Randomness extractor

Results: 67



#Item
41Randomness / Computational complexity theory / Information theory / Pseudorandomness / Randomness extractor / Extractor / Leftover hash lemma / Random number generation / Entropy / Applied mathematics / Theoretical computer science / Cryptography

Microsoft PowerPoint - extractor-survey-teaching [Compatibility Mode]

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:27
42Theoretical computer science / Information theory / Pseudorandom number generators / Extractor / Pseudorandomness / Entropy / Leftover hash lemma / Random number generation / Salil Vadhan / Randomness / Cryptography / Applied mathematics

Microsoft PowerPoint - condenser

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:27
43Pseudorandomness / Randomness / Algorithmic information theory / Pseudorandom generator / Complexity classes / Bounded-error probabilistic polynomial / Randomized algorithm / Randomness extractor / PP / Theoretical computer science / Applied mathematics / Computational complexity theory

Pseudorandom Generators, Typically-Correct Derandomization, and Circuit Lower Bounds∗ Jeff Kinne †

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2009-07-13 09:37:01
44Computational complexity theory / Lemmas / Applied mathematics / Measure theory / Randomness extractor / Szemerédi regularity lemma / Mathematics / General topology / Open set

Randomness in Cryptography February 14, 2013 Lecture 6: Encryption/Extraction Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:31
45Information theory / Min-entropy / Extractor / Lemmas / Computational complexity theory / Randomness extractor / Theoretical computer science / Mathematics / Applied mathematics

Randomness in Cryptography January 21, 2013 Lecture 7: Privacy ⇒ Extraction Continued Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2014-04-02 21:07:51
46Randomness / Computational complexity theory / Information theory / Randomness extractor / Pseudorandomness / Extractor / Min-entropy / Leftover hash lemma / Entropy / Theoretical computer science / Applied mathematics / Cryptography

Randomness in Cryptography May 2, 2013 Lecture 16: Special Purpose Extractors Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:31
47Randomness / Key management / Pseudorandomness / Randomness extractor / Key derivation function / Extractor / Random number generation / Cryptographic hash function / Key / Cryptography / Applied mathematics / Theoretical computer science

Cryptographic Extraction and Key Derivation: The HKDF Scheme Hugo Krawczyk∗ Abstract In spite of the central role of key derivation functions (KDF) in applied cryptography, there

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-10 19:09:23
48Statistical theory / Theoretical computer science / Randomness / Biometrics / Identification / Surveillance / Entropy / Extractor / Min-entropy / Information theory / Information / Applied mathematics

Fuzzy extractors for continuous distributions Ileana Buhan, Jeroen Doumen, Pieter Hartel, Raymond Veldhuis, EEMCS Faculty, University of Twente, {Ileana.Buhan, Jeroen.Doumen, Pieter.Hartel, Raymond.Veldhuis}@utwente.nl A

Add to Reading List

Source URL: doc.utwente.nl

Language: English - Date: 2011-08-28 11:31:58
49Cryptography / Entropy / Min-entropy / Leftover hash lemma / Communication complexity / Extractor / Commitment scheme / Randomness extractor / Theoretical computer science / Information theory / Applied mathematics

Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification Xin Li∗ Department of Computer Science Johns Hopkins University Baltimore, MD 21218, U.S.A.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-11 17:35:40
50Differential privacy / Human rights / Information theory / Applied mathematics / Privacy / Internet privacy / Entropy / Information privacy / Randomness extractor / Ethics / Randomness / Data privacy

LNCS[removed]Differential Privacy

Add to Reading List

Source URL: www.dbis.informatik.hu-berlin.de

Language: English - Date: 2011-06-22 08:09:17
UPDATE