메뉴 건너뛰기




Volumn 6841 LNCS, Issue , 2011, Pages 1-20

Leftover hash lemma, revisited

Author keywords

[No Author keywords available]

Indexed keywords

HASH FUNCTIONS; RANDOM PROCESSES;

EID: 80051984165     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22792-9_1     Document Type: Conference Paper
Times cited : (89)

References (38)
  • 2
    • 33745781447 scopus 로고    scopus 로고
    • A model and architecture for pseudo-random generation with applications to /dev/random
    • Barak, B., Halevi, S.: A model and architecture for pseudo-random generation with applications to /dev/random. In: ACM CCS (2005)
    • (2005) ACM CCS
    • Barak, B.1    Halevi, S.2
  • 3
    • 33745861377 scopus 로고    scopus 로고
    • True Random Number Generators Secure in a Changing Environment
    • Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. Springer, Heidelberg
    • Barak, B., Shaltiel, R., Tromer, E.: True Random Number Generators Secure in a Changing Environment. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 166-180. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2779 , pp. 166-180
    • Barak, B.1    Shaltiel, R.2    Tromer, E.3
  • 5
    • 24944501364 scopus 로고    scopus 로고
    • Secure Remote Authentication Using Biometric Data
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure Remote Authentication Using Biometric Data. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147-163. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 147-163
    • Boyen, X.1    Dodis, Y.2    Katz, J.3    Ostrovsky, R.4    Smith, A.5
  • 6
    • 84948973494 scopus 로고    scopus 로고
    • Exposure-resilient functions and all-or-nothing transforms
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E., Sahai, A.: Exposure-resilient functions and all-or-nothing transforms. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, p. 453. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 453
    • Canetti, R.1    Dodis, Y.2    Halevi, S.3    Kushilevitz, E.4    Sahai, A.5
  • 8
    • 67650652424 scopus 로고    scopus 로고
    • Optimal randomness extraction from a diffie-hellman element
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Chevalier, C., Fouque, P.-A., Pointcheval, D., Zimmer, S.: Optimal randomness extraction from a diffie-hellman element. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479
    • Chevalier, C.1    Fouque, P.-A.2    Pointcheval, D.3    Zimmer, S.4
  • 9
    • 35048839833 scopus 로고    scopus 로고
    • Randomness extraction and key derivation using the cbc, cascade and hmac modes
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Dodis, Y., Gennaro, R., Håstad, J., Krawczyk, H., Rabin, T.: Randomness extraction and key derivation using the cbc, cascade and hmac modes. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152
    • Dodis, Y.1    Gennaro, R.2    Håstad, J.3    Krawczyk, H.4    Rabin, T.5
  • 10
    • 33749541274 scopus 로고    scopus 로고
    • Robust fuzzy extractors and authenticated key agreement from close secrets
    • Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
    • Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust fuzzy extractors and authenticated key agreement from close secrets. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117
    • Dodis, Y.1    Katz, J.2    Reyzin, L.3    Smith, A.4
  • 11
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing 38(1), 97-139 (2008)
    • (2008) SIAM Journal on Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 12
    • 33748094970 scopus 로고    scopus 로고
    • On the randomness complexity of efficient sampling
    • Dubrov, B., Ishai, Y.: On the randomness complexity of efficient sampling. In: STOC (2006)
    • (2006) STOC
    • Dubrov, B.1    Ishai, Y.2
  • 13
    • 33749583877 scopus 로고    scopus 로고
    • On Forward-Secure Storage
    • Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
    • Dziembowski, S.: On Forward-Secure Storage. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 251-270. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 251-270
    • Dziembowski, S.1
  • 14
    • 31444435304 scopus 로고    scopus 로고
    • Secure hashed diffie-hellman over nonddh groups
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Gennaro, R., Krawczyk, H., Rabin, T.: Secure hashed diffie-hellman over nonddh groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027
    • Gennaro, R.1    Krawczyk, H.2    Rabin, T.3
  • 15
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions
    • Goldreich, O., Levin, L.: A hard-core predicate for all one-way functions. In: STOC (1989)
    • (1989) STOC
    • Goldreich, O.1    Levin, L.2
  • 16
    • 68549120859 scopus 로고    scopus 로고
    • Unbalanced expanders and randomness extractors from parvaresh-vardy codes
    • Guruswami, V., Umans, C., Vadhan, S.: Unbalanced expanders and randomness extractors from parvaresh-vardy codes. J. ACM 56(4) (2009)
    • (2009) J. ACM , vol.56 , Issue.4
    • Guruswami, V.1    Umans, C.2    Vadhan, S.3
  • 17
    • 85083034630 scopus 로고    scopus 로고
    • Nearly one-sided tests and the goldreich?Levin predicate
    • Hast, G.: Nearly one-sided tests and the goldreich?levin predicate. J. Cryptology 17(3), 209-229 (2004)
    • (2004) J. Cryptology , vol.17 , Issue.3 , pp. 209-229
    • Hast, G.1
  • 18
    • 0345253860 scopus 로고    scopus 로고
    • Construction of pseudorandom generator from any one-way function
    • Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: Construction of pseudorandom generator from any one-way function. SIAM Journal on Computing 28(4), 1364-1396 (1999)
