Randomness is linear in space

From MaRDI portal
Revision as of 14:47, 1 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1915503

DOI10.1006/jcss.1996.0004zbMath0846.68041OpenAlexW2060474153MaRDI QIDQ1915503

David Zuckerman, Noam Nisan

Publication date: 16 July 1996

Published in: Journal of Computer and System Sciences (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/838bfb3c88643b333dd64175c120fd41a9e1077d




Related Items (only showing first 100 items - show all)

Adaptive extractors and their application to leakage resilient secret sharingRobustly reusable fuzzy extractor with imperfect randomnessProvable time-memory trade-offs: symmetric cryptography against memory-bounded adversariesDeterministic Randomness Extraction from Generalized and Distributed Santha-Vazirani SourcesZero-Fixing Extractors for Sub-Logarithmic EntropyNo time to hash: on super-efficient entropy accumulationExtractors for weak random sources and their applicationsLeakage-resilient cryptography from minimal assumptionsFrom Indifferentiability to Constructive Cryptography (and Back)Reproducible Circularly-Secure Bit Encryption: Applications and RealizationsShannon Entropy Versus Renyi Entropy from a Cryptographic ViewpointA generic construction of fuzzy signatureAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceFooling PolytopesDeterministic extractors for affine sources over large fieldsDerandomized constructions of \(k\)-wise (almost) independent permutationsThe entropy of a distributed computation random number generation from memory interleavingPseudorandomness via the Discrete Fourier TransformExtracting Computational Entropy and Learning Noisy Linear FunctionsA modular framework for quantum-proof randomness extractorsAuthentication in the bounded storage modelOur Data, Ourselves: Privacy Via Distributed Noise GenerationDerandomized parallel repetition theorems for free gamesInstantiability of RSA-OAEP under chosen-plaintext attackSimulating BPP using a general weak random sourcePrivacy amplification from non-malleable codesUnifying Leakage Classes: Simulatable Leakage and PseudoentropyPseudorandom generators for combinatorial checkerboardsDeterministic Randomness Extraction from Generalized and Distributed Santha--Vazirani SourcesWhen Are Fuzzy Extractors Possible?Constant time parallel sorting: An empirical view.Smooth projective hashing and two-message oblivious transferUnnamed ItemReproducible circularly secure bit encryption: applications and realizationsExpander graphs and their applicationsSimple Optimal Hitting Sets for Small-Success RLUnnamed ItemLimitations of the Impagliazzo-Nisan-Wigderson pseudorandom generator against permutation branching programsHow to get more mileage from randomness extractorsQuasi chain rule for min-entropyWeak derandomization of weak algorithms: explicit versions of Yao's lemmaBounded-Retrieval Model with Keys Derived from Private DataPseudorandom Pseudo-distributions with Near-Optimal Error for Read-Once Branching ProgramsComputational fuzzy extractorsSecure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKAAn Improved Robust Fuzzy ExtractorIncreasing the Output Length of Zero-Error DispersersDeterministic extractors for small-space sourcesRandomness buys depth for approximate countingImproved Extractors for Recognizable and Algebraic SourcesBounded Independence Plus Noise Fools ProductsPreserving Randomness for Adaptive AlgorithmsAn Introduction to Randomness ExtractorsIncremental deterministic public-key encryptionThe communication complexity of additionOptimal Coin FlippingSimpler session-key generation from short random passwordsOn extractors and exposure‐resilient functions for sublogarithmic entropyPrivacy amplification with asymptotically optimal entropy lossLower bounds for non-black-box zero knowledgeExtractors from Reed-Muller codesExtracting Kolmogorov complexity with applications to dimension zero-one lawsNew approach to practical leakage-resilient public-key cryptographyUnnamed ItemUnnamed ItemUnnamed ItemUnnamed ItemUnnamed ItemContinuous leakage-resilient certificate-based encryptionA Linear Lower Bound on the Communication Complexity of Single-Server Private Information RetrievalExplicit list-decodable codes with optimal rate for computationally bounded channelsOn derandomized composition of Boolean functionsReusable fuzzy extractors for low-entropy distributionsExtracting all the randomness and reducing the error in Trevisan's extractorsReusable fuzzy extractor from the decisional Diffie-Hellman assumptionPseudorandom generators from regular one-way functions: new constructions with improved parametersA unified approach to deterministic encryption: new constructions and a connection to computational entropyExtractors and Lower Bounds for Locally Samplable SourcesOn the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deploymentsKey Agreement from Close Secrets over Unsecured ChannelsExtracting randomness from extractor-dependent sourcesHow to extract useful randomness from unreliable sourcesOn Constructing 1-1 One-Way FunctionsBravely, Moderately: A Common Theme in Four Recent WorksComputational Randomness from Generalized Hardcore SetsPrediction from partial information and hindsight, with application to circuit lower boundsFourier bounds and pseudorandom generators for product testsTypically-correct derandomization for small time and spaceBetter short-seed quantum-proof extractorsBit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal ConstructionBig-Key Symmetric Encryption: Resisting Key ExfiltrationExplicit two-source extractors and resilient functionsUnnamed ItemUnnamed ItemSynthesizers and their application to the parallel construction of pseudo-random functionsIncreasing the output length of zero-error dispersersPerfect $L_p$ Sampling in a Data StreamOn hitting-set generators for polynomials that vanish rarelyNon-malleability against polynomial tamperingQuantum Authentication and Encryption with Key Recycling






This page was built for publication: Randomness is linear in space