Min-entropy

Results: 44



#Item
11Statistical theory / Applied mathematics / Philosophy of thermal and statistical physics / Thermodynamic entropy / Randomness / Entropy / Min-entropy / Entropy in thermodynamics and information theory / Principle of maximum entropy / Information theory / Probability and statistics / Statistics

Microsoft Word - information-entropy.doc

Add to Reading List

Source URL: atsec.com

Language: English - Date: 2012-07-13 10:12:45
12Information theory / Randomness / Pseudorandom number generators / Mathematical finance / Stock market / Entropy / Cryptographically secure pseudorandom number generator / Min-entropy / Normal distribution / Statistics / Probability and statistics / Cryptography

On the Use of Financial Data as a Random Beacon Jeremy Clark University of Waterloo Urs Hengartner University of Waterloo

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2010-07-01 11:29:02
13Theoretical computer science / Information theory / Computational complexity theory / Randomness extractor / Random number generation / Entropy / Pseudorandomness / Algorithmically random sequence / Min-entropy / Randomness / Cryptography / Applied mathematics

Downloaded from http://rsta.royalsocietypublishing.org/ on May 24, 2015 Phil. Trans. R. Soc. A, 3432–3448 doi:rstaCertifiable quantum dice

Add to Reading List

Source URL: rsta.royalsocietypublishing.org

Language: English
14Randomness / Information theory / Extractor / Pseudorandomness / Randomness extractor / Entropy / Disperser / Min-entropy / Fortuna / Theoretical computer science / Applied mathematics / Mathematics

2-Source Dispersers for no(1) Entropy, and Ramsey Graphs Beating the Frankl-Wilson Construction Boaz Barak∗ Anup Rao†

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2015-01-05 21:12:10
15Theoretical computer science / Information theory / Pseudorandom number generators / Thermodynamic entropy / Fortuna / /dev/random / Randomness extractor / Entropy / Min-entropy / Randomness / Cryptography / Applied mathematics

Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust ? Yevgeniy Dodis1 , David Pointcheval2 , Sylvain Ruhault3 , Damien Vergnaud2 , and Daniel Wichs4 1 Dept. of Computer Science, Ne

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-20 15:36:16
16Randomness / Pseudorandomness / Computational complexity theory / Information theory / Randomness extractor / Extractor / Pseudorandom generator / Min-entropy / Screw extractor / Theoretical computer science / Applied mathematics / Mathematics

Computational Extractors and Pseudorandomness Dana Dachman-Soled ∗ Rosario Gennaro†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-28 18:41:58
17Randomness / Computational complexity theory / Information theory / Randomness extractor / Coding theory / Extractor / List decoding / Entropy / Min-entropy / Theoretical computer science / Applied mathematics / Cryptography

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data∗ Yevgeniy Dodis† Rafail Ostrovsky‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-04-01 12:50:42
18Randomness / Information theory / Computational complexity theory / Randomness extractor / Extractor / Leftover hash lemma / Min-entropy / Entropy / Secret sharing / Cryptography / Applied mathematics / Theoretical computer science

Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis∗ Daniel Wichs†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-04-05 17:10:39
19Probability theory / Probability and statistics / Randomness / Entropy / Statistical theory / Independence / Min-entropy / Conditioning / Mutual information / Information theory / Statistics / Mathematical analysis

An extended abstract of this paper is published in the proceedings of the 8th International Conference on Information-Theoretic Security—ICITSThis is the full version. The Chaining Lemma and its Application Ivan

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-18 05:36:30
20Theoretical computer science / Randomness / Computational complexity theory / Philosophy of thermal and statistical physics / Min-entropy / Randomness extractor / Leftover hash lemma / Entropy / Random number generation / Information theory / Applied mathematics / Cryptography

REDEFINING RANDOMNESS QUANTIS WHEN RANDOM NUMBERS CANNOT BE LEFT TO CHANCE

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
UPDATE