First Page | Document Content | |
---|---|---|
![]() Date: 2005-03-19 16:27:05Randomness Hashing Information theory Computational complexity theory Cryptographic hash functions Randomness extractor Leftover hash lemma Random oracle Random number generation Cryptography Applied mathematics Theoretical computer science | Source URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 423,37 KBShare Document on Facebook |
![]() | Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream∗ Michael Mitzenmacher† Salil Vadhan‡ School of Engineering & Applied Sciences Harvard UniversityDocID: 1r5sy - View Document |
![]() | Why Simple Hash Functions Work: Exploiting the Entropy in a Data StreamDocID: 1qUBE - View Document |
![]() | Lossless Condensers, Unbalanced Expanders, and Extractors Amnon Ta-Shma∗ Christopher Umans† David Zuckerman‡DocID: 1qPOU - View Document |
![]() | Simple Extractors for All Min-Entropies and a New Pseudorandom Generator∗ Ronen Shaltiel † Christopher Umans ‡DocID: 1qB1P - View Document |
![]() | LNCSOur Data, Ourselves: Privacy Via Distributed Noise GenerationDocID: 1pOcL - View Document |