Back to Results
First PageMeta Content
Randomness / Hashing / Information theory / Computational complexity theory / Cryptographic hash functions / Randomness extractor / Leftover hash lemma / Random oracle / Random number generation / Cryptography / Applied mathematics / Theoretical computer science


Document Date: 2005-03-19 16:27:05


Open Document

File Size: 423,37 KB

Share Result on Facebook

City

Palaiseau / Paris / /

Company

Let us / /

Country

France / United States / /

/

IndustryTerm

network security protocols / cryptographic protocols / crucial tool / e -uniform / Internet Key Exchange / /

Organization

CNRS-Ecole / Ecole polytechnique / Lawrence Berkeley National Lab. / /

Person

Renyi Entropy / Min Entropy / /

/

Position

randomness extractor / extractor / good randomness extractor / deterministic extractor / specific extractor / player / probabilistic randomness extractor / /

Technology

encryption / cryptography / DH-based key exchange protocol / key exchange protocol / actual IKE protocol / SSL protocol / key exchange protocols / network security protocols / IKEv1 protocol / above Σ0 protocol / Key Derivation Phase The protocol / basic SIGMA protocol / SSL / cryptographic protocols / ElGamal encryption / JFK protocol / IKE protocols / /

SocialTag