Universal hashing found a lot of applications in computer science. In cryptography the most important fact about universal families is the so called Leftover Hash Lemma, proved by Impagliazzo, Levin and Luby. In the language of modern cryptography it states that almost universal families are good extractors. In this work we provide a somewhat surprising characterization in the opposite direction. Namely, every extractor with sufficiently good parameters yields a universal family on a noticeable fraction of its inputs. Our proof technique is based on tools from extremal graph theory applied to the ”collision graph” induced by the extractor, and may be of independent interest. We discuss implications for randomness extractors and non-mallea...
AbstractExtraction of uniform randomness from (noisy) non-uniform sources is an important primitive ...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
Abstract. We provide the first standard model construction for a powerful class of Universal Computa...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
The famous Leftover Hash Lemma (LHL) states that (almost) universal hash functions are good randomne...
Extraction of uniform randomness from (noisy) non-uniform sources is an important primitive in many ...
A fuzzy extractor is a security primitive that allows for reproducible extraction of an almost unifo...
Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in compu...
The idea of a universal class of hash functions is due to Carter and Wegman. The goal is to define a...
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input ...
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input ...
Abstract. Universal Computational Extractors (UCEs), introduced by Bellare, Hoang and Keelveedhi (CR...
AbstractWe introduce a method for constructing optimally universal hash families and equivalently RB...
This correspondence is concerned with new connections between source coding and two kinds of familie...
AbstractExtraction of uniform randomness from (noisy) non-uniform sources is an important primitive ...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
Abstract. We provide the first standard model construction for a powerful class of Universal Computa...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
The famous Leftover Hash Lemma (LHL) states that (almost) universal hash functions are good randomne...
Extraction of uniform randomness from (noisy) non-uniform sources is an important primitive in many ...
A fuzzy extractor is a security primitive that allows for reproducible extraction of an almost unifo...
Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in compu...
The idea of a universal class of hash functions is due to Carter and Wegman. The goal is to define a...
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input ...
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input ...
Abstract. Universal Computational Extractors (UCEs), introduced by Bellare, Hoang and Keelveedhi (CR...
AbstractWe introduce a method for constructing optimally universal hash families and equivalently RB...
This correspondence is concerned with new connections between source coding and two kinds of familie...
AbstractExtraction of uniform randomness from (noisy) non-uniform sources is an important primitive ...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
Abstract. We provide the first standard model construction for a powerful class of Universal Computa...