The following pages link to Theory of Cryptography (Q5898368):
Displayed 19 items.
- On linear-size pseudorandom generators and hardcore functions (Q744085) (← links)
- Cryptography with constant input locality (Q1037233) (← links)
- Channels of small log-ratio leakage and characterization of two-party differentially private computation (Q2175926) (← links)
- Pseudorandom generators from regular one-way functions: new constructions with improved parameters (Q2513673) (← links)
- On the complexity of constructing pseudorandom functions (especially when they don't exist) (Q2516523) (← links)
- Simple constructions from (almost) regular one-way functions (Q2697872) (← links)
- A New Pseudorandom Generator from Collision-Resistant Hash Functions (Q2890004) (← links)
- Multi-input Functional Encryption with Unbounded-Message Security (Q2953788) (← links)
- Evaluating Entropy for True Random Number Generators: Efficient, Robust and Provably Secure (Q2980880) (← links)
- Pseudoentropy: Lower-Bounds for Chain Rules and Transformations (Q3179357) (← links)
- On Nonadaptive Reductions to the Set of Random Strings and Its Dense Subsets (Q3297825) (← links)
- A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch (Q3408197) (← links)
- Shannon Entropy Versus Renyi Entropy from a Cryptographic Viewpoint (Q3460111) (← links)
- The Many Entropies in One-Way Functions (Q5021132) (← links)
- (Q5121911) (← links)
- Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols (Q5138779) (← links)
- Basing Weak Public-Key Cryptography on Strong One-Way Functions (Q5445498) (← links)
- (Q6084358) (← links)
- Paradigms for Unconditional Pseudorandom Generators (Q6149335) (← links)