One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
暂无分享,去创建一个
[1] Amit Sahai,et al. Manipulating statistical difference , 1997, Randomization Methods in Algorithm Design.
[2] Russell Impagliazzo,et al. Hard-core distributions for somewhat hard problems , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[3] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[4] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[5] Renato Renner,et al. Smooth Renyi entropy and applications , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[6] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[7] Renato Renner,et al. Simple and Tight Bounds for Information Reconciliation and Privacy Amplification , 2005, ASIACRYPT.
[8] Moni Naor,et al. Immunizing Encryption Schemes from Decryption Errors , 2004, EUROCRYPT.
[9] Ueli Maurer,et al. Secret key agreement by public discussion , 1993 .
[10] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[11] Ueli Maurer,et al. Unconditionally Secure Key Agreement and the Intrinsic Conditional Information , 1999, IEEE Trans. Inf. Theory.
[12] Thomas Holenstein,et al. Key agreement from weak bit agreement , 2005, STOC '05.
[13] Ueli Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[14] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[15] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[16] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[17] Renato Renner,et al. New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction , 2003, EUROCRYPT.
[18] Leonid A. Levin,et al. Pseudo-random Generation from one-way functions (Extended Abstracts) , 1989, STOC 1989.
[19] Amit Sahai,et al. A complete promise problem for statistical zero-knowledge , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[20] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[21] Stefan Wolf,et al. Information-theoretically and computationally secure key agreement in cryptography , 1999 .