-
1
-
-
4344697756
-
On constructing locally computable extractors and cryptosystems in the bounded storage model
-
2002/162
-
Vadhan, S.P.: On constructing locally computable extractors and cryptosystems in the bounded storage model. Cryptology ePrint Archive, 2002/162 (2002)
-
(2002)
Cryptology ePrint Archive
-
-
Vadhan, S.P.1
-
2
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
Maurer, U.: Conditionally-perfect secrecy and a provably-secure randomized cipher. J. Cryptology 5 (1992) 53-66
-
(1992)
J. Cryptology
, vol.5
, pp. 53-66
-
-
Maurer, U.1
-
3
-
-
84958598231
-
Unconditional security against memory-bounded adversaries
-
CRYPTO '97
-
Cachin, C., Maurer, U.: Unconditional security against memory-bounded adversaries. In: CRYPTO '97. Spring LNCS 1294 (1997) 292-306
-
(1997)
Spring LNCS
, vol.1294
, pp. 292-306
-
-
Cachin, C.1
Maurer, U.2
-
4
-
-
84957084138
-
Information theoretically secure communication in the limited storage space model
-
CRYPTO '99
-
Aumann, Y., Rabin, M.O.: Information theoretically secure communication in the limited storage space model. In: CRYPTO '99. Springer LNCS 1666 (1999) 65-79
-
(1999)
Springer LNCS
, vol.1666
, pp. 65-79
-
-
Aumann, Y.1
Rabin, M.O.2
-
5
-
-
0036612020
-
Everlasting security in the bounded storage model
-
Aumann, Y., Ding, Y.Z., Rabin, M.O.: Everlasting security in the bounded storage model. IEEE Trans. Information Theory 48 (2002) 1668-1680
-
(2002)
IEEE Trans. Information Theory
, vol.48
, pp. 1668-1680
-
-
Aumann, Y.1
Ding, Y.Z.2
Rabin, M.O.3
-
6
-
-
84937431717
-
Hyper-encryption and everlasting security
-
(extended abstract). In: 19th STACS
-
Ding, Y.Z., Rabin, M.O.: Hyper-encryption and everlasting security (extended abstract). In: 19th STACS. Springer LNCS 2285 (2002) 1-26
-
(2002)
Springer LNCS
, vol.2285
, pp. 1-26
-
-
Ding, Y.Z.1
Rabin, M.O.2
-
7
-
-
0036040061
-
Tight security proofs for the bounded-storage model
-
Dziembowski, S., Maurer, U.: Tight security proofs for the bounded-storage model. In: 34th STOC. (2002) 341-350
-
(2002)
34th STOC
, pp. 341-350
-
-
Dziembowski, S.1
Maurer, U.2
-
9
-
-
84937432504
-
Hyper-encryption against space-bounded adversaries from on-line strong extractors
-
CRYPTO '02
-
Lu, C.J.: Hyper-encryption against space-bounded adversaries from on-line strong extractors. In: CRYPTO '02. Springer LNCS 2442 (2002) 257-271
-
(2002)
Springer LNCS
, vol.2442
, pp. 257-271
-
-
Lu, C.J.1
-
11
-
-
0033075850
-
Extracting randomness: A survey and new constructions
-
Nisan, N., Ta-Shma, A.: Extracting randomness: A survey and new constructions. J. Computer & System Sci. 58 (1999) 148-173
-
(1999)
