Computational Extractors and Pseudorandomness
From MaRDI portal
Publication:2891496
DOI10.1007/978-3-642-28914-9_22zbMath1304.68136OpenAlexW1956699040MaRDI QIDQ2891496
Tal Malkin, Dana Dachman-Soled, Hugo Krawczyk, Rosario Gennaro
Publication date: 15 June 2012
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28914-9_22
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Information theory (general) (94A15) Probability in computer science (algorithm analysis, random structures, phase transitions, etc.) (68Q87)
Related Items (7)
Toward RSA-OAEP Without Random Oracles ⋮ Witness authenticating NIZKs and applications ⋮ Computational fuzzy extractors ⋮ Immunization against complete subversion without random oracles ⋮ Strongly secure authenticated key exchange from factoring, codes, and lattices ⋮ Additive Combinatorics: With a View Towards Computer Science and Cryptography—An Exposition ⋮ Revocable hierarchical identity-based authenticated key exchange
This page was built for publication: Computational Extractors and Pseudorandomness