-
1
-
-
0027629488
-
Common randomness in information theory and cryptography-Part I: Secret sharing
-
Jul.
-
R. Ahlswede and I. Csisziàr, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csisziàr, I.2
-
2
-
-
0031701886
-
Common randomness in information theory and cryptography-Part II: CR capacity
-
Jan.
-
R. Ahlswede and I. Csisziàr, "Common randomness in information theory and cryptography-Part II: CR capacity," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 225-240, Jan. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.1
, pp. 225-240
-
-
Ahlswede, R.1
Csisziàr, I.2
-
3
-
-
0029405656
-
Generalized privacy amplification
-
Nov.
-
C. H. Bennett, G. Brassard, C. Crépeau, U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
4
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec.
-
I. Csisziàr and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csisziàr, I.1
Narayan, P.2
-
5
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
Jun.
-
I. Csisziàr and P. Narayan, "Secrecy capacities for multiterminal channel models," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csisziàr, I.1
Narayan, P.2
-
6
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM J. Comput., vol. 38, no. 1, pp. 97-139, 2008.
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
8
-
-
84976495908
-
When are fuzzy extractors possible?
-
B. Fuller, A. D. Smith, L. Reyzin, "When are fuzzy extractors possible?" IACR Cryptol. ePrint Arch., vol. 2014, p. 961, 2014.
-
(2014)
IACR Cryptol. EPrint Arch.
, vol.2014
, pp. 961
-
-
Fuller, B.1
Smith, A.D.2
Reyzin, L.3
-
9
-
-
77954600460
-
Information-theoretic key agreement of multiple terminals-Part i
-
Aug.
-
A. A. Gohari and V. Anantharam, "Information-theoretic key agreement of multiple terminals-Part I," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3973-3996, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3973-3996
-
-
Gohari, A.A.1
Anantharam, V.2
-
11
-
-
0027602480
-
Approximation theory of output statistics
-
May
-
T. S. Han and S. Verdú, "Approximation theory of output statistics," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752-772, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 752-772
-
-
Han, T.S.1
Verdú, S.2
-
13
-
-
54749144274
-
Second-order asymptotics in fixed-length source coding and intrinsic randomness
-
Oct.
-
M. Hayashi, "Second-order asymptotics in fixed-length source coding and intrinsic randomness," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4619-4637, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4619-4637
-
-
Hayashi, M.1
-
14
-
-
70350714497
-
Information spectrum approach to second-order coding rate in channel coding
-
Nov.
-
M. Hayashi, "Information spectrum approach to second-order coding rate in channel coding," IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 4947-4966, Nov. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.11
, pp. 4947-4966
-
-
Hayashi, M.1
-
15
-
-
0038444459
-
General formulas for capacity of classical-quantum channels
-
Jul.
-
M. Hayashi and H. Nagaoka, "General formulas for capacity of classical-quantum channels," IEEE Trans. Inf. Theory, vol. 49, no. 7, pp. 1753-1768, Jul. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.7
, pp. 1753-1768
-
-
Hayashi, M.1
Nagaoka, H.2
-
16
-
-
84906546031
-
Secret key agreement: General capacity and second-order asymptotics
-
Nov.
-
M. Hayashi, H. Tyagi, S. Watanabe, "Secret key agreement: General capacity and second-order asymptotics," in Proc. IEEE Int. Symp. Inf. Theory, Nov. 2014, pp. 1136-1140.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1136-1140
-
-
Hayashi, M.1
Tyagi, H.2
Watanabe, S.3
-
17
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
R. Impagliazzo, L. A. Levin, M. Luby, "Pseudo-random generation from one-way functions," in Proc. 21st Annu. ACM Symp. Theory Comput. (STOC), 1989, pp. 12-24.
-
(1989)
Proc. 21st Annu. ACM Symp. Theory Comput. (STOC)
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
18
-
-
84873562821
-
On the redundancy of variable-rate Slepian-Wolf coding
-
S. Kuzuoka, "On the redundancy of variable-rate Slepian-Wolf coding," in Proc. Int. Symp. Inf. Theory Appl. (ISITA), 2012, pp. 155-159.
-
(2012)
Proc. Int. Symp. Inf. Theory Appl. (ISITA)
, pp. 155-159
-
-
Kuzuoka, S.1
-
19
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
20
-
-
0029369320
-
Coding theorems on correlated general sources
-
S. Miyake and F. Kanaya, "Coding theorems on correlated general sources," IEICE Trans. Fundam., vols. E78-A, no. 9, pp. 1063-1070, 1995.
-
(1995)
IEICE Trans. Fundam., Vols. E78-A
, Issue.9
, pp. 1063-1070
-
-
Miyake, S.1
Kanaya, F.2
-
21
-
-
0041450642
-
Strong converse theorems in the quantum information theory
-
Sep.
-
H. Nagaoka, "Strong converse theorems in the quantum information theory," in Proc. ERATO Workshop Quantum Inf. Sci., Tokyo, Japan, Sep. 2001, p. 33.
-
(2001)
Proc. ERATO Workshop Quantum Inf. Sci., Tokyo, Japan
, pp. 33
-
-
Nagaoka, H.1
-
22
-
-
79952391323
-
-
Ph.D. dissertation Dept. Electr. Eng., Princeton Univ., Princeton, NJ, USA
-
Y. Polyanskiy, "Channel coding: Non-asymptotic fundamental limits," Ph.D. dissertation, Dept. Electr. Eng., Princeton Univ., Princeton, NJ, USA, 2010.
