投射 发表于 2025-3-26 21:51:40

http://reply.papertrans.cn/47/4658/465745/465745_31.png

祝贺 发表于 2025-3-27 04:01:25

http://reply.papertrans.cn/47/4658/465745/465745_32.png

同步左右 发表于 2025-3-27 05:59:18

Metric Pseudoentropy: Characterizations, Transformations and Applications, many cryptographic applications, like leakage-resilient cryptography, deterministic encryption or memory delegation. In this paper we develop a general method to characterize metric-type computational variants of entropy, in a way depending only on properties of a chosen class of test functions (ad

Pastry 发表于 2025-3-27 12:02:58

Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications twhere the given problem is extremely hard. They find important applications in hardness amplification. In this paper we revisit the following two fundamental results:.Using only the standard min-max theorem and some basic facts about convex approximations in .. spaces, we provide alternative modular

发起 发表于 2025-3-27 14:40:30

Gambling, Computational Information and Encryption Security,ided an affirmative answer, using a compression-based notion of computational information to give a characterization equivalent to the standard computational notion of semantic security. We give two other equivalent characterizations. The first uses a computational formulation of Kelly’s (1957) mode

Critical 发表于 2025-3-27 21:48:56

Query-Complexity Amplification for Random Oracles,ployed for example in password-based cryptographic schemes to impede brute-force attacks, and also in so-called proofs of work (used in protocols like Bitcoin) to show that a certain amount of computation was performed by a legitimate user. A natural approach to adjust the complexity of a hash funct

Living-Will 发表于 2025-3-28 01:25:46

The Chaining Lemma and Its Application,rce distribution .. with high min-entropy and a number (say, . in total) of arbitrary functions (..,...,..) which are applied in succession to that source to generate the chain ........... ... . Intuitively, the Chaining Lemma guarantees that, if the chain is not too long, then either (i) the entire

Axon895 发表于 2025-3-28 03:07:28

http://reply.papertrans.cn/47/4658/465745/465745_38.png

Ischemia 发表于 2025-3-28 08:22:55

http://reply.papertrans.cn/47/4658/465745/465745_39.png

圆锥体 发表于 2025-3-28 10:53:32

http://reply.papertrans.cn/47/4658/465745/465745_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Information Theoretic Security; 8th International Co Anja Lehmann,Stefan Wolf Conference proceedings 2015 Springer International Publishing