Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors
暂无分享,去创建一个
[1] Noam Nisan,et al. Extracting randomness: how and why. A survey , 1996, Proceedings of Computational Complexity (Formerly Structure in Complexity Theory).
[2] Ran Raz,et al. On the Distribution of the Number of Roots of Polynomials and Explicit Logspace Extractors , 2000, ICALP Satellite Workshops.
[3] Oded Goldreich,et al. A Sample of Samplers - A Computational Perspective on Sampling (survey) , 1997, Electron. Colloquium Comput. Complex..
[4] Noam Nisan,et al. Randomness is Linear in Space , 1996, J. Comput. Syst. Sci..
[5] Yonatan Aumann,et al. Everlasting security in the bounded storage model , 2002, IEEE Trans. Inf. Theory.
[6] Salil P. Vadhan,et al. On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model , 2003, CRYPTO.
[7] Michael O. Rabin,et al. Hyper-Encryption and Everlasting Security , 2002, STACS.
[8] Zvi Galil,et al. Explicit Constructions of Linear-Sized Superconcentrators , 1981, J. Comput. Syst. Sci..
[9] Alexander Lubotzky,et al. Explicit expanders and the Ramanujan conjectures , 1986, STOC '86.
[10] Mihir Bellare,et al. Free bits, PCPs and non-approximability-towards tight results , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[11] Noga Alon,et al. Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs , 1992, IEEE Trans. Inf. Theory.
[12] Ran Raz,et al. Extracting all the randomness and reducing the error in Trevisan's extractors , 1999, STOC '99.
[13] Oded Goldreich,et al. Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..
[14] Luca Trevisan,et al. Streaming computation of combinatorial objects , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.
[15] Luca Trevisan,et al. Extractors and pseudorandom generators , 2001, JACM.
[16] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .
[17] Ueli Maurer,et al. Tight security proofs for the bounded-storage model , 2002, STOC '02.
[18] Noga Alon,et al. The Probabilistic Method , 2015, Fundamentals of Ramsey Theory.
[19] Ueli Maurer,et al. Unconditional Security Against Memory-Bounded Adversaries , 1997, CRYPTO.
[20] Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher , 2004, Journal of Cryptology.