IEEE Home Search IEEE Shop Web Account Contact IEEE IEEE logo

IEEE Information Theory Society

Student Resources

 

Getting Started on a Research Problem

 
     

Home

Student Resources

Info. Theory Society

Media Services

 

Committee Events

Future Events

Past Events

 

Volunteering

 

Getting Started

Info. Theory Textbook
Info. Theory Tutorials

Interference Channel
Comm. Networks
Cooperative Comm.
Cryptography
Multiuser Info. Theory
Network Coding

Biology & Info. Theory
Quantum Info. Theory
 

Doctoral Dissertations

 

Finding Your Career

Job Resources

Job Opportunities

Pool of Candidates

 

Useful Links

Writing Papers

Journals

Conferences

Resources

 

Committee Members

 

If you would like to help us identify a good collection of papers on a specific topic that would be a good starting point for someone wanting to do research in a given area, we would very much welcome your input. Please send us an email.

 

Cryptography

 

International Association for Cryptologic Research
Journal of Cryptology
Eprint

  • S. Wolf
    Information-Theoretically and Computationally Secure Key Agreement in Cryptography
    PhD thesis, ETH Zurich, 1999.
    [Link]

  • U. Maurer and S. Wolf
    Secret Key Agreement Over a Non-authenticated Channel - Part I-III
    IEEE Transactions on Information Theory, vol. 49, no. 4, pp. 822-851, Apr 2003.
    [Part I] [Part II] [Part III]

  • T Holenstein
    Strengthening Key Agreement using Hard-Core Sets
    PhD thesis, ETH Zurich, 2006.
    [Link]

  • A. D. Wyner
    The Wiretap Channel
    Bell Syst. Tech. J. vol. 54, no. 8, pp. 1355-1387, 1975.

  • I. Csiszar and J. Korner
    Broadcast channels with confidential messages,
    IEEE Trans. Inform. Theory, vol. IT-24, pp. 339-348, May 1978.

  • U.M. Maurer
    Secret Key Agreement by Public Discussion from Common Information
    IEEE Trans. Inform. Theory, 39(3):733-742, 1993.
    [Link] [IEEE]

  • R. Ahlswede, I. Csiszar
    Common Randomness in Information Theory and Cryptography I: Secret Sharing
    IEEE Trans. Inform. Theory, 39(4):1121-1132, 1993.
    [Link] [IEEE]

  • U. M. Maurer, S. Wolf
    Information-theoretic key agreement: from weak to strong secrecy for free Advances in Cryptology
    EUROCRYPT 2000
    [Link]

  • C. H. Bennett, G. Brassard, J.-M. Robert
    Privacy amplification by public discussion
    SIAM Journal on Computing, 17(2):210-229, 1988

  • R. Impagliazzo, L. A. Levin, M. Luby
    Pseudo-random generation from one-way functions
    In 21st Annual ACM Symposium on Theory of Computing (STOC), 1989.

Contributor: Juerg Wullschleger