-
1
-
-
0023985539
-
Privacy amplification by public discussion
-
C. Bennett, G. Brassard, and J. Robert. Privacy amplification by public discussion. SIAM Journal on Computing, 17(2):210-229, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.1
Brassard, G.2
Robert, J.3
-
2
-
-
0029405656
-
Generalized privacy amplification
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer. Generalized privacy amplification. IEEE Transactions on Information Theory, 41(6):1915-1923, 1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
3
-
-
85027496257
-
Secret-key reconciliation by public discussion
-
G. Brassard and L. Salvail. Secret-key reconciliation by public discussion. In EUROCRYPT, pages 410-423, 1993.
-
(1993)
EUROCRYPT
, pp. 410-423
-
-
Brassard, G.1
Salvail, L.2
-
4
-
-
0033896024
-
Communication complexity of document exchange
-
G. Cormode, M. Paterson, S. C. Sahinalp, and U. Vishkin. Communication complexity of document exchange. In SODA, pages 197-206, 2000.
-
(2000)
SODA
, pp. 197-206
-
-
Cormode, G.1
Paterson, M.2
Sahinalp, S.C.3
Vishkin, U.4
-
8
-
-
35048840744
-
Constant-round oblivious transfer in the bounded storage model
-
Y. Z. Ding, D. Harnik, A. Rosen, and R. Shaltiel. Constant-round oblivious transfer in the bounded storage model. In TCC 2004, pages 446-472, 2004.
-
(2004)
TCC 2004
, pp. 446-472
-
-
Ding, Y.Z.1
Harnik, D.2
Rosen, A.3
Shaltiel, R.4
-
9
-
-
36348947793
-
-
Technical Report, Cryptology ePrint archive, Previous version appeared at EUROCRYPT 2004
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Technical Report 2003/235, Cryptology ePrint archive, http://eprint.iacr.org, 2006. Previous version appeared at EUROCRYPT 2004.
-
(2006)
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
10
-
-
34848837353
-
Correcting errors without leaking partial information
-
H. N. Gabow and R. Fagin, editors, ACM
-
Y. Dodis and A. Smith. Correcting errors without leaking partial information. In H. N. Gabow and R. Fagin, editors, STOC, pages 654-663. ACM, 2005.
-
(2005)
STOC
, pp. 654-663
-
-
Dodis, Y.1
Smith, A.2
-
11
-
-
0025948524
-
Error-correcting codes for list decoding
-
P. Elias. Error-correcting codes for list decoding. IEEE Transactions on Information Theory, 37(1):5-12, 1991.
-
(1991)
IEEE Transactions on Information Theory
, vol.37
, Issue.1
, pp. 5-12
-
-
Elias, P.1
-
14
-
-
0036567053
-
Combinatorial bounds for list decoding
-
V. Guruswami, J. Håstad, M. Sudan, and D. Zuckerman. Combinatorial bounds for list decoding. IEEE Transactions on Information Theory, 48(5):1021-1034, 2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.5
, pp. 1021-1034
-
-
Guruswami, V.1
Håstad, J.2
Sudan, M.3
Zuckerman, D.4
-
15
-
-
84969140089
-
Explicit capacityachieving list-decodable codes
-
V. Guruswami and A. Rudra. Explicit capacityachieving list-decodable codes. In STOC 2006, 2006.
-
(2006)
STOC 2006
-
-
Guruswami, V.1
Rudra, A.2
-
19
-
-
26944471646
-
Derandomized constructions of k-wise (almost) independent permutations
-
E. Kaplan, M. Naor, and O. Reingold. Derandomized constructions of k-wise (almost) independent permutations. In APPROX-RANDOM, pages 354-365, 2005.
-
(2005)
Approx-Random
, pp. 354-365
-
-
Kaplan, E.1
Naor, M.2
Reingold, O.3
-
21
-
-
17744399088
-
Private codes or succinct random codes that are (almost) perfect
-
Washington, DC, USA, IEEE Computer Society
-
M. Langberg. Private codes or succinct random codes that are (almost) perfect. In FOCS '04: Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science (FOCS'04), pages 325-334, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
FOCS '04: Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science (FOCS'04)
, pp. 325-334
-
-
Langberg, M.1
-
22
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
J.-P. M. G. Linnartz and P. Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In AVBPA, pages 393-402, 2003.
