Leftover hash lemma

Results: 30



#Item
21Applied mathematics / Quantum cryptography / Information theory / Statistical theory / BB84 / Quantum key distribution / Qubit / Rényi entropy / Leftover hash lemma / Cryptography / Quantum information science / Theoretical computer science

Has Quantum cryptography been proven secure? Tassos Nakassis*, J.C. Bienfang, P. Johnson, A. Mink, D. Rogers, X. Tang, C.J. Williams National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, MD 2089

Add to Reading List

Source URL: w3.antd.nist.gov

Language: English - Date: 2009-02-03 16:25:33
22Randomness / Information theory / Computational complexity theory / Randomness extractor / Extractor / Min-entropy / Leftover hash lemma / Entropy / Screw extractor / Theoretical computer science / Cryptography / Applied mathematics

Short seed quantum-proof extractors with large output Avraham Ben-Aroya Amnon Ta-Shma Tel-Aviv U.

Add to Reading List

Source URL: www.lu.lv

Language: English - Date: 2011-06-10 03:41:38
23FEAL / Silvio Micali / Leftover hash lemma / Cryptanalysis / Differential cryptanalysis / Post-quantum cryptography / Small subgroup confinement attack / Group-based cryptography / Cryptography / Cryptographic protocols / Oblivious transfer

References 1. ABA Bank Card Standard, "Management and Use of Personal Information Numbers, " Aids from ABA, Catalog no[removed], American Bankers Association, [removed]ABA Document 4.3, "Key Management Standard," American

Add to Reading List

Source URL: www.ssl.stu.neva.ru

Language: English - Date: 2001-07-17 16:00:00
24Randomness / Computational complexity theory / Information theory / Pseudorandomness / Hashing / Randomness extractor / Leftover hash lemma / Entropy / Pseudorandom generator / Cryptography / Theoretical computer science / Applied mathematics

Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes⋆ Yevgeniy Dodis1 , Rosario Gennaro2 , Johan H˚

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2010-10-20 22:30:55
25Quantum cryptography / Computational complexity theory / Quantum information science / Quantum key distribution / XTR / Leftover hash lemma / Quantum computer / Expected value / Entanglement distillation / Cryptography / Theoretical computer science / Applied mathematics

Unconditional Security in Quantum Cryptography DOMINIC MAYERS NEC Research Institute, Princeton, New Jersey

Add to Reading List

Source URL: xxx.tau.ac.il

Language: English - Date: 2004-09-28 21:44:14
26Randomness / Computational complexity theory / Information theory / Randomness extractor / Coding theory / Extractor / List decoding / Entropy / Leftover hash lemma / Theoretical computer science / Applied mathematics / Cryptography

PDF Document

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2008-09-23 03:25:42
27Cryptography / Randomness / Computational complexity theory / Statistical theory / Randomness extractor / Leftover hash lemma / Min-entropy / Entropy / Universal hashing / Theoretical computer science / Information theory / Applied mathematics

PDF Document

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2011-07-16 03:04:49
28Statistical theory / Security / Statistics / Biometrics / Identification / Leftover hash lemma / Randomness extractor / Mutual information / Entropy / Cryptography / Randomness / Information theory

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
29Randomness / Hashing / Information theory / Computational complexity theory / Cryptographic hash functions / Randomness extractor / Leftover hash lemma / Random oracle / Random number generation / Cryptography / Applied mathematics / Theoretical computer science

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-19 16:27:05
30Cryptographic hash functions / Artificial intelligence / Information retrieval / Computational complexity theory / Universal hashing / Hash function / Leftover hash lemma / Cramer–Shoup cryptosystem / Tabulation hashing / Hashing / Cryptography / Search algorithms

PDF Document

Add to Reading List

Source URL: www.shoup.net

Language: English - Date: 2001-12-12 07:00:25
UPDATE