Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, including leakage-resilient cryptography, deterministic encryption or memory delegation. The most important tools to argue about pseudoentropy are chain rules, which quantify by how much (in terms of quantity and quality) the pseudoentropy of a given random variable X decreases when conditioned on some other variable Z (think for example of X as a secret key and Z as information leaked by a side-channel). In this paper we give a very simple and modular proof of the chain rule for HILL pseudoentropy, improving best known parameters. Our version allows for increasing the acceptable length of leakage in applications up to a constant factor compared to the bes...
Abstract. HILL Entropy and Metric Entropy are generalizations of the information-theoretic notion of...
We consider the task of deriving a key with high HILL entropy (i.e., being computationally indisting...
Abstract. We consider the task of deriving a key with high HILL en-tropy (i.e., being computationall...
Computationalnotionsofentropy(a.k.a.pseudoentropy)have found many applications, including leakage-re...
Abstract. Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, incl...
Most entropy notions H(.) like Shannon or min-entropy satisfy a chain rule stating that for random v...
There are two popular ways to measure computational entropy in cryptography: (HILL) pseudoentropy an...
We provide a characterization of pseudoentropy in terms of hardness of sampling: Let (X,B) be jointl...
A chain rule for an entropy notion H(.) states that the entropy H(X) of a variable X decreases by at...
Pseudoentropy has found a lot of important applications to cryptography and complexity theory. In th...
De, Trevisan and Tulsiani [CRYPTO 2010] show that every distribution over n-bit strings which has co...
Computational notions of entropy have recently found many applications, including leakage-resilient ...
De, Trevisan and Tulsiani [CRYPTO 2010] show that every distribution over n-bit strings which has co...
De, Trevisan and Tulsiani [CRYPTO 2010] show that every distribution over n-bit strings which has co...
We investigate how information leakage reduces computational entropy of a random variable X. Recall ...
Abstract. HILL Entropy and Metric Entropy are generalizations of the information-theoretic notion of...
We consider the task of deriving a key with high HILL entropy (i.e., being computationally indisting...
Abstract. We consider the task of deriving a key with high HILL en-tropy (i.e., being computationall...
Computationalnotionsofentropy(a.k.a.pseudoentropy)have found many applications, including leakage-re...
Abstract. Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, incl...
Most entropy notions H(.) like Shannon or min-entropy satisfy a chain rule stating that for random v...
There are two popular ways to measure computational entropy in cryptography: (HILL) pseudoentropy an...
We provide a characterization of pseudoentropy in terms of hardness of sampling: Let (X,B) be jointl...
A chain rule for an entropy notion H(.) states that the entropy H(X) of a variable X decreases by at...
Pseudoentropy has found a lot of important applications to cryptography and complexity theory. In th...
De, Trevisan and Tulsiani [CRYPTO 2010] show that every distribution over n-bit strings which has co...
Computational notions of entropy have recently found many applications, including leakage-resilient ...
De, Trevisan and Tulsiani [CRYPTO 2010] show that every distribution over n-bit strings which has co...
De, Trevisan and Tulsiani [CRYPTO 2010] show that every distribution over n-bit strings which has co...
We investigate how information leakage reduces computational entropy of a random variable X. Recall ...
Abstract. HILL Entropy and Metric Entropy are generalizations of the information-theoretic notion of...
We consider the task of deriving a key with high HILL entropy (i.e., being computationally indisting...
Abstract. We consider the task of deriving a key with high HILL en-tropy (i.e., being computationall...