메뉴 건너뛰기




Volumn 209, Issue 8, 2011, Pages 1184-1196

Sharp lower bounds on the extractable randomness from non-uniform sources

Author keywords

Leftover Hash Lemma; Randomness extraction; Universal hash function

Indexed keywords

BIT-STRINGS; EXTRACTION METHOD; KEY STORAGE; LEFTOVER HASH LEMMA; LOWER BOUNDS; MIN-ENTROPY; PHYSICAL UNCLONABLE FUNCTIONS; PRIVACY PRESERVING; RANDOM NUMBER GENERATORS; RANDOMNESS EXTRACTION; SECURITY APPLICATION; UNIVERSAL HASH FUNCTION;

EID: 79959222662     PISSN: 08905401     EISSN: 10902651     Source Type: Journal    
DOI: 10.1016/j.ic.2011.06.001     Document Type: Article
Times cited : (18)

References (23)
  • 1
    • 35248890430 scopus 로고    scopus 로고
    • Computational analogues of entropy
    • Lecture Notes in Comput. Sci. Springer-Verlag Berlin
    • B. Barak, R. Shaltiel, and A. Wigderson Computational analogues of entropy APPROX 2003 + RANDOM 2003 Lecture Notes in Comput. Sci. vol. 2764 2003 Springer-Verlag Berlin 200 215
    • (2003) APPROX 2003 + RANDOM 2003 , vol.2764 , pp. 200-215
    • Barak, B.1    Shaltiel, R.2    Wigderson, A.3
  • 3
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • L. Carter, and M.N. Wegman Universal classes of hash functions J. Comput. System Sci. 18 2 1979 143 154
    • (1979) J. Comput. System Sci. , vol.18 , Issue.2 , pp. 143-154
    • Carter, L.1    Wegman, M.N.2
  • 4
    • 79960843047 scopus 로고    scopus 로고
    • Secure hardware processors using silicon physical one-way functions
    • R. Sandu (Ed.)
    • D. Clarke, B. Gassend, M. van Dijk, S. Devadas, Secure hardware processors using silicon physical one-way functions, in: R. Sandu (Ed.), ACM CCS '02, 2002.
    • (2002) ACM CCS '02
    • Clarke, D.1    Gassend, B.2    Van Dijk, M.3    Devadas, S.4
  • 6
    • 36348947793 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Report 2003/235
    • Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, Cryptology ePrint Archive, Report 2003/235, 2003.
    • (2003) Cryptology EPrint Archive
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 7
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith Fuzzy extractors: How to generate strong keys from biometrics and other noisy data SIAM J. Comput. 38 1 2008 97 139
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 8
    • 38049015807 scopus 로고    scopus 로고
    • FPGA intrinsic PUFs and their use for IP protection
    • P. Paillier, I. Verbauwhede, Lecture Notes in Comput. Sci. Springer
    • J. Guajardo, S.S. Kumar, G.J. Schrijen, and P. Tuyls FPGA intrinsic PUFs and their use for IP protection P. Paillier, I. Verbauwhede, CHES Lecture Notes in Comput. Sci. vol. 4727 2007 Springer 63 80
    • (2007) CHES , vol.4727 , pp. 63-80
    • Guajardo, J.1    Kumar, S.S.2    Schrijen, G.J.3    Tuyls, P.4
  • 9
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • J. Hastad, R. Impagliazzo, L.A. Levin, and M. Luby A pseudorandom generator from any one-way function SIAM J. Comput. 28 4 1999 1364 1396
    • (1999) SIAM J. Comput. , vol.28 , Issue.4 , pp. 1364-1396
    • Hastad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 12
    • 8844225798 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • J. Kittler, M. Nixon, Lecture Notes in Comput. Sci. Springer-Verlag
    • J.-P.M.G. Linnartz, and P. Tuyls New shielding functions to enhance privacy and prevent misuse of biometric templates J. Kittler, M. Nixon, Conference on Audio and Video Based Person Authentication Lecture Notes in Comput. Sci. vol. 2688 2003 Springer-Verlag 238 250
    • (2003) Conference on Audio and Video Based Person Authentication , vol.2688 , pp. 238-250
    • Linnartz, J.-P.M.G.1    Tuyls, P.2
  • 14
    • 33846181385 scopus 로고    scopus 로고
    • PhD thesis, Swiss Federal Institute of Technology (ETH) Zurich, September
    • R. Renner, Security of quantum key distribution, PhD thesis, Swiss Federal Institute of Technology (ETH) Zurich, September 2005, available at http://arxiv.org/abs/quant-ph/0512258.
    • (2005) Security of Quantum Key Distribution
    • Renner, R.1
  • 18
    • 71049183202 scopus 로고
    • Universal hashing and authentication codes
    • J. Feigenbaum, Lecture Notes in Comput. Sci. Springer
    • D.R. Stinson Universal hashing and authentication codes J. Feigenbaum, CRYPTO Lecture Notes in Comput. Sci. vol. 576 1991 Springer 74 85
    • (1991) CRYPTO , vol.576 , pp. 74-85
    • Stinson, D.R.1
  • 19
    • 0000410707 scopus 로고
    • Universal hashing and authentication codes
    • D.R. Stinson Universal hashing and authentication codes Des. Codes Cryptogr. 4 4 1994 369 380
    • (1994) Des. Codes Cryptogr. , vol.4 , Issue.4 , pp. 369-380
    • Stinson, D.R.1
  • 20
    • 24144493986 scopus 로고    scopus 로고
    • Universal hash families and the leftover hash lemma, and applications to cryptography and computing
    • D.R. Stinson Universal hash families and the leftover hash lemma, and applications to cryptography and computing J. Combin. Math. Combin. Comput. 42 2002 3 31
    • (2002) J. Combin. Math. Combin. Comput. , vol.42 , pp. 3-31
    • Stinson, D.R.1
  • 23
    • 79960848452 scopus 로고    scopus 로고
    • Randomized resonators as uniquely identifiable anti-counterfeiting tags, March 2008
    • B. Škorić, T. Bel, A.H.M. Blom, B.R. de Jong, H. Kretschman, A.J.M. Nellissen, Randomized resonators as uniquely identifiable anti-counterfeiting tags, March 2008, Secure Component and System Identification (SECSI) Workshop.
    • Secure Component and System Identification (SECSI) Workshop
    • Škorić, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.