-
1
-
-
0027629488
-
Common randomness in information theory and cryptography-part i: Secret sharing
-
July
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-part i: Secret sharing, " IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
2
-
-
84906542523
-
Feedback can improve the second-order coding performance in discrete memoryless channels
-
Y. Altug and A. B. Wagner, "Feedback can improve the second-order coding performance in discrete memoryless channels, " ISIT, 2014.
-
(2014)
ISIT
-
-
Altug, Y.1
Wagner, A.B.2
-
3
-
-
0029405656
-
Generalized privacy amplification
-
November
-
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, "Generalized privacy amplification, " IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, November 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
4
-
-
84863322607
-
Information equals amortized communication
-
M. Braverman and A. Rao, "Information equals amortized communication, " in FOCS, 2011, pp. 748-757.
-
(2011)
FOCS
, pp. 748-757
-
-
Braverman, M.1
Rao, A.2
-
6
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
December
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals, " IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, December 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
7
-
-
84939202757
-
Source broadcasting with unknown amount of receiver side information
-
Oct
-
M. Feder and N. Shulman, "Source broadcasting with unknown amount of receiver side information, " in ITW, Oct 2002, pp. 127-130.
-
(2002)
ITW
, pp. 127-130
-
-
Feder, M.1
Shulman, N.2
-
9
-
-
0027602480
-
Approximation theory of output statistics
-
May
-
T. S. Han and S. Verdú, "Approximation theory of output statistics, " IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752-772, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 752-772
-
-
Han, T.S.1
Verdú, S.2
-
10
-
-
54749144274
-
Second-order asymptotics in fixed-length source coding and intrinsic randomness
-
Oct
-
M. Hayashi, "Second-order asymptotics in fixed-length source coding and intrinsic randomness, " IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4619-4637, Oct 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4619-4637
-
-
Hayashi, M.1
-
12
-
-
84906546031
-
Secret key agreement: General capacity and second-order asymptotics
-
-, "Secret key agreement: General capacity and second-order asymptotics, " ISIT, 2014.
-
(2014)
ISIT
-
-
Hayashi, M.1
Tyagi, H.2
Watanabe, S.3
-
13
-
-
70350714497
-
Information spectrum approach to second-order coding rate in channel coding
-
Novemeber
-
M. Hayashi, "Information spectrum approach to second-order coding rate in channel coding, " IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 4947-4966, Novemeber 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.11
, pp. 4947-4966
-
-
Hayashi, M.1
-
14
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
R. Impagliazzo, L. A. Levin, and M. Luby, "Pseudo-random generation from one-way functions, " Proc. Annual Symposium on Theory of Computing, pp. 12-24, 1989.
-
(1989)
Proc. Annual Symposium on Theory of Computing
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
15
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information, " IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
16
-
-
0029369320
-
Coding theorems on correlated general sources
-
September
-
S. Miyake and F. Kanaya, "Coding theorems on correlated general sources, " IIEICE Trans. Fundamental, vol. E78-A, no. 9, pp. 1063-1070, September 1995.
-
(1995)
IIEICE Trans. Fundamental
, vol.E78-A
, Issue.9
, pp. 1063-1070
-
-
Miyake, S.1
Kanaya, F.2
-
17
-
-
0013317517
-
Communication with secrecy constraints
-
A. Orlitsky and A. El Gamal, "Communication with secrecy constraints, " STOC, pp. 217-224, 1984.
-
(1984)
STOC
, pp. 217-224
-
-
Orlitsky, A.1
El Gamal, A.2
-
18
-
-
0025486359
-
Worst-case interactive communication i: Two messages are almost optimal
-
A. Orlitsky, "Worst-case interactive communication i: Two messages are almost optimal, " IEEE Trans. Inf. Theory, vol. 36, no. 5, pp. 1111-1126, 1990.
-
(1990)
IEEE Trans. Inf. Theory
, vol.36
, Issue.5
, pp. 1111-1126
-
-
Orlitsky, A.1
-
19
-
-
77951624674
-
Channel coding rate in the finite blocklength regime
-
May
-
Y. Polyanskiy, H. V. Poor, and S. Verdú, "Channel coding rate in the finite blocklength regime, " IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307-2359, May 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.5
, pp. 2307-2359
-
-
Polyanskiy, Y.1
Poor, H.V.2
Verdú, S.3
-
21
-
-
33646767482
-
Simple and tight bounds for information reconciliation and privacy amplification
-
R. Renner and S. Wolf, "Simple and tight bounds for information reconciliation and privacy amplification, " in ASIACRYPT, 2005, pp. 199-216.
-
(2005)
ASIACRYPT
, pp. 199-216
-
-
Renner, R.1
Wolf, S.2
-
22
-
-
0015648934
-
Noiseless coding of correlated information source
-
July
-
D. Slepian and J. Wolf, "Noiseless coding of correlated information source, " IEEE Trans. Inf. Theory, vol. 19, no. 4, pp. 471-480, July 1973.
-
(1973)
IEEE Trans. Inf. Theory
, vol.19
, Issue.4
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.2
-
23
-
-
52349101372
-
Asymptotische abschätzungen in Shannon's informationstheorie
-
English translation
-
V. Strassen, "Asymptotische abschätzungen in Shannon's informationstheorie, " Third Prague Conf. Inf. Theory, pp. 689-723, 1962, English translation: http: //www. math. cornell. edu/ pmlut/strassen. pdf.
-
(1962)
Third Prague Conf. Inf. Theory
, pp. 689-723
-
-
Strassen, V.1
-
24
-
-
84901684455
-
A bound for multiparty secret key agreement and implications for a problem of secure computing
-
H. Tyagi and S. Watanabe, "A bound for multiparty secret key agreement and implications for a problem of secure computing, " in EUROCRYPT, 2014, pp. 369-386.
-
(2014)
EUROCRYPT
, pp. 369-386
-
-
Tyagi, H.1
Watanabe, S.2
-
26
-
-
77950213383
-
Interactive encoding and decoding for one way learning: Near lossless recovery with side information at the decoder
-
April
-
E.-H. Yang and D.-K. He, "Interactive encoding and decoding for one way learning: Near lossless recovery with side information at the decoder, " Information Theory, IEEE Transactions on, vol. 56, no. 4, pp. 1808-1824, April 2010.
-
(2010)
Information Theory, IEEE Transactions on
, vol.56
, Issue.4
, pp. 1808-1824
-
-
Yang, E.-H.1
He, D.-K.2
|