1![1 Stronger Attacks on Causality-Based Key Agreement Benno Salwey and Stefan Wolf Faculty of Informatics, Universit`a della Svizzera Italiana, Via G. Buffi 13, 6900 Lugano, Switzerland 1 Stronger Attacks on Causality-Based Key Agreement Benno Salwey and Stefan Wolf Faculty of Informatics, Universit`a della Svizzera Italiana, Via G. Buffi 13, 6900 Lugano, Switzerland](https://www.pdfsearch.io/img/210084fa6f38287a7cd76f14e14242f7.jpg) | Add to Reading ListSource URL: cqi.inf.usi.chLanguage: English - Date: 2016-01-25 05:30:01
|
---|
2![CS369N: Beyond Worst-Case Analysis Lecture #6: Pseudorandom Data and Universal Hashing∗ Tim Roughgarden† April 14, CS369N: Beyond Worst-Case Analysis Lecture #6: Pseudorandom Data and Universal Hashing∗ Tim Roughgarden† April 14,](https://www.pdfsearch.io/img/2670724f7e7f5285ab941331ae2a953a.jpg) | Add to Reading ListSource URL: theory.stanford.eduLanguage: English - Date: 2014-11-14 21:12:34
|
---|
3![Leftover Hash Lemma, Revisited Boaz Barak ∗ Yevgeniy Dodis† Leftover Hash Lemma, Revisited Boaz Barak ∗ Yevgeniy Dodis†](https://www.pdfsearch.io/img/783b848edbc43e67d8fa30541ad262c9.jpg) | Add to Reading ListSource URL: ftp.cs.nyu.eduLanguage: English - Date: 2011-09-03 15:47:31
|
---|
4![Leftover Hash Lemma, Revisited Boaz Barak ∗ Yevgeniy Dodis† Leftover Hash Lemma, Revisited Boaz Barak ∗ Yevgeniy Dodis†](https://www.pdfsearch.io/img/bcab4fe2662e7c4931f846b42d7bcbbb.jpg) | Add to Reading ListSource URL: www.uclouvain.beLanguage: English - Date: 2011-12-14 05:30:42
|
---|
5![Efficiency Improvements in Constructing Pseudorandom Generators from One-way Functions∗ Iftach Haitner† and Omer Reingold‡ and Salil Vadhan§ May 24, 2012 Abstract Efficiency Improvements in Constructing Pseudorandom Generators from One-way Functions∗ Iftach Haitner† and Omer Reingold‡ and Salil Vadhan§ May 24, 2012 Abstract](https://www.pdfsearch.io/img/73239494fd1e67ca4647956c67e993f8.jpg) | Add to Reading ListSource URL: www.wisdom.weizmann.ac.ilLanguage: English - Date: 2013-11-27 11:40:21
|
---|
6![Diss. ETH NoEntropy Measures and Unconditional Security in Cryptography A dissertation submitted to the Diss. ETH NoEntropy Measures and Unconditional Security in Cryptography A dissertation submitted to the](https://www.pdfsearch.io/img/252da088958f12fcd2e5467b17b61c16.jpg) | Add to Reading ListSource URL: www.zurich.ibm.comLanguage: English - Date: 2011-05-30 05:09:17
|
---|
7![Discrete Gaussian Leftover Hash Lemma over Infinite Domains Shweta Agrawal ? , Craig Gentry ?? , Shai Halevi ? ? ? , and Amit Sahai† Abstract. The classic Leftover Hash Lemma (LHL) is one of the most useful tools in cr Discrete Gaussian Leftover Hash Lemma over Infinite Domains Shweta Agrawal ? , Craig Gentry ?? , Shai Halevi ? ? ? , and Amit Sahai† Abstract. The classic Leftover Hash Lemma (LHL) is one of the most useful tools in cr](https://www.pdfsearch.io/img/69d59059efaefdd0f5765c571ae5bcaa.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2013-03-22 00:09:18
|
---|
8![Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis∗ Daniel Wichs† Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis∗ Daniel Wichs†](https://www.pdfsearch.io/img/cb7cd7dd519ee23fdcfef565c7678ad6.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2009-04-05 17:10:39
|
---|
9![An extended abstract of this paper appears in the proceedings of the 11th ACM Conference on Computer and Communications Security—CCS 2004, Washington, DC, OctoberThis expanded version is available from the IACR An extended abstract of this paper appears in the proceedings of the 11th ACM Conference on Computer and Communications Security—CCS 2004, Washington, DC, OctoberThis expanded version is available from the IACR](https://www.pdfsearch.io/img/39e04cb7af3b8687ac0ec4fa6a28b068.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2004-12-15 15:22:16
|
---|
10![REDEFINING RANDOMNESS QUANTIS WHEN RANDOM NUMBERS CANNOT BE LEFT TO CHANCE REDEFINING RANDOMNESS QUANTIS WHEN RANDOM NUMBERS CANNOT BE LEFT TO CHANCE](https://www.pdfsearch.io/img/3bbd14275da669e61324a3f04dc73cbb.jpg) | Add to Reading ListSource URL: www.idquantique.comLanguage: English - Date: 2015-03-23 10:17:13
|
---|