{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T04:10:17Z","timestamp":1777608617423,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540576006","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48285-7_35","type":"book-chapter","created":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T02:16:46Z","timestamp":1185934606000},"page":"410-423","source":"Crossref","is-referenced-by-count":411,"title":["Secret-Key Reconciliation by Public Discussion"],"prefix":"10.1007","author":[{"given":"Gilles","family":"Brassard","sequence":"first","affiliation":[]},{"given":"Louis","family":"Salvail","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"C.H. Bennett","year":"1992","unstructured":"C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smolin, Experimental Quantum Cryptography, Journal of Cryptology, Vol. 5, No. 1, 1992, pp. 3\u201328.","journal-title":"Journal of Cryptology"},{"issue":"2","key":"35_CR2","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"C.H. Bennett","year":"1988","unstructured":"C.H. Bennett, G. Brassard, J.-M. Robert, Privacy Amplification by Public Discussion, SIAM Journal on Computing, Vol. 17, No. 2, 1988, pp. 210\u2013229.","journal-title":"SIAM Journal on Computing"},{"key":"35_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/3-540-46766-1_29","volume-title":"proceedings of Crypto\u2019 91","author":"C.H. Bennett","year":"1992","unstructured":"C.H. Bennett, G. Brassard, C. Cr\u00e9peau, M.-H. Skubiszewska, Practical Quantum Oblivious Transfer, In proceedings of Crypto\u2019 91, Lecture Notes in Computer Science, vol 576, Springer Verlag, Berlin, 1992, pp. 351\u2013366."},{"issue":"3","key":"35_CR4","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TIT.1978.1055873","volume":"IT-24","author":"E.R. Berlekamp","year":"1978","unstructured":"E.R. Berlekamp, R. J. McEliece, H.C.A. van Tilborg, On the Inherent Intractability of Certain Coding Problems, IEEE Transaction on Information Theory, Vol. IT-24, No. 3, 1978, pp. 384\u2013386.","journal-title":"IEEE Transaction on Information Theory"},{"key":"35_CR5","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J. L. Carter","year":"1979","unstructured":"J. L. Carter, M. N. Wegman, Universal Classes of Hash Functions, Journal of Computer and System Sciences, Vol. 18, 1979, pp. 143\u2013154.","journal-title":"Journal of Computer and System Sciences"},{"key":"35_CR6","unstructured":"P. Elias, Coding for Noisy Channels, IRE Convention Record, 1957, pp. 46\u201347."},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"U.M. Maurer, Perfect Cryptographic Security from Partially Independent Channels, In proceedings of 23rd Symposium on Theory of Computing, 1991, pp. 561\u2013571.","DOI":"10.1145\/103418.103476"},{"key":"35_CR8","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C. E. Shannon","year":"1948","unstructured":"C. E. Shannon, A Mathematical Theory of Communication (Part I), Bell System Technical Journal, Vol. 27, 1948, pp. 379\u2013423.","journal-title":"Bell System Technical Journal"},{"key":"35_CR9","unstructured":"L. Salvail, Le Probl\u00e8me. de R\u00e9conciliation en Cryptographie, Master thesis, D\u00e9partement d\u2019informatique et de recherche op\u00e9rationnelle, Universit\u00e9 de Montreal, 1991."},{"key":"35_CR10","unstructured":"J.-M. Robert, Detection et Correction d\u2019Erreurs en Cryptographie, Master thesis, D\u00e9partement d\u2019informatique et de recherche op\u00e9rationnelle, Universit\u00e9 de Montr\u00e9al, 1985."},{"key":"35_CR11","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. N. Wegman","year":"1981","unstructured":"M. N. Wegman, J.L. Carter, New Hash Functions and Their Use in Authentication and Set Equality, Journal of Computer and System Sciences, Vol. 22, 1981, pp. 265\u2013279.","journal-title":"Journal of Computer and System Sciences"},{"key":"35_CR12","unstructured":"D. Welsh, Codes and Cryptography, Oxford Science Publications, 1989."},{"key":"35_CR13","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/0022-0000(88)90037-2","volume":"36","author":"S. Zachos","year":"1988","unstructured":"S. Zachos, Probabilistic Quantifiers Games, Journal of Computer and System Sciences, Vol. 36, 1988, pp. 433\u2013451.","journal-title":"Journal of Computer and System Sciences"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201993"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48285-7_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:50:32Z","timestamp":1619571032000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48285-7_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540576006"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-48285-7_35","relation":{},"subject":[]}}