Abstract. We consider the task of deriving a key with high HILL en-tropy (i.e., being computationally indistinguishable from a key with high min-entropy) from an unpredictable source. Previous to this work, the only known way to transform unpredictability into a key that was indistinguishable from having min-entropy was via pseudorandomness, for example by Goldreich-Levin (GL) hardcore bits. This approach has the inherent limitation that from a source with k bits of unpredictability entropy one can derive a key of length (and thus HILL entropy) at most k − 2 log(1/) bits. In many settings, e.g. when dealing with biometric data, such a 2 log(1/) bit entropy loss in not an option. Our main technical contribution is a theorem that states that...
Abstract. Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, incl...
We discuss measures of statistical uncertainty relevant to determining random values in cryptology. ...
A “randomness extractor” is an algorithm that given a sample from a distribution with sufficiently h...
We consider the task of deriving a key with high HILL entropy (i.e., being computationally indisting...
We consider the task of deriving a key with high HILL entropy (i.e., being computationally indisting...
Most entropy notions H(.) like Shannon or min-entropy satisfy a chain rule stating that for random v...
We revisit the classical problem of converting an imperfect source of randomness into a usable crypt...
We revisit the classical problem of converting an imperfect source of randomness into a usable crypt...
We revisit the classical problem of converting an imperfect source of randomness into a usable crypt...
Computational notions of entropy have recently found many applications, including leakage-resilient ...
Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, including leak...
There are two popular ways to measure computational entropy in cryptography: (HILL) pseudoentropy an...
Abstract. Hardcore lemmas are results in complexity theory which state that average-case hardness mu...
Computationalnotionsofentropy(a.k.a.pseudoentropy)have found many applications, including leakage-re...
Abstract. HILL Entropy and Metric Entropy are generalizations of the information-theoretic notion of...
Abstract. Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, incl...
We discuss measures of statistical uncertainty relevant to determining random values in cryptology. ...
A “randomness extractor” is an algorithm that given a sample from a distribution with sufficiently h...
We consider the task of deriving a key with high HILL entropy (i.e., being computationally indisting...
We consider the task of deriving a key with high HILL entropy (i.e., being computationally indisting...
Most entropy notions H(.) like Shannon or min-entropy satisfy a chain rule stating that for random v...
We revisit the classical problem of converting an imperfect source of randomness into a usable crypt...
We revisit the classical problem of converting an imperfect source of randomness into a usable crypt...
We revisit the classical problem of converting an imperfect source of randomness into a usable crypt...
Computational notions of entropy have recently found many applications, including leakage-resilient ...
Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, including leak...
There are two popular ways to measure computational entropy in cryptography: (HILL) pseudoentropy an...
Abstract. Hardcore lemmas are results in complexity theory which state that average-case hardness mu...
Computationalnotionsofentropy(a.k.a.pseudoentropy)have found many applications, including leakage-re...
Abstract. HILL Entropy and Metric Entropy are generalizations of the information-theoretic notion of...
Abstract. Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, incl...
We discuss measures of statistical uncertainty relevant to determining random values in cryptology. ...
A “randomness extractor” is an algorithm that given a sample from a distribution with sufficiently h...