共 13 条
[1]
[Anonymous], 1961, CONTRIBUTIONS THEORY
[2]
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[3]
Generalized privacy amplification
[J].
IEEE TRANSACTIONS ON INFORMATION THEORY,
1995, 41 (06)
:1915-1923
[5]
Blahut R.E., 1987, Principles and Practice of Information Theory
[6]
Brassard G, 1995, LECT NOTES COMPUT SC, V1000, P1
[7]
Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [DOI 10.1007/3-540-48285-7_35, 10.1007/3-540-48285-7_35]
[8]
CARTER L, 1979, J CSS, V18, P143, DOI DOI 10.1016/0022-0000(79)90044-8
[9]
Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
[10]
NEW DIRECTIONS IN CRYPTOGRAPHY
[J].
IEEE TRANSACTIONS ON INFORMATION THEORY,
1976, 22 (06)
:644-654