-
1
-
-
0023985539
-
Privacy amplification by public discussion
-
C. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM Journal on Computing, vol. 17, pp. 210-229, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 210-229
-
-
Bennett, C.1
Brassard, G.2
Robert, J.-M.3
-
2
-
-
0030086632
-
Randomness is linear in space
-
N. Nisan and D. Zuckerman, "Randomness is linear in space," Journal of Computer and System Sciences, vol. 52, no. 1, pp. 43-52, 1996.
-
(1996)
Journal of Computer and System Sciences
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
3
-
-
21244480384
-
Privacy amplification secure against active adversaries
-
U. M. Maurer and S. Wolf, "Privacy amplification secure against active adversaries," in CRYPTO '97, 1997.
-
CRYPTO '97, 1997
-
-
Maurer, U.M.1
Wolf, S.2
-
4
-
-
33749541274
-
Robust fuzzy extractors and authenticated key agreement from close secrets
-
Y. Dodis, J. Katz, L. Reyzin, and A. Smith, "Robust fuzzy extractors and authenticated key agreement from close secrets," in CRYPTO, 2006, pp. 232-250.
-
(2006)
CRYPTO
, pp. 232-250
-
-
Dodis, Y.1
Katz, J.2
Reyzin, L.3
Smith, A.4
-
5
-
-
70350700885
-
Non-malleable extractors and symmetric key cryptography from weak secrets
-
Y. Dodis and D. Wichs, "Non-malleable extractors and symmetric key cryptography from weak secrets," in STOC09, 2009.
-
STOC09, 2009
-
-
Dodis, Y.1
Wichs, D.2
-
6
-
-
35048874991
-
Unconditional authenticity and privacy from an arbitrarily weak secret
-
R. Renner and S. Wolf, "Unconditional authenticity and privacy from an arbitrarily weak secret," in CRYPTO, 2003, pp. 78-95.
-
(2003)
CRYPTO
, pp. 78-95
-
-
Renner, R.1
Wolf, S.2
-
7
-
-
67650671123
-
Key agreement from close secrets over unsecured channels
-
B. Kanukurthi and L. Reyzin, "Key agreement from close secrets over unsecured channels," in EUROCRYPT, 2009, pp. 206-223.
-
(2009)
EUROCRYPT
, pp. 206-223
-
-
Kanukurthi, B.1
Reyzin, L.2
-
8
-
-
77954731169
-
Privacy amplification with asymptotically optimal entropy loss
-
N. Chandran, B. Kanukurthi, R. Ostrovsky, and L. Reyzin, "Privacy amplification with asymptotically optimal entropy loss," in STOC10, 2010, pp. 785-794.
-
STOC10, 2010
, pp. 785-794
-
-
Chandran, N.1
Kanukurthi, B.2
Ostrovsky, R.3
Reyzin, L.4
-
9
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
B. Chor and O. Goldreich, "Unbiased bits from sources of weak randomness and probabilistic communication complexity," SIAM Journal on Computing, vol. 17, no. 2, pp. 230-261, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
10
-
-
52149090133
-
An improved robust fuzzy extractor
-
B. Kanukurthi and L. Reyzin, "An improved robust fuzzy extractor," in SCN, 2008, pp. 156-171.
-
(2008)
SCN
, pp. 156-171
-
-
Kanukurthi, B.1
Reyzin, L.2
-
11
-
-
84863321730
-
Non-malleable extractors with short seeds and applications to privacy amplification
-
G. Cohen, R. Raz, and G. Segev, "Non-malleable extractors with short seeds and applications to privacy amplification," ECCC Report TR11-096, 2011.
-
(2011)
ECCC Report TR11-096
-
-
Cohen, G.1
Raz, R.2
Segev, G.3
-
12
-
-
84863321325
-
-
Arxiv, Tech. Rep.
-
Y. Dodis, X. Li, T. Wooley, and D. Zuckerman, "Privacy amplification and non-malleable extractors via character sums," Arxiv, Tech. Rep., 2011, http://arxiv.org/abs/1102.5415.
-
(2011)
Privacy Amplification and Non-malleable Extractors Via Character Sums
-
-
Dodis, Y.1
Li, X.2
Wooley, T.3
Zuckerman, D.4
-
13
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM Journal on Computing, vol. 38, pp. 97-139, 2008.
-
(2008)
SIAM Journal on Computing
, vol.38
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
16
-
-
30744451262
-
On extracting private randomness over a public channel
-
Y. Dodis and R. Oliveira, "On extracting private randomness over a public channel," in RANDOM 2003, 2003, pp. 252-263.
-
(2003)
RANDOM 2003
, pp. 252-263
-
-
Dodis, Y.1
Oliveira, R.2
-
18
-
-
0003215121
-
Equations over Finite Fields. An Elementary Approach
-
ser. Springer-Verlag
-
W. Schmidt, Equations over Finite Fields. An Elementary Approach, ser. Lecture Notes in Mathematics. Springer-Verlag, 1976, vol. 536.
-
(1976)
Lecture Notes in Mathematics
, vol.536
-
-
Schmidt, W.1
-
19
-
-
34848820045
-
Simulating independence: New constructions of condensers, Ramsey graphs, dispersers, and extractors
-
B. Barak, G. Kindler, R. Shaltiel, B. Sudakov, and A. Wigderson, "Simulating independence: New constructions of condensers, Ramsey graphs, dispersers, and extractors," in STOC05, 2005, pp. 1-10.
-
STOC05, 2005
, pp. 1-10
-
-
Barak, B.1
Kindler, G.2
Shaltiel, R.3
Sudakov, B.4
Wigderson, A.5
-
20
-
-
34848882226
-
Extractors with weak random seeds
-
R. Raz, "Extractors with weak random seeds," in STOC05, 2005, pp. 11-20.
-
STOC05, 2005
, pp. 11-20
-
-
Raz, R.1
-
21
-
-
43849088675
-
Linear degree extractors and the inapproximability of Max Clique and Chromatic Number
-
D. Zuckerman, "Linear degree extractors and the inapproximability of Max Clique and Chromatic Number,"Theory of Computing, vol. 3, pp. 103-128, 2007.
-
(2007)
Theory of Computing
, vol.3
, pp. 103-128
-
-
Zuckerman, D.1
-
22
-
-
68549120859
-
Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes
-
V. Guruswami, C. Umans, and S. Vadhan, "Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes," Journal of the ACM, vol. 56, no. 4, 2009.
-
(2009)
Journal of the ACM
, vol.56
, Issue.4
-
-
Guruswami, V.1
Umans, C.2
Vadhan, S.3
-
23
-
-
77952402919
-
Extensions to the method of multiplicities, with applications to kakeya sets and mergers
-
Z. Dvir, S. Kopparty, S. Saraf, and M. Sudan, "Extensions to the method of multiplicities, with applications to kakeya sets and mergers," in FOCS09, 2009.
-
FOCS09, 2009
-
-
Dvir, Z.1
Kopparty, S.2
Saraf, S.3
Sudan, M.4
|