Privacy Amplification by Public Discussion
- 1 April 1988
- journal article
- Published by Society for Industrial & Applied Mathematics (SIAM) in SIAM Journal on Computing
- Vol. 17 (2), 210-229
- https://doi.org/10.1137/0217014
Abstract
No abstract availableThis publication has 10 references indexed in Scilit:
- An Update on Quantum CryptographyPublished by Springer Nature ,2000
- On Computationally Secure Authentication Tags Requiring Short Secret Shared KeysPublished by Springer Nature ,1983
- Introduction to Coding TheoryPublished by Springer Nature ,1982
- New hash functions and their use in authentication and set equalityJournal of Computer and System Sciences, 1981
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- The Wire-Tap ChannelBell System Technical Journal, 1975
- Minimum-distance bounds for binary linear codesIEEE Transactions on Information Theory, 1973
- A Mathematical Theory of CommunicationBell System Technical Journal, 1948