Pseudoentropy has found a lot of important applications to cryptography and complexity theory. In this paper we focus on the foundational problem that has not been investigated so far, namely by how much pseudoentropy (the amount seen by computationally bounded attackers) differs from its information-theoretic counterpart (seen by unbounded observers), given certain limits on attacker’s computational power? We provide the following answer for HILL pseudoentropy, which exhibits a threshold behavior around the size exponential in the entropy amount:– If the attacker size (s) and advantage () satisfy s (formula presented) where k is the claimed amount of pseudoentropy, then the pseudoentropy boils down to the information-theoretic smooth entrop...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
Abstract. Hardcore lemmas are results in complexity theory which state that average-case hardness mu...
A central problem in cryptography is the construction of basic \textit{primitives}, or low-level alg...
Abstract. Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, incl...
We provide a characterization of pseudoentropy in terms of hardness of sampling: Let (X,B) be jointl...
Computationalnotionsofentropy(a.k.a.pseudoentropy)have found many applications, including leakage-re...
Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, including leak...
Abstract. HILL Entropy and Metric Entropy are generalizations of the information-theoretic notion of...
There are two popular ways to measure computational entropy in cryptography: (HILL) pseudoentropy an...
We consider the task of deriving a key with high HILL entropy (i.e., being computationally indisting...
Abstract. Hardcore lemmas are results in complexity theory which state that average-case hardness mu...
De, Trevisan and Tulsiani [CRYPTO 2010] show that every distribution over n-bit strings which has co...
De, Trevisan and Tulsiani [CRYPTO 2010] show that every distribution over n-bit strings which has co...
We discuss measures of statistical uncertainty relevant to determining random values in cryptology. ...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
Abstract. Hardcore lemmas are results in complexity theory which state that average-case hardness mu...
A central problem in cryptography is the construction of basic \textit{primitives}, or low-level alg...
Abstract. Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, incl...
We provide a characterization of pseudoentropy in terms of hardness of sampling: Let (X,B) be jointl...
Computationalnotionsofentropy(a.k.a.pseudoentropy)have found many applications, including leakage-re...
Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, including leak...
Abstract. HILL Entropy and Metric Entropy are generalizations of the information-theoretic notion of...
There are two popular ways to measure computational entropy in cryptography: (HILL) pseudoentropy an...
We consider the task of deriving a key with high HILL entropy (i.e., being computationally indisting...
Abstract. Hardcore lemmas are results in complexity theory which state that average-case hardness mu...
De, Trevisan and Tulsiani [CRYPTO 2010] show that every distribution over n-bit strings which has co...
De, Trevisan and Tulsiani [CRYPTO 2010] show that every distribution over n-bit strings which has co...
We discuss measures of statistical uncertainty relevant to determining random values in cryptology. ...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
Existing proofs that deduce BPP=P from circuit lower bounds convert randomized algorithms into deter...
Abstract. Hardcore lemmas are results in complexity theory which state that average-case hardness mu...
A central problem in cryptography is the construction of basic \textit{primitives}, or low-level alg...