Conditional Rényi Entropy
暂无分享,去创建一个
[1] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[2] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[3] Ivan Damgård,et al. Secure identification and QKD in the bounded-quantum-storage model , 2007, Theor. Comput. Sci..
[4] I. Chuang,et al. Quantum Computation and Quantum Information: Bibliography , 2010 .
[5] Christian Cachin,et al. Entropy measures and unconditional security in cryptography , 1997 .
[6] Michael R. Lyu,et al. Direct Zero-Norm Optimization for Feature Selection , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[7] Luis Filipe Coelho Antunes,et al. Conditional Rényi Entropies , 2012, IEEE Transactions on Information Theory.
[8] J. Jensen. Sur les fonctions convexes et les inégalités entre les valeurs moyennes , 1906 .
[9] Robert König,et al. Universally Composable Privacy Amplification Against Quantum Adversaries , 2004, TCC.
[10] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.