-
1
-
-
0026626314
-
Experimental Quantum Cryptography
-
C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smolin, Experimental Quantum Cryptography, Journal of Cryptology, Vol. 5, No. 1, 1992, pp. 3–28.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
2
-
-
0023985539
-
Privacy Amplification by Public Discussion
-
[BBR] C.H. Bennett, G. Brassard, J.-M. Robert, Privacy Amplification by Public Discussion, SIAM Journal on Computing, Vol. 17, No. 2, 1988, pp. 210–229.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
3
-
-
84969361843
-
Practical Quantum Oblivious Transfer
-
Springer Verlag, Berlin
-
C.H. Bennett, G. Brassard, C. Crépeau, M.-H. Skubiszewska, Practical Quantum Oblivious Transfer, In proceedings of Crypto’ 91, Lecture Notes in Computer Science, vol 576, Springer Verlag, Berlin, 1992, pp. 351–366.
-
(1992)
Proceedings of Crypto’ 91, Lecture Notes in Computer Science
, vol.576
, pp. 351-366
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Skubiszewska, M.-H.4
-
4
-
-
0017973512
-
On the Inherent Intractability of Certain Coding Problems
-
E.R. Berlekamp, R. J. McEliece, H.C.A. van Tilborg, On the Inherent Intractability of Certain Coding Problems, IEEE Transaction on Information Theory, Vol. IT-24, No. 3, 1978, pp. 384–386.
-
(1978)
IEEE Transaction on Information Theory
, vol.IT-24
, Issue.3
, pp. 384-386
-
-
Berlekamp, E.R.1
McEliece, R.J.2
van Tilborg, H.C.A.3
-
5
-
-
0018456171
-
Universal Classes of Hash Functions
-
J. L. Carter, M. N. Wegman, Universal Classes of Hash Functions, Journal of Computer and System Sciences, Vol. 18, 1979, pp. 143–154.
-
(1979)
Journal of Computer and System Sciences
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
7
-
-
77952402063
-
Perfect Cryptographic Security from Partially Independent Channels
-
[M] U.M. Maurer, Perfect Cryptographic Security from Partially Independent Channels, In proceedings of 23rd Symposium on Theory of Computing, 1991, pp. 561–571.
-
(1991)
Proceedings of 23Rd Symposium on Theory of Computing
, pp. 561-571
-
-
Maurer, U.M.1
-
8
-
-
84940644968
-
A Mathematical Theory of Communication (Part I)
-
[Sh] C. E. Shannon, A Mathematical Theory of Communication (Part I), Bell System Technical Journal, Vol. 27, 1948, pp. 379–423.
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
9
-
-
85028742133
-
Le Problème
-
Master thesis, Département d’informatique et de recherche opérationnelle, Université de Montreal
-
L. Salvail, Le Problème. de Réconciliation en Cryptographie, Master thesis, Département d’informatique et de recherche opérationnelle, Université de Montreal, 1991.
-
(1991)
De Réconciliation En Cryptographie
-
-
Salvail, L.1
-
10
-
-
84934371820
-
-
Master thesis, Département d’informatique et de recherche opérationnelle, Université de Montréal
-
[R] J.-M. Robert, Detection et Correction d’Erreurs en Cryptographie, Master thesis, Département d’informatique et de recherche opérationnelle, Université de Montréal, 1985.
-
(1985)
Detection Et Correction d’Erreurs En Cryptographie
-
-
Robert, J.-M.1
-
11
-
-
0019572642
-
New Hash Functions and Their Use in Authentication and Set Equality
-
M. N. Wegman, J.L. Carter, New Hash Functions and Their Use in Authentication and Set Equality, Journal of Computer and System Sciences, Vol. 22, 1981, pp. 265–279.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|