![Randomness / Information theory / Computational complexity theory / Randomness extractor / Extractor / Leftover hash lemma / Min-entropy / Entropy / Secret sharing / Cryptography / Applied mathematics / Theoretical computer science Randomness / Information theory / Computational complexity theory / Randomness extractor / Extractor / Leftover hash lemma / Min-entropy / Entropy / Secret sharing / Cryptography / Applied mathematics / Theoretical computer science](https://www.pdfsearch.io/img/cb7cd7dd519ee23fdcfef565c7678ad6.jpg)
| Document Date: 2009-04-05 17:10:39 Open Document File Size: 435,07 KBShare Result on Facebook
/ IndustryTerm authentication protocol / agreement protocols / message authentication protocols / round authentication protocol / extraction protocol / storage device / above protocol / authenticated key agreement protocol / agreement protocol / message authentication protocol / to authentication protocols / possible solution / secure message authentication protocol / / Person Eve / Let Extq / Bob / A. Notice / Extw / Alice / Daniel Wichs† April / / Position randomness extractor / extractor / non-malleable extractor / Rt / WB / Rt at the conclusion / seeded extractor / lookahead extractor / look-ahead extractor / / ProgrammingLanguage R / / ProvinceOrState Washington / / Technology message authentication protocol / authentication protocol / alternating-extraction protocol / randomized algorithm / above protocol / secure message authentication protocol / one-round protocols / message authentication protocols / private key / secret key / two-round authentication protocol / key agreement protocols / two-round protocol / alternating extraction protocol / one-round protocol / two-round key agreement protocol / two-round IT-AKA protocol / Cryptography / public key / two round authentication protocol / authentication protocols / IT-AKA protocol / one-round message authentication protocols / authenticated key agreement protocol / interactive protocol / /
SocialTag |