نتایج جستجو برای: extractors

تعداد نتایج: 1871  

Journal: :SOUTHERN BRAZILIAN JOURNAL OF CHEMISTRY 1999

Journal: :Information and Computation 2020

2010
Marius Zimand

We present characterizations of extractors and Kolmogorov extractors in terms of a combinatorial object called balanced table. These characterizations provide an alternative proof for the relation between extractors and Kolmogorov extractors, first obtained in [FHP06] and [HPV09].

Journal: :Chemie Ingenieur Technik 2020

Journal: :Bulletin of the EATCS 2002
Ronen Shaltiel

Extractors are functions which are able to “extract” random bits from arbitrary distributions which “contain” sufficient randomness. Explicit constructions of extractors have many applications in complexity theory and combinatorics. This manuscript is a survey of recent developments in extractors and focuses on explicit constructions of extractors following Trevisan’s breakthrough result [Tre99].

Journal: :SIAM Journal on Computing 2014

Journal: :Anaesthesia and Intensive Care 1975

2011
Ronen Shaltiel

We give an introduction to the area of “randomness extraction” and survey the main concepts of this area: deterministic extractors, seeded extractors and multiple sources extractors. For each one we briefly discuss background, definitions, explicit constructions and applications.

Journal: :IACR Cryptology ePrint Archive 2011
Dana Dachman-Soled Rosario Gennaro Hugo Krawczyk Tal Malkin

Computational extractors are efficient procedures that map a source of sufficiently high min-entropy to an output that is computationally indistinguishable from uniform. By relaxing the statistical closeness property of traditional randomness extractors one hopes to improve the efficiency and entropy parameters of these extractors, while keeping their utility for cryptographic applications. In ...

Journal: :IACR Cryptology ePrint Archive 2017
Georg T. Becker

Fuzzy extractors have been proposed in 2004 by Dodis et al. as a secure way to generate cryptographic keys from noisy sources. In recent years, fuzzy extractors have become an important building block in hardware security due to their use in secure key generation based on Physical Unclonable Functions (PUFs). Fuzzy extractors are provably secure against passive attackers. A year later Boyen et ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید