Stefan Wolf Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1998, pp:405-419 [Conf]
Ueli M. Maurer, Stefan Wolf The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1999, v:28, n:5, pp:1689-1721 [Journal]
Ueli M. Maurer, Stefan Wolf Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2003, v:49, n:4, pp:822-831 [Journal]
Ueli M. Maurer, Stefan Wolf Secret-key agreement over unauthenticated public channels II: the simulatability condition. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2003, v:49, n:4, pp:832-838 [Journal]
Ueli M. Maurer, Stefan Wolf Secret-key agreement over unauthenticated public channels III: Privacy amplification. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2003, v:49, n:4, pp:839-851 [Journal]
Ueli M. Maurer, Stefan Wolf Unconditionally Secure Key Agreement and the Intrinsic Conditional Information. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:2, pp:499-514 [Journal]