The following pages link to How Leaky Is an Extractor? (Q3584989):
Displaying 3 items.
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives (Q726335) (← links)
- On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages (Q2946470) (← links)