Information-efficient approaches for extracting randomness from imperfect sources have been extensively studied, but simpler and faster ones are required in the high-speed applications of random number generation. In this paper, we focus on linear constructions, namely, applying linear transformation for randomness extraction. We show that linear transformations based on sparse random matrices are asymptotically optimal to extract randomness from independent sources and bit-fixing sources, and they are efficient (may not be optimal) to extract randomness from hidden Markov sources. Further study demonstrates the flexibility of such constructions on source models as well as their excellent information-preserving capabilities. Since linear tr...
Randomness has proved to be a powerful tool in all of computation. It is pervasive in areas such as ...
© International Association for Cryptologic Research 2020. We revisit the well-studied problem of ex...
For more than 30 years, cryptographers have been looking for public sources of uniform randomness in...
Information-efficient approaches for extracting randomness from imperfect sources have been extensiv...
Linear transformations have many applications in information theory, like data compression and error...
Randomness extractors are efficient algorithms which convert weak random sources into nearly perfect...
textThe use of randomized algorithms and protocols is ubiquitous in computer science. Randomized sol...
Randomness is crucial to computer science, both in theory and applications. In complexity theory, ra...
Randomness extractors, which extract high quality (almost-uniform) random bits from biased random so...
Abstract—In this paper, we consider the task of deterministically extracting randomness from sources...
Secret key extraction, the task of extracting a secret key from shared information that is partially...
We study the problem of extracting a prescribed number of random bits by reading the smallest possib...
A “randomness extractor” is an algorithm that given a sample from a distribution with sufficiently h...
We deal with the problem of extracting as much randomness as possible from a defective random source...
In this thesis we study the problem of extracting almost truly random bits from imperfect sources of...
Randomness has proved to be a powerful tool in all of computation. It is pervasive in areas such as ...
© International Association for Cryptologic Research 2020. We revisit the well-studied problem of ex...
For more than 30 years, cryptographers have been looking for public sources of uniform randomness in...
Information-efficient approaches for extracting randomness from imperfect sources have been extensiv...
Linear transformations have many applications in information theory, like data compression and error...
Randomness extractors are efficient algorithms which convert weak random sources into nearly perfect...
textThe use of randomized algorithms and protocols is ubiquitous in computer science. Randomized sol...
Randomness is crucial to computer science, both in theory and applications. In complexity theory, ra...
Randomness extractors, which extract high quality (almost-uniform) random bits from biased random so...
Abstract—In this paper, we consider the task of deterministically extracting randomness from sources...
Secret key extraction, the task of extracting a secret key from shared information that is partially...
We study the problem of extracting a prescribed number of random bits by reading the smallest possib...
A “randomness extractor” is an algorithm that given a sample from a distribution with sufficiently h...
We deal with the problem of extracting as much randomness as possible from a defective random source...
In this thesis we study the problem of extracting almost truly random bits from imperfect sources of...
Randomness has proved to be a powerful tool in all of computation. It is pervasive in areas such as ...
© International Association for Cryptologic Research 2020. We revisit the well-studied problem of ex...
For more than 30 years, cryptographers have been looking for public sources of uniform randomness in...