暂无分享,去创建一个
[1] Yvo Desmedt,et al. Identification Tokens - or: Solving the Chess Grandmaster Problem , 1990, CRYPTO.
[2] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[3] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[4] Thibault de Valroger. Perfect Secrecy under Deep Random assumption , 2015, ArXiv.
[5] Edwin T. Jaynes. Prior Probabilities , 2010, Encyclopedia of Machine Learning.
[6] R. T. Cox. Probability, frequency and reasonable expectation , 1990 .
[7] F. H. Crawford. Jacobian Methods in Thermodynamics , 1949 .
[8] Ueli Maurer,et al. Unconditional Security Against Memory-Bounded Adversaries , 1997, CRYPTO.
[9] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[10] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[11] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.