1. [1] M. Alimomeni and R. Safavi-Naini, “Guessing secrecy,” ICITS2012, LNCS 7412, pp.1-13, Springer, 2012.
2. [2] S. Arimoto, “Information measures and capacity of order α for discrete memoryless channels,” Colloquia Mathematica Societatis János Bolyai, 16. Topics in Information Theory, pp.41-52, 1975.
3. [3] M. Backes, B. Pfitzmann, and M. Waindner, “A universally composable cryptographic library,” IACR Cryptology ePrint Archive, 2003. http://eprint.iacr.org/2003/015
4. [4] C.H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” IEEE International Conference on Computers Systems and Signal Processing, pp.175-179, 1984.
5. [5] C.H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, “Generalized privacy amplification,” IEEE Trans. Inf. Theory, vol.41, no.6, pp.1915-1923, Nov. 1995.