J. Computer & System Sci.
, vol.58
, pp. 148-173
-
-
Nisan, N.1
Ta-Shma, A.2
-
12
-
-
0012579059
-
Recent developments in explicit constructions of extractors
-
Shaltiel, R.: Recent developments in explicit constructions of extractors. Bull. EATCS 77 (2002) 67-95
-
(2002)
Bull. EATCS
, vol.77
, pp. 67-95
-
-
Shaltiel, R.1
-
13
-
-
0036292773
-
Streaming computation of combinatorial objects
-
Bar-Yossef, Z., Reingold, O., Shaltiel, R., Trevisan, L.: Streaming computation of combinatorial objects. In: 17th CCC. (2002) 165-174
-
(2002)
17th CCC
, pp. 165-174
-
-
Bar-Yossef, Z.1
Reingold, O.2
Shaltiel, R.3
Trevisan, L.4
-
14
-
-
0005314594
-
Extractors and pseudorandom generators
-
Trevisan, L.: Extractors and pseudorandom generators. JACM 48 (2001) 860-879
-
(2001)
JACM
, vol.48
, pp. 860-879
-
-
Trevisan, L.1
-
15
-
-
0038446831
-
Extractors: Optimal up to constant factors
-
Lu, C.J., Reingold, O., Vadhan, S., Wigderson, A.: Extractors: Optimal up to constant factors. In: 35th STOC. (2003)
-
(2003)
35th STOC
-
-
Lu, C.J.1
Reingold, O.2
Vadhan, S.3
Wigderson, A.4
-
16
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Computing 17 (1988) 230-261
-
(1988)
SIAM J. Computing
, vol.17
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
17
-
-
0001023343
-
Simulating BPP using a general weak random source
-
Zuckerman, D.: Simulating BPP using a general weak random source. Algorithmica 16 (1996) 367-391
-
(1996)
Algorithmica
, vol.16
, pp. 367-391
-
-
Zuckerman, D.1
-
18
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C.E.: Communication theory of secrecy systems. Bell System Technical Journal 28 (1949) 656-715
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
20
-
-
33749228136
-
Randomness-efficient oblivious sampling
-
Bellare, M., Rompel, J.: Randomness-efficient oblivious sampling. In: 35th FOCS. (1994) 276-287
-
(1994)
35th FOCS
, pp. 276-287
-
-
Bellare, M.1
Rompel, J.2
-
21
-
-
0029220110
-
Lower bounds for sampling algorithms for estimating the average
-
Canetti, R., Even, G., Goldreich, O.: Lower bounds for sampling algorithms for estimating the average. Information Processing Letters 53 (1995) 17-25
-
(1995)
Information Processing Letters
, vol.53
, pp. 17-25
-
-
Canetti, R.1
Even, G.2
Goldreich, O.3
-
22
-
-
0031507665
-
Randomness-optimal oblivious sampling
-
Zuckerman, D.: Randomness-optimal oblivious sampling. Random Struct. & Alg. 11 (1997) 345-367
-
(1997)
Random Struct. & Alg.
, vol.11
, pp. 345-367
-
-
Zuckerman, D.1
-
24
-
-
0036435072
-
Almost optimal dispersere
-
Ta-Shma, A.: Almost optimal dispersere. Combinatorica 22 (2002) 123-145
-
(2002)
Combinatorica
, vol.22
, pp. 123-145
-
-
Ta-Shma, A.1
-
25
-
-
0002956996
-
Bounds for dispersers, extractors, and depth-two superconcentrators
-
electronic
-
Radhakrishnan, J., Ta-Shma, A.: Bounds for dispersers, extractors, and depth-two superconcentrators. SIAM J. Discrete Math. 13 (2000) 2-24 (electronic)
-
(2000)
SIAM J. Discrete Math.
, vol.13
, pp. 2-24
-
-
Radhakrishnan, J.1
Ta-Shma, A.2
-
26
-
-
0040713388
-
Randomness in interactive proofs
-
Bellare, M., Goldreich, O., Goldwasser, S.: Randomness in interactive proofs. Computational Complexity 3 (1993) 319-354
-
(1993)
Computational Complexity
, vol.3
, pp. 319-354
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
27
-
-
0031504510
-
Tiny families of functions with random properties: A quality-size trade-oil for hashing
-
Goldreich, O., Wigderson, A.: Tiny families of functions with random properties: A quality-size trade-oil for hashing. Random Struct. & Alg. 11 (1997) 315-343
-
(1997)
Random Struct. & Alg.
, vol.11
, pp. 315-343
-
-
Goldreich, O.1
Wigderson, A.2
-
28
-
-
0002739272
-
On the power of two-point based sampling
-
Chor, B., Goldreich, O.: On the power of two-point based sampling. J. Complexity 5 (1989) 96-106
-
(1989)
J. Complexity
, vol.5
, pp. 96-106
-
-
Chor, B.1
Goldreich, O.2
-
29
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM J. Comput. 28 (1999) 1364-1396
-
(1999)
SIAM J. Comput.
, vol.28
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
|