Min-entropy

Results: 44



#Item
11Microsoft Word - information-entropy.doc

Microsoft Word - information-entropy.doc

Add to Reading List

Source URL: atsec.com

Language: English - Date: 2012-07-13 10:12:45
12On the Use of Financial Data as a Random Beacon Jeremy Clark University of Waterloo Urs Hengartner University of Waterloo

On the Use of Financial Data as a Random Beacon Jeremy Clark University of Waterloo Urs Hengartner University of Waterloo

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2010-07-01 11:29:02
13Downloaded from http://rsta.royalsocietypublishing.org/ on May 24, 2015  Phil. Trans. R. Soc. A, 3432–3448 doi:rstaCertifiable quantum dice

Downloaded from http://rsta.royalsocietypublishing.org/ on May 24, 2015 Phil. Trans. R. Soc. A, 3432–3448 doi:rstaCertifiable quantum dice

Add to Reading List

Source URL: rsta.royalsocietypublishing.org

Language: English
142-Source Dispersers for no(1) Entropy, and Ramsey Graphs Beating the Frankl-Wilson Construction Boaz Barak∗ Anup Rao†

2-Source Dispersers for no(1) Entropy, and Ramsey Graphs Beating the Frankl-Wilson Construction Boaz Barak∗ Anup Rao†

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2015-01-05 21:12:10
15Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust ? Yevgeniy Dodis1 , David Pointcheval2 , Sylvain Ruhault3 , Damien Vergnaud2 , and Daniel Wichs4 1  Dept. of Computer Science, Ne

Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust ? Yevgeniy Dodis1 , David Pointcheval2 , Sylvain Ruhault3 , Damien Vergnaud2 , and Daniel Wichs4 1 Dept. of Computer Science, Ne

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-20 15:36:16
16Computational Extractors and Pseudorandomness Dana Dachman-Soled ∗  Rosario Gennaro†

Computational Extractors and Pseudorandomness Dana Dachman-Soled ∗ Rosario Gennaro†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-28 18:41:58
17Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data∗ Yevgeniy Dodis† Rafail Ostrovsky‡

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data∗ Yevgeniy Dodis† Rafail Ostrovsky‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-04-01 12:50:42
18Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis∗ Daniel Wichs†

Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis∗ Daniel Wichs†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-04-05 17:10:39
19An extended abstract of this paper is published in the proceedings of the 8th International Conference on Information-Theoretic Security—ICITSThis is the full version. The Chaining Lemma and its Application Ivan

An extended abstract of this paper is published in the proceedings of the 8th International Conference on Information-Theoretic Security—ICITSThis is the full version. The Chaining Lemma and its Application Ivan

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-18 05:36:30
20REDEFINING RANDOMNESS  QUANTIS WHEN RANDOM NUMBERS CANNOT BE LEFT TO CHANCE

REDEFINING RANDOMNESS QUANTIS WHEN RANDOM NUMBERS CANNOT BE LEFT TO CHANCE

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13