Author:
Otsuka Seiya,Iimori Hiroki,Ando Kengo,de Abreu Giuseppe Thadeu Freitas,Ishibashi Koji,Ishikawa Naoki
Publisher
Springer Nature Switzerland
Reference10 articles.
1. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
2. Shor, P.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, pp. 124–134, November 1994
3. Mucchi, L., et al.: Physical-layer security in 6G networks. IEEE Open J. Commun. Soc. 2, 1901–1914 (2021)
4. Khisti, A., Wornell, G., Wiesel, A., Eldar, Y.: On the gaussian MIMO wiretap channel. In: IEEE International Symposium on Information Theory, pp. 2471–2475, June 2007
5. Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 39(3), 733–742 (1993)