Back to Results
First PageMeta Content
Randomness / Information theory / Computational complexity theory / Randomness extractor / Extractor / Leftover hash lemma / Min-entropy / Entropy / Secret sharing / Cryptography / Applied mathematics / Theoretical computer science


Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis∗ Daniel Wichs†
Add to Reading List

Document Date: 2009-04-05 17:10:39


Open Document

File Size: 435,07 KB

Share Result on Facebook

/

IndustryTerm

authentication protocol / agreement protocols / message authentication protocols / round authentication protocol / extraction protocol / storage device / above protocol / authenticated key agreement protocol / agreement protocol / message authentication protocol / to authentication protocols / possible solution / secure message authentication protocol / /

Person

Eve / Let Extq / Bob / A. Notice / Extw / Alice / Daniel Wichs† April / /

Position

randomness extractor / extractor / non-malleable extractor / Rt / WB / Rt at the conclusion / seeded extractor / lookahead extractor / look-ahead extractor / /

ProgrammingLanguage

R / /

ProvinceOrState

Washington / /

Technology

message authentication protocol / authentication protocol / alternating-extraction protocol / randomized algorithm / above protocol / secure message authentication protocol / one-round protocols / message authentication protocols / private key / secret key / two-round authentication protocol / key agreement protocols / two-round protocol / alternating extraction protocol / one-round protocol / two-round key agreement protocol / two-round IT-AKA protocol / Cryptography / public key / two round authentication protocol / authentication protocols / IT-AKA protocol / one-round message authentication protocols / authenticated key agreement protocol / interactive protocol / /

SocialTag