Secret key agreement using a virtual wiretap channel
暂无分享,去创建一个
Reihaneh Safavi-Naini | Setareh Sharifian | Fuchun Lin | R. Safavi-Naini | Fuchun Lin | Setareh Sharifian
[1] Joseph M. Renes,et al. Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization , 2013, ASIACRYPT.
[2] Dina Katabi,et al. Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.
[3] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[4] Zhu Han,et al. Cooperative jamming for wireless physical layer security , 2009, 2009 IEEE/SP 15th Workshop on Statistical Signal Processing.
[5] Zhu Han,et al. Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..
[6] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[7] H. Vincent Poor,et al. Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.
[8] Kyung Sup Kwak,et al. On PHY and MAC Performance in Body Sensor Networks , 2009, EURASIP J. Wirel. Commun. Netw..
[9] S. K. Leung-Yan-Cheong. On a special class of wiretap channels , 1976 .
[10] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[11] H. Vincent Poor,et al. The Gaussian wiretap channel with a helping interferer , 2008, 2008 IEEE International Symposium on Information Theory.
[12] Sik K. Leung-Yan-Cheong. On a special class of wiretap channels (Corresp.) , 1977, IEEE Trans. Inf. Theory.
[13] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[14] Alexander Vardy,et al. Semantic Security for the Wiretap Channel , 2012, CRYPTO.
[15] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[16] Reihaneh Safavi-Naini,et al. A Virtual Wiretap Channel for Secure Message Transmission , 2016, Mycrypt.
[17] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[18] Renato Renner,et al. Smooth Renyi entropy and applications , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[19] Yevgeniy Dodis,et al. Entropic Security and the Encryption of High Entropy Messages , 2005, TCC.
[20] Alexander Vardy,et al. Achieving the secrecy capacity of wiretap channels using Polar codes , 2010, ISIT.
[21] Renato Renner,et al. Simple and Tight Bounds for Information Reconciliation and Privacy Amplification , 2005, ASIACRYPT.
[22] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .