Leftover hash lemma

Results: 30



#Item
1Quantum information science / Quantum cryptography / Mathematical analysis / Cryptography / Quantum key distribution / Leftover hash lemma / Expected value / Mathematics / Applied mathematics / Quantum mechanics / Orthogonal polynomials

1 Stronger Attacks on Causality-Based Key Agreement Benno Salwey and Stefan Wolf Faculty of Informatics, Universit`a della Svizzera Italiana, Via G. Buffi 13, 6900 Lugano, Switzerland

Add to Reading List

Source URL: cqi.inf.usi.ch

Language: English - Date: 2016-01-25 05:30:01
2Information retrieval / Information science / Hashing / Search algorithms / Universal hashing / Hash table / Linear probing / Hash function / Leftover hash lemma / Bloom filter / Cryptographic hash function / Probability distribution

CS369N: Beyond Worst-Case Analysis Lecture #6: Pseudorandom Data and Universal Hashing∗ Tim Roughgarden† April 14,

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2014-11-14 21:12:34
3

Leftover Hash Lemma, Revisited Boaz Barak ∗ Yevgeniy Dodis†

Add to Reading List

Source URL: ftp.cs.nyu.edu

Language: English - Date: 2011-09-03 15:47:31
    4

    Leftover Hash Lemma, Revisited Boaz Barak ∗ Yevgeniy Dodis†

    Add to Reading List

    Source URL: www.uclouvain.be

    Language: English - Date: 2011-12-14 05:30:42
      5Randomness / Pseudorandomness / Information theory / Computational complexity theory / Pseudorandom number generators / Pseudorandom generator / Leftover hash lemma / Entropy / Fortuna / Theoretical computer science / Applied mathematics / Cryptography

      Efficiency Improvements in Constructing Pseudorandom Generators from One-way Functions∗ Iftach Haitner† and Omer Reingold‡ and Salil Vadhan§ May 24, 2012 Abstract

      Add to Reading List

      Source URL: www.wisdom.weizmann.ac.il

      Language: English - Date: 2013-11-27 11:40:21
      6Philosophy of thermal and statistical physics / Entropy / Randomness / Leftover hash lemma / Applied mathematics / Science / Probability and statistics / Information theory / Statistical theory / Pseudorandom number generators

      Diss. ETH NoEntropy Measures and Unconditional Security in Cryptography A dissertation submitted to the

      Add to Reading List

      Source URL: www.zurich.ibm.com

      Language: English - Date: 2011-05-30 05:09:17
      7Exponentials / Gaussian function / Normal distribution / Lattice / Multivariate normal distribution / Random matrix / Vector space / Algebra / Mathematics / Abstract algebra

      Discrete Gaussian Leftover Hash Lemma over Infinite Domains Shweta Agrawal ? , Craig Gentry ?? , Shai Halevi ? ? ? , and Amit Sahai† Abstract. The classic Leftover Hash Lemma (LHL) is one of the most useful tools in cr

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2013-03-22 00:09:18
      8Randomness / Information theory / Computational complexity theory / Randomness extractor / Extractor / Leftover hash lemma / Min-entropy / Entropy / Secret sharing / Cryptography / Applied mathematics / Theoretical computer science

      Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis∗ Daniel Wichs†

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2009-04-05 17:10:39
      9Computational complexity theory / Coding theory / Randomness / Randomness extractor / Extractor / Advantage / Ciphertext indistinguishability / Leftover hash lemma / Adversary model / Cryptography / Theoretical computer science / Applied mathematics

      An extended abstract of this paper appears in the proceedings of the 11th ACM Conference on Computer and Communications Security—CCS 2004, Washington, DC, OctoberThis expanded version is available from the IACR

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2004-12-15 15:22:16
      10Theoretical computer science / Randomness / Computational complexity theory / Philosophy of thermal and statistical physics / Min-entropy / Randomness extractor / Leftover hash lemma / Entropy / Random number generation / Information theory / Applied mathematics / Cryptography

      REDEFINING RANDOMNESS QUANTIS WHEN RANDOM NUMBERS CANNOT BE LEFT TO CHANCE

      Add to Reading List

      Source URL: www.idquantique.com

      Language: English - Date: 2015-03-23 10:17:13
      UPDATE