    • (1999) SIAM Journal on Computing , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 19
    • 34848917325 scopus 로고    scopus 로고
    • Key agreement from weak bit agreement
    • Holenstein, T.: Key agreement from weak bit agreement. In: STOC (2005)
    • (2005) STOC
    • Holenstein, T.1
  • 21
    • 33745848493 scopus 로고    scopus 로고
    • Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Hsiao, C.-Y., Reyzin, L.: Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins? In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 92-105. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 92-105
    • Hsiao, C.-Y.1    Reyzin, L.2
  • 23
    • 0024866742 scopus 로고
    • Limits on the provable consequences of one-way permutations
    • Impagliazzo, R., Rudich, S.: Limits on the provable consequences of one-way permutations. In: STOC (1989)
    • (1989) STOC
    • Impagliazzo, R.1    Rudich, S.2
  • 25
    • 77957013995 scopus 로고    scopus 로고
    • Cryptographic Extraction and Key Derivation: The HKDF Scheme
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Krawczyk, H.: Cryptographic Extraction and Key Derivation: The HKDF Scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631-648. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 631-648
    • Krawczyk, H.1
  • 26
    • 84958670019 scopus 로고    scopus 로고
    • Privacy amplification secure against active adversaries
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Maurer, U., Wolf, S.: Privacy amplification secure against active adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294
    • Maurer, U.1    Wolf, S.2
  • 27
    • 49049116151 scopus 로고    scopus 로고
    • Why simple hash functions work: Exploiting the entropy in a data stream
    • Mitzenmacher, M., Vadhan, S.P.: Why simple hash functions work: exploiting the entropy in a data stream. In: SODA (2008)
    • (2008) SODA
    • Mitzenmacher, M.1    Vadhan, S.P.2
  • 28
    • 0031332843 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudo-random functions
    • Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: FOCS (1997)
    • (1997) FOCS
    • Naor, M.1    Reingold, O.2
  • 29
    • 70350303869 scopus 로고    scopus 로고
    • Public-key cryptosystems resilient to key leakage
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Naor, M., Segev, G.: Public-key cryptosystems resilient to key leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677
    • Naor, M.1    Segev, G.2
  • 30
    • 84957663269 scopus 로고    scopus 로고
    • Software Performance of Universal Hash Functions
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Nevelsteen,W., Preneel, B.: Software Performance of Universal Hash Functions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 24. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 24
    • Preneel, B.1
  • 32
    • 33746075556 scopus 로고    scopus 로고
    • Composition implies adaptive security in minicrypt
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Pietrzak, K.: Composition implies adaptive security in minicrypt. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004
    • Pietrzak, K.1
  • 33
    • 49049097506 scopus 로고    scopus 로고
    • Weak pseudorandom functions in minicrypt
    • Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
    • Pietrzak, K., Sjödin, J.: Weak pseudorandom functions in minicrypt. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 423-436. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 423-436
    • Pietrzak, K.1    Sjödin, J.2
  • 34
    • 0002956996 scopus 로고    scopus 로고
    • Bounds for dispersers, extractors, and depth-two superconcentrators
    • Radhakrishnan, J., Ta-Shma, A.: Bounds for dispersers, extractors, and depth-two superconcentrators. SIAM Journal on Computing 13(1), 2-24 (2000)
    • (2000) SIAM Journal on Computing , vol.13 , Issue.1 , pp. 2-24
    • Radhakrishnan, J.1    Ta-Shma, A.2
  • 35
    • 35048874991 scopus 로고    scopus 로고
    • Unconditional authenticity and privacy from an arbitrarily weak secret
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Renner, R., Wolf, S.: Unconditional authenticity and privacy from an arbitrarily weak secret. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729
    • Renner, R.1    Wolf, S.2
  • 36
    • 0012579059 scopus 로고    scopus 로고
    • Recent developments in explicit constructions of extractors
    • Shaltiel, R.: Recent developments in explicit constructions of extractors. Bulletin of the EATCS 77, 67-95 (2002)
    • (2002) Bulletin of the EATCS , vol.77 , pp. 67-95
    • Shaltiel, R.1
  • 37
    • 0000410707 scopus 로고
    • Universal hashing and authentication codes
    • Stinson, D.R.: Universal hashing and authentication codes. Designs, Codes, and Cryptography 4(4), 369-380 (1994)
    • (1994) Designs, Codes, and Cryptography , vol.4 , Issue.4 , pp. 369-380
    • Stinson, D.R.1
  • 38
    • 24144493986 scopus 로고    scopus 로고
    • Universal hash families and the leftover hash lemma, and applications to cryptography and computing
    • Stinson, D.R.: Universal hash families and the leftover hash lemma, and applications to cryptography and computing. Journal of Combinatorial Mathematics and Combinatorial Computing 42, 3-31 (2002), http://www.cacr.math.uwaterloo.ca/ ~dstinson/publist.html
    • (2002) Journal of Combinatorial Mathematics and Combinatorial Computing , vol.42 , pp. 3-31
    • Stinson, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.