Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Deterministic Extractors for Bit‐Fixing Sources and Exposure‐Resilient Cryptography - MaRDI portal

Deterministic Extractors for Bit‐Fixing Sources and Exposure‐Resilient Cryptography

From MaRDI portal
Publication:5422484

DOI10.1137/S0097539705446846zbMath1124.68036OpenAlexW2095594956MaRDI QIDQ5422484

Jesse Kamp, David Zuckerman

Publication date: 22 October 2007

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/s0097539705446846




Related Items (25)

Zero-Fixing Extractors for Sub-Logarithmic EntropyDeterministic extractors for affine sources over large fieldsExtracting Computational Entropy and Learning Noisy Linear FunctionsOur Data, Ourselves: Privacy Via Distributed Noise GenerationExtractors for varietiesImproved Average-Case Lower Bounds for De Morgan Formula Size: Matching Worst-Case Lower BoundUnnamed ItemHow to get more mileage from randomness extractorsWeak derandomization of weak algorithms: explicit versions of Yao's lemmaComputational fuzzy extractorsIncreasing the Output Length of Zero-Error DispersersDeterministic extractors for small-space sourcesSecure Message Transmission by Public Discussion: A Brief SurveyAn Introduction to Randomness ExtractorsLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsImproving the Hadamard extractorOn extractors and exposure‐resilient functions for sublogarithmic entropySecrecy Without Perfect Randomness: Cryptography with (Bounded) Weak SourcesReusable fuzzy extractors for low-entropy distributionsExtractors and Lower Bounds for Locally Samplable SourcesHow to extract useful randomness from unreliable sourcesComputing majority by constant depth majority circuits with low fan-in gatesIncreasing the output length of zero-error dispersersSimple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy AmplificationExtractors for small zero-fixing sources




This page was built for publication: Deterministic Extractors for Bit‐Fixing Sources and Exposure‐Resilient Cryptography