The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input with sufficiently high entropy is almost uniformly random. In its standard formulation, the lemma refers to a notion of randomness that is (usually implicitly) defined with respect to classical side information. Here, a strictly more general version of the Leftover Hash Lemma that is valid even if side information is represented by the state of a quantum system is shown. Our result applies to almost two-universal families of hash functions. The generalized Leftover Hash Lemma has applications in cryptography, e.g., for key agreement in the presence of an adversary who is not restricted to classical information processing
A quantum encryption scheme (also called private quantum channel, or state randomization protocol) ...
The aim of this tutorial article is to provide an introduction to methods based on universal hashing...
Oblivious Transfer (OT) is a major primitive for secure multiparty computation. Indeed, combined wit...
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input ...
The famous Leftover Hash Lemma (LHL) states that (almost) universal hash functions are good randomne...
Extraction of uniform randomness from (noisy) non-uniform sources is an important primitive in many ...
Modern quantum technologies are NISQ (Noisy Intermediate-Scale Quantum) devices, which are used to c...
The research covered in this thesis is dedicated to provable post-quantum security of hash functions...
The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 ...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2008.In title on title...
Randomness extraction is of fundamental importance for information-theoretic cryptography. It allow...
Game-playing proofs constitute a powerful framework for classical cryptographic security arguments, ...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
Randomness is a defining element of mixing processes in nature and an essential ingredient to many p...
A quantum encryption scheme (also called private quantum channel, or state randomization protocol) ...
The aim of this tutorial article is to provide an introduction to methods based on universal hashing...
Oblivious Transfer (OT) is a major primitive for secure multiparty computation. Indeed, combined wit...
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input ...
The famous Leftover Hash Lemma (LHL) states that (almost) universal hash functions are good randomne...
Extraction of uniform randomness from (noisy) non-uniform sources is an important primitive in many ...
Modern quantum technologies are NISQ (Noisy Intermediate-Scale Quantum) devices, which are used to c...
The research covered in this thesis is dedicated to provable post-quantum security of hash functions...
The thesis starts with a high-level introduction into cryptography and quantum mechanics. Chapter 2 ...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2008.In title on title...
Randomness extraction is of fundamental importance for information-theoretic cryptography. It allow...
Game-playing proofs constitute a powerful framework for classical cryptographic security arguments, ...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
Randomness is a defining element of mixing processes in nature and an essential ingredient to many p...
A quantum encryption scheme (also called private quantum channel, or state randomization protocol) ...
The aim of this tutorial article is to provide an introduction to methods based on universal hashing...
Oblivious Transfer (OT) is a major primitive for secure multiparty computation. Indeed, combined wit...