scientific article

From MaRDI portal
Publication:3152800

zbMath1051.68070MaRDI QIDQ3152800

Ronen Shaltiel

Publication date: 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (47)

Robustly reusable fuzzy extractor with imperfect randomnessIncompressible functions, relative-error extractors, and the power of nondeterministic reductionsFrom Affine to Two-Source Extractors via Approximate DualityMore efficient DDH pseudorandom generatorsDeterministic extractors for affine sources over large fieldsThe entropy of a distributed computation random number generation from memory interleavingExtracting Computational Entropy and Learning Noisy Linear FunctionsA modular framework for quantum-proof randomness extractorsOur Data, Ourselves: Privacy Via Distributed Noise GenerationCertifiable quantum dice2-source dispersers for \(n^{o(1)}\) entropy, and Ramsey graphs beating the Frankl-Wilson constructionLeakage Resilience of the Blom’s Key Distribution SchemeRandomness – A Computational Complexity PerspectiveRainbow connections of graphs: a surveyParadigms for Unconditional Pseudorandom GeneratorsExtractors for Jacobians of Binary Genus-2 Hyperelliptic CurvesHow to get more mileage from randomness extractorsWeak derandomization of weak algorithms: explicit versions of Yao's lemmaComputational fuzzy extractorsIncreasing the Output Length of Zero-Error DispersersDeterministic extractors for small-space sourcesQuantum Random Number GenerationSecure Random Number Generation in Continuous Variable SystemsHierarchy Theorems for Property TestingOn Randomness Extraction in Elliptic CurvesAn Introduction to Randomness ExtractorsImproving the Hadamard extractorRainbow pathsA Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage SchemesSimple extractors via constructions of cryptographic pseudo-random generatorsDispersing hash functionsUnnamed ItemRandomness Extraction Via δ-Biased Masking in the Presence of a Quantum AttackerExtractors for Jacobian of Hyperelliptic Curves of Genus 2 in Odd CharacteristicConstructive dimension and Turing degreesThe complexity of the matroid-greedoid partition problemExtractors for binary elliptic curvesNon-interactive timestamping in the bounded-storage modelDimension extractors and optimal decompressionA Sample of Samplers: A Computational Perspective on SamplingAnother Motivation for Reducing the Randomness Complexity of AlgorithmsComputational Randomness from Generalized Hardcore SetsBounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number GeneratorsExplicit two-source extractors and resilient functionsA Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal StretchAdditive Combinatorics: With a View Towards Computer Science and Cryptography—An ExpositionCan We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?




This page was built for publication: