Quantum random number generators

M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important
applications in simulation and cryptography. The inherent randomness at the core of …

Computational complexity: a conceptual perspective

O Goldreich - ACM Sigact News, 2008 - dl.acm.org
This book is rooted in the thesis that complexity theory is extremely rich in conceptual
content, and that this contents should be explicitly communicated in expositions and courses …

Message-locked encryption and secure deduplication

M Bellare, S Keelveedhi, T Ristenpart - … on the theory and applications of …, 2013 - Springer
We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE),
where the key under which encryption and decryption are performed is itself derived from …

[图书][B] Physically unclonable functions: Concept and constructions

R Maes, R Maes - 2013 - Springer
This chapter introduces the reader to the basic concept of a physically unclonable function
or PUF. Many research results on this topic were published over recent years in a variety of …

Differential privacy

C Dwork - International colloquium on automata, languages, and …, 2006 - Springer
In 1977 Dalenius articulated a desideratum for statistical databases: nothing about an
individual should be learnable from the database that cannot be learned without access to …

[图书][B] Computational complexity: a modern approach

S Arora, B Barak - 2009 - books.google.com
This beginning graduate textbook describes both recent achievements and classical results
of computational complexity theory. Requiring essentially no background apart from …

Our data, ourselves: Privacy via distributed noise generation

C Dwork, K Kenthapadi, F McSherry, I Mironov… - Advances in Cryptology …, 2006 - Springer
In this work we provide efficient distributed protocols for generating shares of random noise,
secure against malicious participants. The purpose of the noise generation is to create a …

[图书][B] Information theory: coding theorems for discrete memoryless systems

I Csiszár, J Körner - 2011 - books.google.com
Csiszár and Körner's book is widely regarded as a classic in the field of information theory,
providing deep insights and expert treatment of the key theoretical issues. It includes in …

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, L Reyzin, A Smith - … : International Conference On The Theory And …, 2004 - Springer
We provide formal definitions and efficient secure techniques for turning biometric
information into keys usable for any cryptographic application, and reliably and securely …

Expander graphs and their applications

S Hoory, N Linial, A Wigderson - Bulletin of the American Mathematical …, 2006 - ams.org
But, perhaps, we should start with a few words about graphs in general. They are, of course,
one of the prime objects of study in Discrete Mathematics. However, graphs are among the …