS 2012. LNCS, vol. 7412, pp. 1-13. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7412
, pp. 1-13
-
-
Alimomeni, M.1
Safavi-Naini, R.2
-
9
-
-
84862576486
-
Conditional rényi entropies
-
Teixeira, A., Matos, A., Antunes, L.: Conditional Rényi entropies. IEEE Trans. Inf. Theory 58(7), 4273-4277 (2012)
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.7
, pp. 4273-4277
-
-
Teixeira, A.1
Matos, A.2
Antunes, L.3
-
10
-
-
33747650890
-
Information measures and capacity of order α for discrete memoryless channels
-
Topics in Information Theory
-
Arimoto, S.: Information measures and capacity of order α for discrete memoryless channels. Colloquia Mathematica Societatis János Bolyai, 16. Topics in Information Theory 41-52 (1975)
-
(1975)
Colloquia Mathematica Societatis János Bolyai
, vol.16
, pp. 41-52
-
-
Arimoto, S.1
-
11
-
-
79957636296
-
Exponential decreasing rate of leaked information in universal random privacy amplification
-
Hayashi, M.: Exponential decreasing rate of leaked information in universal random privacy amplification. IEEE Trans. Inf. Theory 57(6), 3989-4001 (2011)
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.6
, pp. 3989-4001
-
-
Hayashi, M.1
-
12
-
-
0343104838
-
Class notes for transmission of information (course 6.574)
-
Cambridge.
-
Fano, R.M.: Class notes for transmission of information (course 6.574). Technical report, MIT, Cambridge. (1952)
-
(1952)
Technical Report, MIT
-
-
Fano, R.M.1
-
13
-
-
77951624674
-
Channel coding rate in the finite blocklength regime
-
Polyanskiy, Y., Poor, V., Verdú, S.: Channel coding rate in the finite blocklength regime. IEEE Trans. Inf. Theory 56(5), 2307-2359 (2010)
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.5
, pp. 2307-2359
-
-
Polyanskiy, Y.1
Poor, V.2
Verdú, S.3
-
16
-
-
3042858195
-
Generalized statistics: Yet another generalization
-
Jizba, P., Arimitsu, T.: Generalized statistics: yet another generalization. Phys. A 340, 110-116 (2004)
-
(2004)
Phys. A
, vol.340
, pp. 110-116
-
-
Jizba, P.1
Arimitsu, T.2
-
17
-
-
3142672769
-
The world according to Rényi: Thermodynamics of multifractal systems
-
DOI 10.1016/j.aop.2004.01.002, PII S0003491604000132
-
Jizba, P., Arimitsu, T.: The world according to Rényi: thermodynamics of multifractal systems. Ann. Phys. 312, 17-59 (2004) (Pubitemid 38939247)
-
(2004)
Annals of Physics
, vol.312
, Issue.1
, pp. 17-59
-
-
Jizba, P.1
Arimitsu, T.2
-
18
-
-
33646767482
-
Simple and tight bounds for information reconciliation and privacy amplification
-
DOI 10.1007/11593447-11, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
Renner, R.S., Wolf, S.: Simple and tight bounds for information reconciliation and privacy amplification. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 199-216. Springer, Heidelberg (2005) (Pubitemid 43763476)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3788 LNCS
, pp. 199-216
-
-
Renner, R.1
Wolf, S.2
-
22
-
-
0018020371
-
Polymatroidal dependence structure of a set of random variables
-
Fujishige, S.: Polymatroidal dependence structure of a set of random variables. Inf. Control 39, 55-72 (1978) (Pubitemid 9408951)
-
(1978)
Inf Control
, vol.39
, Issue.1
, pp. 55-72
-
-
Fujishige, S.1
-
23
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004 Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
24
-
-
33749541274
-
Robust fuzzy extractors and authenticated key agreement from close secrets
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust fuzzy extractors and authenticated key agreement from close secrets. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 232-250. Springer, Heidelberg (2006) (Pubitemid 44532119)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117 LNCS
, pp. 232-250
-
-
Dodis, Y.1
Katz, J.2
Reyzin, L.3
Smith, A.4
-
25
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97-139 (2008)
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Katz, J.2
Reyzin, L.3
Smith, A.4
-
26
-
-
33749541274
-
Robust fuzzy extractors and authenticated key agreement from close secrets
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust fuzzy extractors and authenticated key agreement from close secrets. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 232-250. Springer, Heidelberg (2006) (Pubitemid 44532119)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117 LNCS
, pp. 232-250
-
-
Dodis, Y.1
Katz, J.2
Reyzin, L.3
Smith, A.4
-
27
-
-
84873970779
-
Overcoming weak expectations
-
Sahai, A. (ed.) TCC 2013 Springer, Heidelberg
-
Dodis, Y., Yu, Y.: Overcoming weak expectations. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 1-22. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7785
, pp. 1-22
-
-
Dodis, Y.1
Yu, Y.2
-
28
-
-
84866642869
-
PUFs: Myth, fact or busted? a security evaluation of physically unclonable functions (PUFs) cast in silicon
-
Prouff, E., Schaumont, P. (eds.) CHES 2012 Springer, Heidelberg
-
Katzenbeisser, S., Kocabaş, U., Rozić, V., Sadeghi, A.-R., Verbauwhede, I.,Wachsmann, C.: PUFs: myth, fact or busted? a security evaluation of physically unclonable functions (PUFs) cast in silicon. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 283-301. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7428
, pp. 283-301
-
-
Katzenbeisser, S.1
Kocabaş, U.2
Rozić, V.3
Sadeghi, A.-R.4
Verbauwhede, I.5
Wachsmann, C.6
-
29
-
-
0029732887
-
An inequality on guessing and its application to sequential decoding
-
PII S0018944896000338
-
Arikan, E.: An inequality on guessing and its application to sequential decoding. IEEE Trans. Inf. Theory 42(1), 99-105 (1996) (Pubitemid 126775660)
-
(1996)
IEEE Transactions on Information Theory
, vol.42
, Issue.1
, pp. 99-105
-
-
Arikan, E.1
-
30
-
-
77951101999
-
New coding theorems for fixed-length source coding and Shannon's cipher system with a general source
-
December
-
Koga, H.: New coding theorems for fixed-length source coding and Shannon's cipher system with a general source. In: ISITA2008, pp. 251-256, December 2008
-
(2008)
ISITA2008
, pp. 251-256
-
-
Koga, H.1
-
32
-
-
77955614196
-
Smooth Rényi entropy and its applications
-
June-July
-
Renner, R., Wolf, S.: Smooth Rényi entropy and its applications. In: ISIT2004, p. 232, June-July, 2004
-
(2004)
ISIT2004
, pp. 232
-
-
Renner, R.1
Wolf, S.2
|