Constructing locally computable extractors and cryptosystems in the bounded-storage model

From MaRDI portal
Publication:1879468

DOI10.1007/s00145-003-0237-xzbMath1071.94016OpenAlexW2104965768MaRDI QIDQ1879468

Salil P. Vadhan

Publication date: 22 September 2004

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-003-0237-x




Related Items (28)

How to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\)Separating adaptive streaming from oblivious streaming using the bounded storage modelProvable time-memory trade-offs: symmetric cryptography against memory-bounded adversariesBitwise Quantum Min-Entropy Sampling and New Lower Bounds for Random Access CodesSecure Computation from Leaky Correlated RandomnessRandom oracles and non-uniformityAuthentication in the bounded storage modelInfeasibility of instance compression and succinct PCPs for NPEfficient and Provable White-Box PrimitivesSpeak much, remember little: cryptography in the bounded storage model, revisitedNonmalleable Extractors and Codes, with Their Many Tampered ExtensionsBounded-Retrieval Model with Keys Derived from Private DataLong term confidentiality: a surveyInnovative approaches for security of small artefactsDeterministic extractors for small-space sourcesEfficient Error-Correcting Codes for Sliding WindowsIncremental deterministic public-key encryptionUnconditional UC-Secure Computation with (Stronger-Malicious) PUFsA Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage SchemesSimple extractors via constructions of cryptographic pseudo-random generatorsUnnamed ItemExplicit list-decodable codes with optimal rate for computationally bounded channelsExtractors and Lower Bounds for Locally Samplable SourcesA Leakage-Resilient Mode of OperationNon-interactive timestamping in the bounded-storage modelFine-Grained CryptographyBig-Key Symmetric Encryption: Resisting Key ExfiltrationAdditive Combinatorics: With a View Towards Computer Science and Cryptography—An Exposition




This page was built for publication: Constructing locally computable extractors and cryptosystems in the bounded-storage model