-
(2010)
Channel Coding: Non-asymptotic Fundamental Limits
-
-
Polyanskiy, Y.1
-
23
-
-
77951624674
-
Channel coding rate in the finite blocklength regime
-
May
-
Y. Polyanskiy, H. V. Poor, S. Verdú, "Channel coding rate in the finite blocklength regime," IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307-2359, May 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.5
, pp. 2307-2359
-
-
Polyanskiy, Y.1
Poor, H.V.2
Verdú, S.3
-
24
-
-
33846181385
-
-
Ph.D. dissertation Dept. Phys., ETH Zurich Univ., Zürich, Switzerland
-
R. Renner, "Security of quantum key distribution," Ph.D. dissertation, Dept. Phys., ETH Zurich Univ., Zürich, Switzerland, 2005.
-
(2005)
Security of Quantum Key Distribution
-
-
Renner, R.1
-
25
-
-
33646767482
-
Simple and tight bounds for information reconciliation and privacy amplification
-
R. Renner and S. Wolf, "Simple and tight bounds for information reconciliation and privacy amplification," in Proc. ASIACRYPT, 2005, pp. 199-216.
-
(2005)
Proc. ASIACRYPT
, pp. 199-216
-
-
Renner, R.1
Wolf, S.2
-
26
-
-
84976485950
-
On the absolute constants in the Berry-Esseen type inequalities for identically distributed summands
-
I. Shevtsova, "On the absolute constants in the Berry-Esseen type inequalities for identically distributed summands," CoRR, 2011.
-
(2011)
CoRR
-
-
Shevtsova, I.1
-
27
-
-
0015648934
-
Noiseless coding of correlated information sources
-
Jul.
-
D. Slepian and J. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inf. Theory, vol. 19, no. 4, pp. 471-480, Jul. 1973.
-
(1973)
IEEE Trans. Inf. Theory
, vol.19
, Issue.4
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.2
-
28
-
-
52349101372
-
Asymptotische abschätzungen in Shannon's informationstheorie
-
V. Strassen, "Asymptotische abschätzungen in Shannon's informationstheorie," in Proc. Third Prague Conf. Inf. Theory, 1962, pp. 689-723. [Online]. Available: http://www.math.cornell.edu/?pmlut/strassen.pdf
-
(1962)
Proc. Third Prague Conf. Inf. Theory
, pp. 689-723
-
-
Strassen, V.1
-
29
-
-
0000649228
-
The existence of probability measures with given marginals
-
V. Strassen, "The existence of probability measures with given marginals," Ann. Math. Statist., vol. 36, no. 2, pp. 423-439, 1965.
-
(1965)
Ann. Math. Statist.
, vol.36
, Issue.2
, pp. 423-439
-
-
Strassen, V.1
-
30
-
-
84901667878
-
-
Ph.D. dissertation Dept. Electr. Comput. Eng., Univ. Maryland, College Park MD, USA
-
H. Tyagi, "Common randomness principles of secrecy," Ph.D. dissertation, Dept. Electr. Comput. Eng., Univ. Maryland, College Park, MD, USA, 2013.
-
(2013)
Common Randomness Principles of Secrecy
-
-
Tyagi, H.1
-
31
-
-
84882971734
-
How many queries will resolve common randomness?
-
Sep.
-
H. Tyagi and P. Narayan, "How many queries will resolve common randomness?" IEEE Trans. Inf. Theory, vol. 59, no. 9, pp. 5363-5378, Sep. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.9
, pp. 5363-5378
-
-
Tyagi, H.1
Narayan, P.2
-
32
-
-
84939864518
-
Converses for secret key agreement and secure computing
-
Sep.
-
H. Tyagi and S. Watanabe, "Converses for secret key agreement and secure computing," IEEE Trans. Inf. Theory, vol. 61, no. 9, pp. 4809-4827, Sep. 2015.
-
(2015)
IEEE Trans. Inf. Theory
, vol.61
, Issue.9
, pp. 4809-4827
-
-
Tyagi, H.1
Watanabe, S.2
-
33
-
-
84901684455
-
A bound for multiparty secret key agreement and implications for a problem of secure computing
-
H. Tyagi and S. Watanabe, "A bound for multiparty secret key agreement and implications for a problem of secure computing," in Proc. EUROCRYPT, 2014, pp. 369-386.
-
(2014)
Proc. EUROCRYPT
, pp. 369-386
-
-
Tyagi, H.1
Watanabe, S.2
-
34
-
-
84861651671
-
One-shot classical-quantum capacity and hypothesis testing
-
May
-
L. Wang and R. Renner, "One-shot classical-quantum capacity and hypothesis testing," Phys. Rev. Lett., vol. 108, no. 20, p. 200501, May 2012.
-
(2012)
Phys. Rev. Lett.
, vol.108
, Issue.20
, pp. 200501
-
-
Wang, L.1
Renner, R.2
-
35
-
-
34548771769
-
Key rate of quantum key distribution with hashed two-way classical communication
-
Sep.
-
S. Watanabe, R. Matsumoto, T. Uyematsu, Y. Kawano, "Key rate of quantum key distribution with hashed two-way classical communication," Phys. Rev. A, vol. 76, no. 3, p. 032312, Sep. 2007.
-
(2007)
Phys. Rev. A
, vol.76
, Issue.3
, pp. 032312
-
-
Watanabe, S.1
Matsumoto, R.2
Uyematsu, T.3
Kawano, Y.4
|