Author:
Bosley Carl,Dodis Yevgeniy
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Andreev, A., Clementi, A., Rolim, J., Trevisan, L.: Dispersers, deterministic amplification, and weak random sources. SIAM J. on Computing 28(6), 2103–2116 (1999)
2. Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. on Computing 17(2), 230–261 (1988)
3. Dodis, Y.: Exposure-Resilient Cryptography (PhD Thesis). MIT PhD Thesis (2000)
4. Dodis, Y., Ong, S.J., Prabhakaran, M., Sahai, A.: On the (im)possibility of cryptography with imperfect randomness. In: Proc. 45th IEEE FOCS, pp. 196–205. IEEE Computer Society Press, Los Alamitos (2004)
5. Dodis, Y., Pietrzak, K., Przydatek, B.: Separating Sources for Encryption and Secret-Sharing. In: Proc. Theory of Cryptography Conference (TCC), pp. 601–616 (2006)
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献