IEEE Home Search IEEE Shop Web Account Contact IEEE IEEE logo

IEEE Information Theory Society

Student Resources


Getting Started on a Research Problem



Student Resources

Info. Theory Society

Media Services


Committee Events

Future Events

Past Events




Getting Started

Info. Theory Textbook
Info. Theory Tutorials

Interference Channel
Comm. Networks
Cooperative Comm.
Multiuser Info. Theory
Network Coding

Biology & Info. Theory
Quantum Info. Theory

Doctoral Dissertations


Finding Your Career

Job Resources

Job Opportunities

Pool of Candidates


Useful Links

Writing Papers





Committee Members


If you would like to help us identify a good collection of papers on a specific topic that would be a good starting point for someone wanting to do research in a given area, we would very much welcome your input. Please send us an email.




International Association for Cryptologic Research
Journal of Cryptology

  • S. Wolf
    Information-Theoretically and Computationally Secure Key Agreement in Cryptography
    PhD thesis, ETH Zurich, 1999.

  • U. Maurer and S. Wolf
    Secret Key Agreement Over a Non-authenticated Channel - Part I-III
    IEEE Transactions on Information Theory, vol. 49, no. 4, pp. 822-851, Apr 2003.
    [Part I] [Part II] [Part III]

  • T Holenstein
    Strengthening Key Agreement using Hard-Core Sets
    PhD thesis, ETH Zurich, 2006.

  • A. D. Wyner
    The Wiretap Channel
    Bell Syst. Tech. J. vol. 54, no. 8, pp. 1355-1387, 1975.

  • I. Csiszar and J. Korner
    Broadcast channels with confidential messages,
    IEEE Trans. Inform. Theory, vol. IT-24, pp. 339-348, May 1978.

  • U.M. Maurer
    Secret Key Agreement by Public Discussion from Common Information
    IEEE Trans. Inform. Theory, 39(3):733-742, 1993.
    [Link] [IEEE]

  • R. Ahlswede, I. Csiszar
    Common Randomness in Information Theory and Cryptography I: Secret Sharing
    IEEE Trans. Inform. Theory, 39(4):1121-1132, 1993.
    [Link] [IEEE]

  • U. M. Maurer, S. Wolf
    Information-theoretic key agreement: from weak to strong secrecy for free Advances in Cryptology
    EUROCRYPT 2000

  • C. H. Bennett, G. Brassard, J.-M. Robert
    Privacy amplification by public discussion
    SIAM Journal on Computing, 17(2):210-229, 1988

  • R. Impagliazzo, L. A. Levin, M. Luby
    Pseudo-random generation from one-way functions
    In 21st Annual ACM Symposium on Theory of Computing (STOC), 1989.

Contributor: Juerg Wullschleger