Improved computational extractors and their applications
From MaRDI portal
Publication:2129010
DOI10.1007/978-3-030-84252-9_19zbMATH Open1486.94115OpenAlexW3192899355MaRDI QIDQ2129010FDOQ2129010
Authors: Dakshita Khurana, Akshayaram Srinivasan
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84252-9_19
Recommendations
- Low error efficient computational extractors in the CRS model
- Computational extractors and pseudorandomness
- New independent source extractors with exponential improvement
- Improved non-malleable extractors, non-malleable codes and independent source extractors
- Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
Cryptography (94A60) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30)
Cites Work
- Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Lossy trapdoor functions and their applications
- MORE ON THE SUM-PRODUCT PHENOMENON IN PRIME FIELDS AND ITS APPLICATIONS
- Separating succinct non-interactive arguments from all falsifiable assumptions
- How to Fake Auxiliary Input
- Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes
- Extractors with weak random seeds
- Improved non-malleable extractors, non-malleable codes and independent source extractors
- 2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness
- Approximation, Randomization, and Combinatorial Optimization.. Algorithms and Techniques
- Non-malleable extractors: new tools and improved constructions
- From Weak to Strong Zero-Knowledge and Applications
- An efficient reduction from two-source to non-malleable extractors: achieving near-logarithmic min-entropy
- Extracting randomness from extractor-dependent sources
- How to extract useful randomness from unreliable sources
- Low error efficient computational extractors in the CRS model
- Multi-source non-malleable extractors and applications
- Local Correlation Breakers and Applications to Three-Source Extractors and Mergers
- Title not available (Why is that?)
- Extractors for adversarial sources via extremal hypergraphs
- Explicit two-source extractors and resilient functions
- Distributed Computing
Cited In (6)
This page was built for publication: Improved computational extractors and their applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2129010)