Back to Results
First PageMeta Content
Cryptography / Randomness / Extractor / Pseudorandomness / Min-entropy / Leftover hash lemma / Entropy / Randomness extractor / Information theory / Applied mathematics / Theoretical computer science


April 25, 2013 Randomness in Cryptography Lecture 15: Privacy Amplification against Active Attackers Lecturer: Yevgeniy Dodis
Add to Reading List

Document Date: 2013-12-19 22:46:31


Open Document

File Size: 729,03 KB

Share Result on Facebook

Currency

USD / /

IndustryTerm

liveness test protocol / round solution / challenge-response protocol / privacy amplification protocol / /

Person

Alice(X) Eve Bob / Eve Y Bob / Wendy(X) Quentin / Daniel Wichs / Yael Tauman Kalai / Xin Li / Mark Braverman / Eve Bob / /

Position

extractor / non-malleable extractor / Rt / good extractor / head / look-ahead extractor / /

Technology

Cryptography / interactive protocols / liveness test protocol / two-round challenge-response protocol / privacy amplification protocol / one-round protocol / /

SocialTag