The famous Leftover Hash Lemma (LHL) states that (almost) universal hash functions are good randomness extractors. Despite its numerous applications, LHL-based extractors suffer from the following two limitations: • Large Entropy Loss: to extract v bits from distribution X of min-entropy m which are ε-close to uniform, one must set v ≤ m − 2 log (1/ε), meaning that the entropy loss L def = m − v ≥ 2 log (1/ε). For many applications, such entropy loss is too large. • Large Seed Length: the seed length n of (almost) universal hash function required by the LHL must be at least n ≥ min(u − v, v + 2 log (1/ε))−O(1), where u is the length of the source, and must grow with the number of extracted bits. Quite surprisingly, we show that both limitat...
We initiate a study of randomness condensers for sources that are efficiently samplable but may depe...
Abstract. Recently, there has been renewed interest in basing crypto-graphic primitives on weak secr...
© International Association for Cryptologic Research 2020. We revisit the well-studied problem of ex...
The famous Leftover Hash Lemma (LHL) states that (almost) universal hash functions are good randomne...
Barak et al. showed how to significantly reduce the entropy loss, which is necessary in general, in ...
Extraction of uniform randomness from (noisy) non-uniform sources is an important primitive in many ...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input ...
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input ...
AbstractExtraction of uniform randomness from (noisy) non-uniform sources is an important primitive ...
We revisit the classical problem of converting an imperfect source of randomness into a usable crypt...
We revisit the classical problem of converting an imperfect source of randomness into a usable crypt...
We show that a randomly chosen linear map over a finite field gives a good hash function in the $\el...
In this paper, we give explicit constructions of extractors which work for a source of any min-entro...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
We initiate a study of randomness condensers for sources that are efficiently samplable but may depe...
Abstract. Recently, there has been renewed interest in basing crypto-graphic primitives on weak secr...
© International Association for Cryptologic Research 2020. We revisit the well-studied problem of ex...
The famous Leftover Hash Lemma (LHL) states that (almost) universal hash functions are good randomne...
Barak et al. showed how to significantly reduce the entropy loss, which is necessary in general, in ...
Extraction of uniform randomness from (noisy) non-uniform sources is an important primitive in many ...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input ...
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input ...
AbstractExtraction of uniform randomness from (noisy) non-uniform sources is an important primitive ...
We revisit the classical problem of converting an imperfect source of randomness into a usable crypt...
We revisit the classical problem of converting an imperfect source of randomness into a usable crypt...
We show that a randomly chosen linear map over a finite field gives a good hash function in the $\el...
In this paper, we give explicit constructions of extractors which work for a source of any min-entro...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
We initiate a study of randomness condensers for sources that are efficiently samplable but may depe...
Abstract. Recently, there has been renewed interest in basing crypto-graphic primitives on weak secr...
© International Association for Cryptologic Research 2020. We revisit the well-studied problem of ex...