Leftover hash lemma

Results: 30



#Item
11  Stronger Attacks on Causality-Based Key Agreement Benno Salwey and Stefan Wolf Faculty of Informatics, Universit`a della Svizzera Italiana, Via G. Buffi 13, 6900 Lugano, Switzerland

1 Stronger Attacks on Causality-Based Key Agreement Benno Salwey and Stefan Wolf Faculty of Informatics, Universit`a della Svizzera Italiana, Via G. Buffi 13, 6900 Lugano, Switzerland

Add to Reading List

Source URL: cqi.inf.usi.ch

Language: English - Date: 2016-01-25 05:30:01
2CS369N: Beyond Worst-Case Analysis Lecture #6: Pseudorandom Data and Universal Hashing∗ Tim Roughgarden† April 14,

CS369N: Beyond Worst-Case Analysis Lecture #6: Pseudorandom Data and Universal Hashing∗ Tim Roughgarden† April 14,

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2014-11-14 21:12:34
3Leftover Hash Lemma, Revisited Boaz Barak ∗  Yevgeniy Dodis†

Leftover Hash Lemma, Revisited Boaz Barak ∗ Yevgeniy Dodis†

Add to Reading List

Source URL: ftp.cs.nyu.edu

Language: English - Date: 2011-09-03 15:47:31
    4Leftover Hash Lemma, Revisited Boaz Barak ∗  Yevgeniy Dodis†

    Leftover Hash Lemma, Revisited Boaz Barak ∗ Yevgeniy Dodis†

    Add to Reading List

    Source URL: www.uclouvain.be

    Language: English - Date: 2011-12-14 05:30:42
      5Efficiency Improvements in Constructing Pseudorandom Generators from One-way Functions∗ Iftach Haitner† and Omer Reingold‡ and Salil Vadhan§ May 24, 2012  Abstract

      Efficiency Improvements in Constructing Pseudorandom Generators from One-way Functions∗ Iftach Haitner† and Omer Reingold‡ and Salil Vadhan§ May 24, 2012 Abstract

      Add to Reading List

      Source URL: www.wisdom.weizmann.ac.il

      Language: English - Date: 2013-11-27 11:40:21
      6Diss. ETH NoEntropy Measures and Unconditional Security in Cryptography A dissertation submitted to the

      Diss. ETH NoEntropy Measures and Unconditional Security in Cryptography A dissertation submitted to the

      Add to Reading List

      Source URL: www.zurich.ibm.com

      Language: English - Date: 2011-05-30 05:09:17
      7Discrete Gaussian Leftover Hash Lemma over Infinite Domains Shweta Agrawal ? , Craig Gentry ?? , Shai Halevi ? ? ? , and Amit Sahai† Abstract. The classic Leftover Hash Lemma (LHL) is one of the most useful tools in cr

      Discrete Gaussian Leftover Hash Lemma over Infinite Domains Shweta Agrawal ? , Craig Gentry ?? , Shai Halevi ? ? ? , and Amit Sahai† Abstract. The classic Leftover Hash Lemma (LHL) is one of the most useful tools in cr

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2013-03-22 00:09:18
      8Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis∗ Daniel Wichs†

      Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis∗ Daniel Wichs†

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2009-04-05 17:10:39
      9An extended abstract of this paper appears in the proceedings of the 11th ACM Conference on Computer and Communications Security—CCS 2004, Washington, DC, OctoberThis expanded version is available from the IACR

      An extended abstract of this paper appears in the proceedings of the 11th ACM Conference on Computer and Communications Security—CCS 2004, Washington, DC, OctoberThis expanded version is available from the IACR

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2004-12-15 15:22:16
      10REDEFINING RANDOMNESS  QUANTIS WHEN RANDOM NUMBERS CANNOT BE LEFT TO CHANCE

      REDEFINING RANDOMNESS QUANTIS WHEN RANDOM NUMBERS CANNOT BE LEFT TO CHANCE

      Add to Reading List

      Source URL: www.idquantique.com

      Language: English - Date: 2015-03-23 10:17:13