Two-source extractors for leaky sources
暂无分享,去创建一个
Haifeng Qian | Xiangxue Li | Yu Yu | Hai-feng Qian | Xiangxue Li | Yu Yu
[1] Ran Raz,et al. Improved Randomness Extraction from Two Independent Sources , 2004, APPROX-RANDOM.
[2] David Zuckerman,et al. Deterministic extractors for small-space sources , 2011, J. Comput. Syst. Sci..
[3] R. Ostrovsky,et al. Smooth Histograms for Sliding Windows , 2007, FOCS 2007.
[4] Jaikumar Radhakrishnan,et al. Bounds for Dispersers, Extractors, and Depth-Two Superconcentrators , 2000, SIAM J. Discret. Math..
[5] Salil P. Vadhan,et al. Pseudorandomness , 2012, Found. Trends Theor. Comput. Sci..
[6] Noam Nisan,et al. Randomness is Linear in Space , 1996, J. Comput. Syst. Sci..
[7] Stefan Dziembowski,et al. Leakage-Resilient Storage , 2010, SCN.
[8] Oded Goldreich,et al. The bit extraction problem or t-resilient functions , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[9] Yael Tauman Kalai,et al. 2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[10] Guy Kindler,et al. Simulating independence: new constructions of condensers, ramsey graphs, dispersers, and extractors , 2005, STOC '05.
[11] Allison Bishop,et al. Storing Secrets on Continually Leaky Devices , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[12] Shai Halevi,et al. After-the-Fact Leakage in Public-Key Encryption , 2011, IACR Cryptol. ePrint Arch..
[13] Anup Rao,et al. A 2-Source Almost-Extractor for Linear Entropy , 2008, APPROX-RANDOM.
[14] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[15] Hugo Krawczyk,et al. Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes , 2004, CRYPTO.
[16] J. Bourgain,et al. MORE ON THE SUM-PRODUCT PHENOMENON IN PRIME FIELDS AND ITS APPLICATIONS , 2005 .
[17] L. Fortnow,et al. Recent Developments in Explicit Constructions of Extractors , 2002, Bull. EATCS.
[18] Avi Wigderson,et al. 2-source dispersers for sub-polynomial entropy and Ramsey graphs beating the Frankl-Wilson construction , 2006, STOC '06.
[19] Hugo Krawczyk,et al. Cryptographic Extraction and Key Derivation: The HKDF Scheme , 2010, IACR Cryptol. ePrint Arch..
[20] Avi Wigderson,et al. Extractors: optimal up to constant factors , 2003, STOC '03.
[21] Avi Wigderson,et al. Extracting randomness using few independent sources , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[22] Jean Bourgain,et al. On the Construction of Affine Extractors , 2007 .
[23] Stefan Dziembowski,et al. Intrusion-Resilient Secret Sharing , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[24] David Zuckerman,et al. DETERMINISTIC EXTRACTORS FOR BIT-FIXING SOURCES AND EXPOSURE-RESILIENT CRYPTOGRAPHY , 2003 .
[25] Yael Tauman Kalai,et al. Leakage-resilient coin tossing , 2011, Distributed Computing.
[26] Ronen Shaltiel,et al. An Introduction to Randomness Extractors , 2011, ICALP.
[27] Avi Wigderson,et al. Extractors And Rank Extractors For Polynomial Sources , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[28] Oded Goldreich,et al. Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..
[29] Luca Trevisan,et al. Extracting randomness from samplable distributions , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[30] Anup Rao,et al. Extractors for a constant number of polynomially small min-entropy independent sources , 2006, STOC '06.
[31] Enkatesan G Uruswami. Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes , 2008 .
[32] Ran Raz,et al. Extractors with weak random seeds , 2005, STOC '05.