Optimal Randomizer Efficiency in the Bounded-Storage Model
暂无分享,去创建一个
[1] Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher , 2004, Journal of Cryptology.
[2] Ueli Maurer,et al. Tight security proofs for the bounded-storage model , 2002, STOC '02.
[3] Ueli Maurer,et al. Unconditional Security Against Memory-Bounded Adversaries , 1997, CRYPTO.
[4] Russ Bubley,et al. Randomized algorithms , 1995, CSUR.
[5] Claude Crépeau,et al. Oblivious transfer with a memory-bounded receiver , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[6] Thomas M. Cover,et al. Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing) , 2006 .
[7] Chi-Jen Lu. Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors , 2003, Journal of Cryptology.
[8] Ueli Maurer,et al. On the power of quantum memory , 2005, IEEE Transactions on Information Theory.
[9] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[10] Ueli Maurer,et al. Secret key agreement by public discussion , 1993 .
[11] Noam Nisan,et al. Randomness is Linear in Space , 1996, J. Comput. Syst. Sci..
[12] Oded Goldreich,et al. Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..
[13] Yonatan Aumann,et al. Everlasting security in the bounded storage model , 2002, IEEE Trans. Inf. Theory.
[14] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[15] Michael O. Rabin,et al. Hyper-Encryption and Everlasting Security , 2002, STACS.
[16] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[17] Yan Zong Ding,et al. Oblivious Transfer in the Bounded Storage Model , 2001, CRYPTO.
[18] Michael O. Rabin,et al. Provable everlasting security in the bounded storage model , 2001 .
[19] Salil P. Vadhan,et al. Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model , 2003, Journal of Cryptology.
[20] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[21] Yonatan Aumann,et al. Information Theoretically Secure Communication in the Limited Storage Space Model , 1999, CRYPTO.
[22] Kazuoki Azuma. WEIGHTED SUMS OF CERTAIN DEPENDENT RANDOM VARIABLES , 1967 .