-
(2003)
AVBPA
, pp. 393-402
-
-
Linnartz, J.-P.M.G.1
Tuyls, P.2
-
23
-
-
85027524331
-
A new approach to information theory
-
P. Enjalbert, E. W. Mayr, and K. W. Wagner, editors, Springer, The full version of this paper is in preparation [7]
-
R. J. Lipton. A new approach to information theory. In P. Enjalbert, E. W. Mayr, and K. W. Wagner, editors, STACS, volume 775 of Lecture Notes in Computer Science, pages 699-708. Springer, 1994. The full version of this paper is in preparation [7].
-
(1994)
STACS, Volume 775 of Lecture Notes in Computer Science
, pp. 699-708
-
-
Lipton, R.J.1
-
26
-
-
0041779657
-
Set reconciliation with nearly optimal communication complexity
-
Y. Minsky, A. Trachtenberg, and R. Zippel. Set reconciliation with nearly optimal communication complexity. IEEE Transactions on Information Theory, 49(9):2213-2218, 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.9
, pp. 2213-2218
-
-
Minsky, Y.1
Trachtenberg, A.2
Zippel, R.3
-
27
-
-
0025486359
-
Worst-case interactive communication i: Two messages are almost optimal
-
A. Orlitsky. Worst-case interactive communication i: Two messages are almost optimal. IEEE Transactions on Information Theory, 36(5):1111-1126, 1990.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.5
, pp. 1111-1126
-
-
Orlitsky, A.1
-
28
-
-
0026912593
-
Average-case interactive communication
-
A. Orlitsky. Average-case interactive communication. IEEE Transactions on Information Theory, 38(5):1534-1547, 1992.
-
(1992)
IEEE Transactions on Information Theory
, vol.38
, Issue.5
, pp. 1534-1547
-
-
Orlitsky, A.1
-
29
-
-
0000293430
-
Interactive communication of balanced distributions and of correlated files
-
A. Orlitsky. Interactive communication of balanced distributions and of correlated files. SIAM J. Discrete Math., 6(4):548-564, 1993.
-
(1993)
SIAM J. Discrete Math.
, vol.6
, Issue.4
, pp. 548-564
-
-
Orlitsky, A.1
-
30
-
-
27144457211
-
The exact price for unconditionally secure asymmetric cryptography
-
C. Cachin and J. Camenisch, editors, Springer-Verlag
-
R. Renner and S. Wolf. The exact price for unconditionally secure asymmetric cryptography. In C. Cachin and J. Camenisch, editors, EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 109-125. Springer-Verlag, 2004.
-
(2004)
EUROCRYPT 2004, Volume 3027 of Lecture Notes in Computer Science
, pp. 109-125
-
-
Renner, R.1
Wolf, S.2
-
31
-
-
33646767482
-
Simple and tight bounds for information reconciliation and privacy amplification
-
B. Roy, editor, Chennai, India, 4-8 Dec. Springer-Verlag
-
R. Renner and S. Wolf. Simple and tight bounds for information reconciliation and privacy amplification. In B. Roy, editor, Advances in Cryptology-ASIACRYPT 2005, Lecture Notes in Computer Science, Chennai, India, 4-8 Dec. 2005. Springer-Verlag.
-
(2005)
Advances in Cryptology-ASIACRYPT 2005, Lecture Notes in Computer Science
-
-
Renner, R.1
Wolf, S.2
-
32
-
-
0001595705
-
Chernoff-hoeffding bounds for applications with limited independence
-
J. P. Schmidt, A. Siegel, and A. Srinivasan. Chernoff-hoeffding bounds for applications with limited independence. SIAM J. Discrete Math., 8(2):223-250, 1995.
-
(1995)
SIAM J. Discrete Math.
, vol.8
, Issue.2
, pp. 223-250
-
-
Schmidt, J.P.1
Siegel, A.2
Srinivasan, A.3
-
36
-
-
0019630777
-
List cascade decoding
-
(In Russian); pp. 236-240 (in English), 1982
-
V. V. Zyablov and M. S. Pinsker. List cascade decoding. Problems of Information Transmission, 17(4):29-34, 1981. (In Russian); pp. 236-240 (in English), 1982.
-
(1981)
Problems of Information Transmission
, vol.17
, Issue.4
, pp. 29-34
-
-
Zyablov, V.V.1
Pinsker, M.S.2
|