The following pages link to Leftover Hash Lemma, Revisited (Q5199181):
Displaying 30 items.
- Sharp lower bounds on the extractable randomness from non-uniform sources (Q719242) (← links)
- Verifiable random functions: relations to identity-based key encapsulation and new constructions (Q744351) (← links)
- Towards a ring analogue of the leftover hash lemma (Q2027271) (← links)
- Traceable ring signatures: general framework and post-quantum security (Q2034982) (← links)
- Cryptographic pseudorandom generators can make cryptosystems problematic (Q2061967) (← links)
- Security analysis of NIST CTR-DRBG (Q2096485) (← links)
- Leakage-resilient key exchange and two-seed extractors (Q2096493) (← links)
- Witness authenticating NIZKs and applications (Q2139626) (← links)
- On the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptography (Q2170105) (← links)
- Computational fuzzy extractors (Q2216116) (← links)
- Immunization against complete subversion without random oracles (Q2227487) (← links)
- Metric Pseudoentropy: Characterizations, Transformations and Applications (Q2947525) (← links)
- Selective-Opening Security in the Presence of Randomness Failures (Q2953780) (← links)
- Efficient and Provable White-Box Primitives (Q2958118) (← links)
- Bounded-Retrieval Model with Keys Derived from Private Data (Q2980861) (← links)
- Shannon Entropy Versus Renyi Entropy from a Cryptographic Viewpoint (Q3460111) (← links)
- (Q4795836) (← links)
- (Q5002623) (← links)
- Collusion Resistant Traitor Tracing from Learning with Errors (Q5130846) (← links)
- (Q5240107) (← links)
- Advances in Cryptology – CRYPTO 2004 (Q5311553) (← links)
- (Q5875519) (← links)
- (Nondeterministic) hardness vs. non-malleability (Q6097260) (← links)
- Replacing Probability Distributions in Security Games via Hellinger Distance (Q6107269) (← links)
- A forkcipher-based pseudo-random number generator (Q6535108) (← links)
- Linear hashing with \(\ell_\infty\) guarantees and two-sided Kakeya bounds (Q6566468) (← links)
- Pseudorandomness of decoding, revisited: adapting OHCP to code-based cryptography (Q6595926) (← links)
- Unified view for notions of bit security (Q6605331) (← links)
- Security analysis of the ISO standard \textsf{OFB}-\textsf{DRBG} (Q6632048) (← links)
- \(k\)-SUM in the sparse regime: complexity and applications (Q6648210) (← links)