First Page | Document Content | |
---|---|---|
Date: 2010-10-20 22:30:55Randomness Computational complexity theory Information theory Pseudorandomness Hashing Randomness extractor Leftover hash lemma Entropy Pseudorandom generator Cryptography Theoretical computer science Applied mathematics | Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes⋆ Yevgeniy Dodis1 , Rosario Gennaro2 , Johan H˚Add to Reading ListSource URL: cs.nyu.eduDownload Document from Source WebsiteFile Size: 243,21 KBShare Document on Facebook |
1 Stronger Attacks on Causality-Based Key Agreement Benno Salwey and Stefan Wolf Faculty of Informatics, Universit`a della Svizzera Italiana, Via G. Buffi 13, 6900 Lugano, SwitzerlandDocID: 1qLT7 - View Document | |
CS369N: Beyond Worst-Case Analysis Lecture #6: Pseudorandom Data and Universal Hashing∗ Tim Roughgarden† April 14,DocID: 1pP4w - View Document | |
Leftover Hash Lemma, Revisited Boaz Barak ∗ Yevgeniy Dodis†DocID: 1lPJY - View Document | |
Leftover Hash Lemma, Revisited Boaz Barak ∗ Yevgeniy Dodis†DocID: 1lbQW - View Document | |
Efficiency Improvements in Constructing Pseudorandom Generators from One-way Functions∗ Iftach Haitner† and Omer Reingold‡ and Salil Vadhan§ May 24, 2012 AbstractDocID: 13VLr - View Document |