참고문헌
- M. Tope and J. McEachen, "Unconditionally secure communications over fading channels," in Proc. IEEE MILCOM, Oct. 2001, pp. 54-58. DOI: https://doi.org/10.1109/milcom.2001.985763
- C. H. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proc. IEEE Int. Conf. Comput. Syst. Signal Process., Bangalore, India, Dec. 1984, pp. 175-179. DOI: https://doi.org/10.1016/j.tcs.2011.08.039
- C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915- 1923, Nov. 1995. DOI: https://doi.org/10.1109/18.476316
- G. Brassard and L. Salvail, T. Helleseth, Ed., "Secret-key reconciliation by public discussion," in Proc. Adv. Cryptol.-Eurocrypt, 1994, vol. 765, LNCS, pp. 410-423. DOI: https://doi.org/10.1007/3-540-48285-7_35
- J. L. Carter and M. N.Wegman, "Universal classes of hash functions,"J. Comput. Syst. Sci., vol. 18, pp. 143-154, 1979. DOI: https://doi.org/10.1007/springerreference_550
- I. Csiszar, "Almost independence and secrecy capacity," Probl. Inf. Transmiss., vol. 32, no. 1, pp. 40-47, 1996.
- C. Chen and M. A. Jensen, "Improved channel quantization for secret key establishment in wireless systems," in Proc. IEEE ICWITS, Aug. 2010, pp. 1-4. DOI: https://doi.org/10.1109/icwits.2010.5611930
- Y. Dodis and A. Smith, "Correcting errors without leaking partial information,"in Proc. 37th Annu. ACM Symp. Theory Comput., 2005, pp. 654-663. DOI: https://doi.org/10.1145/1060590.1060688
- S. Fehr and C. Schaffner, "Randomness extraction via delta-biased masking in the presence of a quantum attacker," in Proc. Theory Cryptogr. Conf., 2008, pp. 465-481. DOI: https://doi.org/10.1007/978-3-540-78524-8_26
- D. Gottesman, H.-K. Lo, N. Lutkenhaus, and J. Preskill, "Security of quantum key distribution with imperfect devices," J. Quant. Inf. Comput., vol. 5, pp. 325-360, 2004. DOI: https://doi.org/10.1109/isit.2004.1365172
- H. D. Kim, "A study on the secure double pipe hash function," The Journal of The Institute of Internet, Broadcasting and Communication (JIIBC), vol. 10, no. 6, pp. 201-208, Dec. 2010.
- J. S. Choi, S. S. Shin and G. H. Han, "Three-party key exchange protocol providing user anonymity based on smartcards," Journal of the Korea Academia-Industrial cooperation Society (JKAIS), vol. 10, no. 2, pp. 388-395, Feb. 2009. DOI: https://doi.org/10.5762/KAIS.2009.10.2.388