Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307249
DOI10.1007/B97182zbMath1122.94398OpenAlexW2477185671WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307249
Publication date: 25 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b97182
authenticationquantum key agreementprivacy amplificationinformation reconciliationInformation-theoretic securityreductions of information-theoretic primitives
Quantum computation (81P68) Cryptography (94A60) Information theory (general) (94A15) Channel models (including quantum) in information and communication theory (94A40)
Related Items (5)
When Are Fuzzy Extractors Possible? ⋮ Long term confidentiality: a survey ⋮ An Improved Robust Fuzzy Extractor ⋮ Privacy amplification with asymptotically optimal entropy loss ⋮ Key Agreement from Close Secrets over Unsecured Channels
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004