Principles and practice of information theory
Principles and practice of information theory
Experimental quantum cryptography
Journal of Cryptology - Eurocrypt '90
Conditionally-perfect secrecy and a provably-secure randomized cipher
Journal of Cryptology - Eurocrypt '90
A universal statistical test for random bit generators
Journal of Cryptology
Some new statistics for testing hypotheses in parametric models
Journal of Multivariate Analysis
Rényi Extrapolation of Shannon Entropy
Open Systems & Information Dynamics
Smooth entropy and Rényi entropy
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Information-theoretically secure secret-key agreement by NOT authenticated public discussion
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Generalized privacy amplification
IEEE Transactions on Information Theory - Part 2
Secret-key agreement over unauthenticated public channels .I. Definitions and a completeness result
IEEE Transactions on Information Theory
Hi-index | 0.00 |
A new method of estimating the most important cryptographic measures of the key generators and of the unconditionally secure key agreement protocols is presented. The aim of this article is to give a Bayesian estimation of a general class of entropies that includes Shannon entropy and Rényi entropy of order 2, which are cryptographic measures for the key generator module and for the key agreement protocol, respectively. It is also given a numerical simulation where the Bayesian estimate is computed using binary codification of the source.