Results (9)

  • Inverted leftover hash lemma
    Conference paper
  • Simulating auxiliary inputs, revisited
    Conference paper
  • Renyi entropy estimation revisited
    Conference paper
  • Non uniform attacks against pseudoentropy
    Conference paper
  • A cryptographic view of regularity lemmas: Simpler unified proofs and refined bounds
    Conference paper
  • On the complexity of breaking pseudoentropy
    Conference paper
  • The chain rule for HILL pseudoentropy, revisited
    Conference paper
  • Condensed unpredictability
    Conference paper