Extracting randomness from extractor-dependent sources
From MaRDI portal
Publication:2055613
DOI10.1007/978-3-030-45721-1_12zbMath1479.94160OpenAlexW3003736005MaRDI QIDQ2055613
Yevgeniy Dodis, Daniel Wichs, Vinod Vaikuntanathan
Publication date: 1 December 2021
Full work available at URL: https://hdl.handle.net/1721.1/137257
Related Items (5)
Improved computational extractors and their applications ⋮ Targeted lossy functions and applications ⋮ Cumulatively all-lossy-but-one trapdoor functions from standard assumptions ⋮ Extracting randomness from extractor-dependent sources ⋮ Impossibility on tamper-resilient cryptography with uniqueness properties
Cites Work
- Unnamed Item
- Some extremal problems arising from discrete control processes
- A robust and sponge-like PRNG with improved efficiency
- Privately constraining and programming PRFs, the LWE way
- Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups
- Independent unbiased coin flips from a correlated biased source - a finite state Markov chain
- Randomness is linear in space
- Extracting randomness from extractor-dependent sources
- Seedless fruit is the sweetest: random number generation, revisited
- Provably Robust Sponge-Based PRNGs and KDFs
- Instantiating Random Oracles via UCEs
- Constrained Pseudorandom Functions and Their Applications
- How to Eat Your Entropy and Have It Too – Optimal Recovery Strategies for Compromised RNGs
- Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources
- Barriers in cryptography with weak, correlated and leaky sources
- Lossy trapdoor functions and their applications
- Extractors with weak random seeds
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
- True Random Number Generators Secure in a Changing Environment
- More deterministic simulation in logspace
- Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions
- Explicit two-source extractors and resilient functions
- Functional Signatures and Pseudorandom Functions
- Public-Seed Pseudorandom Permutations
- Extracting Randomness Using Few Independent Sources
- Deterministic extractors for small-space sources
This page was built for publication: Extracting randomness from extractor-dependent sources