6[1]PRENEEL B, BOSSELAERS A, RIJMEN V. Comments by the NESSIE project on the AES finalists[EB/OL]. AES Round 2 public comment, http://www.nist.gov /aes, 2000-05.
7[2]KAM J B, DAVIDA G I. Structured design of substitution-permutation encryption networks[J]. IEEE Trans on Computers, 1979,28(10):747.
8[3]FEISTEL H. Cryptography and computer privacy[J]. Scientific American, 1973, 228(5):15.
9[4]WEBSTER A F, TAVARES S E. On the design of S-boxes[A]. Dvances in Cryptology-CRYPTO'85[C].Berlin: Springer-Verlag, 1986.523-533.
10[5]NECHVATAL J, BARKER E, BASSHAM L. Report on the development of the advanced encryption standard(AES)[R]. NIST, Oct 2000:26.
2Hao Z, Zhong S, Li L. Towards wireless security without com- putational assumptions-an oblivious transfer protocol based on an unauthenticated wireless channel [ C ]//Proceedings of IEEE. Shanghai:IEEE,2011:2156-2164.
3Maurer U. Secret key agreement by public discussion from common information [ J ]. IEEE Transactions on Information Theory, 1993,39 ( 3 ) :733 -742.
4Cachin C, Maurer U. Linking information reconciliation and privacy amplification [ J ]. Journal of Cryptology, 1997,10(2) : 97-110.
5Ye C X, Mathur S, Reznik A, et al. Information- theoretically secret key generation for fading wireless channels [ J ]. IEEE Transactions on Information Forensics and Security, 2010,5 (2) :240-254.
6Brassard G,Salvail L. Secret key reconciliation by public dis- cussion[ C ]//Workshop on the theory and application of cryp- tographic techniques. [ s. 1. ] :[ s. n. ], 1994:410-423.
7Premnath S N,Jana S,Croft J,et al. Secret key extraction from wireless signal strength in real environments[ J]. IEEE Trans- actions on Mobile Computing,2013,12(5 ) :917-930.
9Martinez-Mateo J, Elkouss D, Martin V. Key reconciliation for high performance quantum key distribution [ R ]. [ s. 1. ] : [ s. n. ] ,2013.
10Zhao F, Fu M X, Wang F Q, et al. Error reconciliation for practical quantum cryptography [ J ]. Optik-International Jour- nal for Light and Electron Optics,2007,118(10) :502-506.