搜索结果: 1-5 共查到“军队指挥学 Randomness extraction”相关记录5条 . 查询时间(0.062 秒)
Randomness Extraction in finite fields $\mathbb{F}_{p^{n}}$
Finite fields Polya-Vinogradov inequality Winterhof inequality exponential sums incomplete character sums Deterministic extractor Decisional Diffie-Hellman random bit-string key exchange leftover hash lemma
font style='font-size:12px;'>
2012/3/21
Many technics for randomness extraction over finite fields was proposed by various authors such as Fouque \emph{et al.} and Carneti \emph{et al.}. At eurocrypt'09, these previous works was improved by...
Randomness Extraction in finite fields $\mathbb{F}_{p^{n}}$
Finite fields Polya-Vinogradov inequality Winterhof inequality exponential sums incomplete character sums Deterministic extractor Decisional Diffie-Hellman random bit-string, key exchange leftover hash lemma
font style='font-size:12px;'>
2012/3/23
Many technics for randomness extraction over finite fields was proposed by various authors such as Fouque \emph{et al.} and Carneti \emph{et al.}. At eurocrypt'09, these previous works was improved by...
A New Randomness Extraction Paradigm for Hybrid Encryption
Chosen-ciphertext security hybrid encryption randomness extraction
font style='font-size:12px;'>
2009/6/5
We present a new approach to the design of IND-CCA2 secure hybrid encryption schemes
in the standard model. Our approach provides an efficient generic transformation from
1-universal to 2-universal ...
Key Derivation and Randomness Extraction
Randomness extractors Key derivation Elliptic curve
font style='font-size:12px;'>
2009/1/19
Key derivation refers to the process by which an agreed upon large random number, often named master secret, is used to derive keys to encrypt and authenticate data. Practitioners and standardization ...
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker
Randomness Extraction Delta-Biased Masking Quantum Attacker
font style='font-size:12px;'>
2008/8/19
Randomness extraction is of fundamental importance for information-theoretic cryptography.It allows to transform a raw key about which an attacker has some limited knowledge into a fully secure random...