Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Dodis, Y., Wichs, D.: Non-malleable extractors and symmetric key cryptography from weak secrets. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 601–610 (2009)
2. Li, X.: Non-malleable extractors, two-source extractors and privacy amplification. In: Proceedings of the 53nd Annual IEEE Symposium on Foundations of Computer Science (2012)
3. Li, X.: Design extractors, non-malleable condensers and privacy amplification. In: Proceedings of the 44th Annual ACM Symposium on Theory of Computing (2012)
4. Chandran, N., Kanukurthi, B., Ostrovsky, R., Reyzin, L.: Privacy amplification with asymptotically optimal entropy loss. In: Proceedings of the 42nd Annual ACM Symposium on Theory of Computing, pp. 785–794 (2010)
5. Dodis, Y., Ong, S.J., Prabhakaran, M., Sahai, A.: On the (im)possibility of cryptography with imperfect randomness. In: FOCS 2004, pp. 196–205 (2004)
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Two Source Extractors for Asymptotically Optimal Entropy, and (Many) More;2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS);2023-11-06
2. Extractors for sum of two sources;Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing;2022-06-09
3. Extractors for adversarial sources via extremal hypergraphs;Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing;2020-06-06
4. Nonmalleable Extractors and Codes, with Their Many Tampered Extensions;SIAM Journal on Computing;2020-01
5. Non‐malleable Extractor in the Presence of Classical or Quantum Side Information*;Chinese Journal of Electronics;2019-09