投射 发表于 2025-3-26 21:51:40
http://reply.papertrans.cn/47/4658/465745/465745_31.png祝贺 发表于 2025-3-27 04:01:25
http://reply.papertrans.cn/47/4658/465745/465745_32.png同步左右 发表于 2025-3-27 05:59:18
Metric Pseudoentropy: Characterizations, Transformations and Applications, many cryptographic applications, like leakage-resilient cryptography, deterministic encryption or memory delegation. In this paper we develop a general method to characterize metric-type computational variants of entropy, in a way depending only on properties of a chosen class of test functions (adPastry 发表于 2025-3-27 12:02:58
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications twhere the given problem is extremely hard. They find important applications in hardness amplification. In this paper we revisit the following two fundamental results:.Using only the standard min-max theorem and some basic facts about convex approximations in .. spaces, we provide alternative modular发起 发表于 2025-3-27 14:40:30
Gambling, Computational Information and Encryption Security,ided an affirmative answer, using a compression-based notion of computational information to give a characterization equivalent to the standard computational notion of semantic security. We give two other equivalent characterizations. The first uses a computational formulation of Kelly’s (1957) modeCritical 发表于 2025-3-27 21:48:56
Query-Complexity Amplification for Random Oracles,ployed for example in password-based cryptographic schemes to impede brute-force attacks, and also in so-called proofs of work (used in protocols like Bitcoin) to show that a certain amount of computation was performed by a legitimate user. A natural approach to adjust the complexity of a hash functLiving-Will 发表于 2025-3-28 01:25:46
The Chaining Lemma and Its Application,rce distribution .. with high min-entropy and a number (say, . in total) of arbitrary functions (..,...,..) which are applied in succession to that source to generate the chain ........... ... . Intuitively, the Chaining Lemma guarantees that, if the chain is not too long, then either (i) the entireAxon895 发表于 2025-3-28 03:07:28
http://reply.papertrans.cn/47/4658/465745/465745_38.pngIschemia 发表于 2025-3-28 08:22:55
http://reply.papertrans.cn/47/4658/465745/465745_39.png圆锥体 发表于 2025-3-28 10:53:32
http://reply.papertrans.cn/47/4658/465745/465745_40.png