-
1
-
-
80051979715
-
Leftover hash lemma, revisited
-
Barak, B., Dodis, Y., Krawczyk, H., Pereira, O., Pietrzak, K., Standaert, F.-X., Yu, Y.: Leftover hash lemma, revisited. Cryptology ePrint Archive, Report 2011/088 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology ePrint Archive, Report 2011/088
-
-
Barak, B.1
Dodis, Y.2
Krawczyk, H.3
Pereira, O.4
Pietrzak, K.5
Standaert, F.-X.6
Yu, Y.7
-
2
-
-
33745781447
-
A model and architecture for pseudo-random generation with applications to /dev/random
-
Barak, B., Halevi, S.: A model and architecture for pseudo-random generation with applications to /dev/random. In: ACM CCS (2005)
-
(2005)
ACM CCS
-
-
Barak, B.1
Halevi, S.2
-
3
-
-
33745861377
-
True Random Number Generators Secure in a Changing Environment
-
Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. Springer, Heidelberg
-
Barak, B., Shaltiel, R., Tromer, E.: True Random Number Generators Secure in a Changing Environment. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 166-180. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2779
, pp. 166-180
-
-
Barak, B.1
Shaltiel, R.2
Tromer, E.3
-
4
-
-
0023985539
-
Privacy amplification by public discussion
-
Bennett, C.H., Brassard, G., Robert, J.-M.: Privacy amplification by public discussion. SIAM Journal on Computing 17(2), 210-229 (1988)
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
5
-
-
24944501364
-
Secure Remote Authentication Using Biometric Data
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure Remote Authentication Using Biometric Data. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147-163. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 147-163
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
6
-
-
84948973494
-
Exposure-resilient functions and all-or-nothing transforms
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E., Sahai, A.: Exposure-resilient functions and all-or-nothing transforms. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, p. 453. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 453
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
8
-
-
67650652424
-
Optimal randomness extraction from a diffie-hellman element
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Chevalier, C., Fouque, P.-A., Pointcheval, D., Zimmer, S.: Optimal randomness extraction from a diffie-hellman element. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
-
-
Chevalier, C.1
Fouque, P.-A.2
Pointcheval, D.3
Zimmer, S.4
-
9
-
-
35048839833
-
Randomness extraction and key derivation using the cbc, cascade and hmac modes
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Dodis, Y., Gennaro, R., Håstad, J., Krawczyk, H., Rabin, T.: Randomness extraction and key derivation using the cbc, cascade and hmac modes. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
-
-
Dodis, Y.1
Gennaro, R.2
Håstad, J.3
Krawczyk, H.4
Rabin, T.5
-
10
-
-
33749541274
-
Robust fuzzy extractors and authenticated key agreement from close secrets
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust fuzzy extractors and authenticated key agreement from close secrets. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
-
-
Dodis, Y.1
Katz, J.2
Reyzin, L.3
Smith, A.4
-
11
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing 38(1), 97-139 (2008)
-
(2008)
SIAM Journal on Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
12
-
-
33748094970
-
On the randomness complexity of efficient sampling
-
Dubrov, B., Ishai, Y.: On the randomness complexity of efficient sampling. In: STOC (2006)
-
(2006)
STOC
-
-
Dubrov, B.1
Ishai, Y.2
-
13
-
-
33749583877
-
On Forward-Secure Storage
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Dziembowski, S.: On Forward-Secure Storage. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 251-270. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 251-270
-
-
Dziembowski, S.1
-
14
-
-
31444435304
-
Secure hashed diffie-hellman over nonddh groups
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Gennaro, R., Krawczyk, H., Rabin, T.: Secure hashed diffie-hellman over nonddh groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
-
-
Gennaro, R.1
Krawczyk, H.2
Rabin, T.3
-
15
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
Goldreich, O., Levin, L.: A hard-core predicate for all one-way functions. In: STOC (1989)
-
(1989)
STOC
-
-
Goldreich, O.1
Levin, L.2
-
16
-
-
68549120859
-
Unbalanced expanders and randomness extractors from parvaresh-vardy codes
-
Guruswami, V., Umans, C., Vadhan, S.: Unbalanced expanders and randomness extractors from parvaresh-vardy codes. J. ACM 56(4) (2009)
-
(2009)
J. ACM
, vol.56
, Issue.4
-
-
Guruswami, V.1
Umans, C.2
Vadhan, S.3
-
17
-
-
85083034630
-
Nearly one-sided tests and the goldreich?Levin predicate
-
Hast, G.: Nearly one-sided tests and the goldreich?levin predicate. J. Cryptology 17(3), 209-229 (2004)
-
(2004)
J. Cryptology
, vol.17
, Issue.3
, pp. 209-229
-
-
Hast, G.1
-
18
-
-
0345253860
-
Construction of pseudorandom generator from any one-way function
-
Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: Construction of pseudorandom generator from any one-way function. SIAM Journal on Computing 28(4), 1364-1396 (1999)
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
19
-
-
34848917325
-
Key agreement from weak bit agreement
-
Holenstein, T.: Key agreement from weak bit agreement. In: STOC (2005)
-
(2005)
STOC
-
-
Holenstein, T.1
-
21
-
-
33745848493
-
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Hsiao, C.-Y., Reyzin, L.: Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins? In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 92-105. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 92-105
-
-
Hsiao, C.-Y.1
Reyzin, L.2
-
23
-
-
0024866742
-
Limits on the provable consequences of one-way permutations
-
Impagliazzo, R., Rudich, S.: Limits on the provable consequences of one-way permutations. In: STOC (1989)
-
(1989)
STOC
-
-
Impagliazzo, R.1
Rudich, S.2
-
24
-
-
77954696917
-
Cryptography with constant computational overhead
-
Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Cryptography with constant computational overhead. In: STOC (2008)
-
(2008)
STOC
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
25
-
-
77957013995
-
Cryptographic Extraction and Key Derivation: The HKDF Scheme
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Krawczyk, H.: Cryptographic Extraction and Key Derivation: The HKDF Scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631-648. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 631-648
-
-
Krawczyk, H.1
-
26
-
-
84958670019
-
Privacy amplification secure against active adversaries
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Maurer, U., Wolf, S.: Privacy amplification secure against active adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
-
-
Maurer, U.1
Wolf, S.2
-
27
-
-
49049116151
-
Why simple hash functions work: Exploiting the entropy in a data stream
-
Mitzenmacher, M., Vadhan, S.P.: Why simple hash functions work: exploiting the entropy in a data stream. In: SODA (2008)
-
(2008)
SODA
-
-
Mitzenmacher, M.1
Vadhan, S.P.2
-
28
-
-
0031332843
-
Number-theoretic constructions of efficient pseudo-random functions
-
Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: FOCS (1997)
-
(1997)
FOCS
-
-
Naor, M.1
Reingold, O.2
-
29
-
-
70350303869
-
Public-key cryptosystems resilient to key leakage
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
-
-
Naor, M.1
Segev, G.2
-
30
-
-
84957663269
-
Software Performance of Universal Hash Functions
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Nevelsteen,W., Preneel, B.: Software Performance of Universal Hash Functions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 24. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 24
-
-
Preneel, B.1
-
32
-
-
33746075556
-
Composition implies adaptive security in minicrypt
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Pietrzak, K.: Composition implies adaptive security in minicrypt. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
-
-
Pietrzak, K.1
-
33
-
-
49049097506
-
Weak pseudorandom functions in minicrypt
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
-
Pietrzak, K., Sjödin, J.: Weak pseudorandom functions in minicrypt. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 423-436. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 423-436
-
-
Pietrzak, K.1
Sjödin, J.2
-
34
-
-
0002956996
-
Bounds for dispersers, extractors, and depth-two superconcentrators
-
Radhakrishnan, J., Ta-Shma, A.: Bounds for dispersers, extractors, and depth-two superconcentrators. SIAM Journal on Computing 13(1), 2-24 (2000)
-
(2000)
SIAM Journal on Computing
, vol.13
, Issue.1
, pp. 2-24
-
-
Radhakrishnan, J.1
Ta-Shma, A.2
-
35
-
-
35048874991
-
Unconditional authenticity and privacy from an arbitrarily weak secret
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Renner, R., Wolf, S.: Unconditional authenticity and privacy from an arbitrarily weak secret. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
-
-
Renner, R.1
Wolf, S.2
-
36
-
-
0012579059
-
Recent developments in explicit constructions of extractors
-
Shaltiel, R.: Recent developments in explicit constructions of extractors. Bulletin of the EATCS 77, 67-95 (2002)
-
(2002)
Bulletin of the EATCS
, vol.77
, pp. 67-95
-
-
Shaltiel, R.1
-
37
-
-
0000410707
-
Universal hashing and authentication codes
-
Stinson, D.R.: Universal hashing and authentication codes. Designs, Codes, and Cryptography 4(4), 369-380 (1994)
-
(1994)
Designs, Codes, and Cryptography
, vol.4
, Issue.4
, pp. 369-380
-
-
Stinson, D.R.1
-
38
-
-
24144493986
-
Universal hash families and the leftover hash lemma, and applications to cryptography and computing
-
Stinson, D.R.: Universal hash families and the leftover hash lemma, and applications to cryptography and computing. Journal of Combinatorial Mathematics and Combinatorial Computing 42, 3-31 (2002), http://www.cacr.math.uwaterloo.ca/ ~dstinson/publist.html
-
(2002)
Journal of Combinatorial Mathematics and Combinatorial Computing
, vol.42
, pp. 3-31
-
-
Stinson, D.R.1
|