Overcoming Weak Expectations
From MaRDI portal
Publication:4910268
DOI10.1007/978-3-642-36594-2_1zbMath1296.94107OpenAlexW2044406747MaRDI QIDQ4910268
Publication date: 18 March 2013
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-36594-2_1
Related Items (24)
Non-malleable functions and their applications ⋮ Condensed Unpredictability ⋮ Concentration of the collision estimator ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Shannon Entropy Versus Renyi Entropy from a Cryptographic Viewpoint ⋮ Unnamed Item ⋮ The Chain Rule for HILL Pseudoentropy, Revisited ⋮ Information Theoretic Security for Encryption Based on Conditional Rényi Entropies ⋮ Modulus Computational Entropy ⋮ A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded Leakage ⋮ (Nondeterministic) hardness vs. non-malleability ⋮ On secret sharing, randomness, and random-less reductions for secret sharing ⋮ Challenge codes for physically unclonable functions with Gaussian delays: a maximum entropy problem ⋮ Unnamed Item ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Nonmalleable Extractors and Codes, with Their Many Tampered Extensions ⋮ Bounded-Retrieval Model with Keys Derived from Private Data ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ Immunization against complete subversion without random oracles ⋮ A Signature Scheme with a Fuzzy Private Key ⋮ Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy ⋮ Leakage-resilient key exchange and two-seed extractors ⋮ Common Information, Noise Stability, and Their Extensions
This page was built for publication: Overcoming Weak Expectations