Some Notions of Entropy for Cryptography
From MaRDI portal
Publication:3002109
DOI10.1007/978-3-642-20728-0_13zbMath1295.94136OpenAlexW68795965MaRDI QIDQ3002109
Publication date: 19 May 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-20728-0_13
Related Items (8)
Pseudoentropy: Lower-Bounds for Chain Rules and Transformations ⋮ A counterexample to the chain rule for conditional HILL entropy ⋮ The Chain Rule for HILL Pseudoentropy, Revisited ⋮ Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy ⋮ Metric Pseudoentropy: Characterizations, Transformations and Applications ⋮ Modulus Computational Entropy ⋮ Computational fuzzy extractors ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy
This page was built for publication: Some Notions of Entropy for Cryptography