-
1
-
-
0033341167
-
Dispersers, deterministic amplification, and weak random sources
-
Alexander Andreev, Andrea Clementi, Jose Rolim, and Luca Trevisan. Dispersers, deterministic amplification, and weak random sources. SIAM J. on Computing, 28(6):2103-2116, 1999.
-
(1999)
SIAM J. on Computing
, vol.28
, Issue.6
, pp. 2103-2116
-
-
Andreev, A.1
Clementi, A.2
Rolim, J.3
Trevisan, L.4
-
2
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
Benny Chor and Oded Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. on Computing, 17(2):230-261, 1988.
-
(1988)
SIAM J. on Computing
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
3
-
-
38049036626
-
-
Yevgeniy Dodis. Exposure-Resilient Cryptography (PhD Thesis). MIT PhD Thesis, 2000.
-
Yevgeniy Dodis. Exposure-Resilient Cryptography (PhD Thesis). MIT PhD Thesis, 2000.
-
-
-
-
4
-
-
17744370165
-
On the (im)possibility of cryptography with imperfect randomness
-
Yevgeniy Dodis, Shien Jin Ong, Manoj Prabhakaran, and Amit Sahai. On the (im)possibility of cryptography with imperfect randomness. In Proc. 45th IEEE FOCS, pages 196-205, 2004.
-
(2004)
Proc. 45th IEEE FOCS
, pp. 196-205
-
-
Dodis, Y.1
Jin Ong, S.2
Prabhakaran, M.3
Sahai, A.4
-
6
-
-
0036957025
-
On the (non-)universality of the one-time pad
-
Yevgeniy Dodis and Joel Spencer. On the (non-)universality of the one-time pad. In Proc. 43rd IEEE FOCS, pages 376-388, 2002.
-
(2002)
Proc. 43rd IEEE FOCS
, pp. 376-388
-
-
Dodis, Y.1
Spencer, J.2
-
7
-
-
84945116168
-
On perfect and adaptive security in exposure-resilient cryptography
-
Yevgeniy Dodis, Amit Sahai, and Adam Smith. On perfect and adaptive security in exposure-resilient cryptography. In Proc. EUROCRYPT'01, pages 301-324, 2001.
-
(2001)
Proc. EUROCRYPT'01
, pp. 301-324
-
-
Dodis, Y.1
Sahai, A.2
Smith, A.3
-
8
-
-
0024868772
-
A Hard-Core Predicate for all One-Way Functions
-
Oded Goldreich and Leonid Levin. A Hard-Core Predicate for all One-Way Functions. In Prof. STOC, pp. 25-32, 1989.
-
(1989)
Prof. STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.2
-
9
-
-
33748100350
-
Deterministic extractors for small-space sources
-
Jesse Kamp, Anup Rao, Salil Vadhan and David Zuckerman. Deterministic extractors for small-space sources. In Proc of STOC, pp. 691-700, 2006.
-
(2006)
Proc of STOC
, pp. 691-700
-
-
Kamp, J.1
Rao, A.2
Vadhan, S.3
Zuckerman, D.4
-
10
-
-
0012524233
-
On the impossibility of private key cryptography with weakly random keys
-
James L. McInnes and Benny Pinkas. On the impossibility of private key cryptography with weakly random keys. In Proc. CRYPTO'90, pages 421-436, 1990.
-
(1990)
Proc. CRYPTO'90
, pp. 421-436
-
-
McInnes, J.L.1
Pinkas, B.2
-
11
-
-
84958670019
-
Privacy amplification secure against active adversaries
-
Ueli Maurer and Stefan Wolf. Privacy amplification secure against active adversaries. In Proc. CRYPTO'97, pages 307-321, 1997.
-
(1997)
Proc. CRYPTO'97
, pp. 307-321
-
-
Maurer, U.1
Wolf, S.2
-
12
-
-
0000845043
-
Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
-
Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In Proc. of CRYPTO, pp. 129-140, 1991.
-
(1991)
Proc. of CRYPTO
, pp. 129-140
-
-
Torben, P.1
-
13
-
-
35048874991
-
Unconditional authenticity and privacy from an arbitrary weak secret
-
Renato Renner and Stefan Wolf. Unconditional authenticity and privacy from an arbitrary weak secret. In Proc. CRYPTO'03, pages 78-95, 2003.
-
(2003)
Proc. CRYPTO'03
, pp. 78-95
-
-
Renner, R.1
Wolf, S.2
-
14
-
-
0021469810
-
Generating quasi-random sequences from semi-random sources
-
Miklos Santha and Umesh V. Vazirani. Generating quasi-random sequences from semi-random sources. JCSS, 33(1):75-87, 1986.
-
(1986)
JCSS
, vol.33
, Issue.1
, pp. 75-87
-
-
Santha, M.1
Vazirani, U.V.2
-
15
-
-
84890522850
-
Communication Theory of Secrecy systems
-
Claude Shannon. Communication Theory of Secrecy systems. In Bell Systems Technical J., 28:656-715, 1949.
-
(1949)
Bell Systems Technical J
, vol.28
, pp. 656-715
-
-
Shannon, C.1
-
16
-
-
38049030428
-
Linear Algebra and Its Applications
-
London
-
Gilbert Strang. Linear Algebra and Its Applications. Academic Press, London, 1980.
-
(1980)
Academic Press
-
-
Strang, G.1
-
17
-
-
0034505540
-
Extracting randomness from samplable distributions
-
Luca Trevisan and Salil Vadhan. Extracting randomness from samplable distributions. In Proc. 41st IEEE FOCS, pages 32-42, 2000.
-
(2000)
Proc. 41st IEEE FOCS
, pp. 32-42
-
-
Trevisan, L.1
Vadhan, S.2
-
19
-
-
0022252339
-
Random polynomial time is equal to slightly-random polynomial time
-
Umesh V. Vazirani and Vijay V. Vazirani. Random polynomial time is equal to slightly-random polynomial time. In Proc. 26th IEEE FOCS, pages 417-428, 1985.
-
(1985)
Proc. 26th IEEE FOCS
, pp. 417-428
-
-
Vazirani, U.V.1
Vazirani, V.V.2
-
20
-
-
0001023343
-
Simulating BPP using a general weak random source
-
David Zuckerman. Simulating BPP using a general weak random source. Algorithmica, 16(4/5):367-391, 1996.
-
(1996)
Algorithmica
, vol.16
, Issue.4-5
, pp. 367-391
-
-
Zuckerman, D.1
|