We explicitly construct an extractor for two independent sources on n bits, each with polylogarithmic min-entropy. Our extractor outputs one bit and has polynomially small error …
X Li - 2023 IEEE 64th Annual Symposium on Foundations of …, 2023 - ieeexplore.ieee.org
A long line of work in the past two decades or so established close connections between several different pseudorandom objects and applications, including seeded or seedless non …
We construct an efficient information-theoretically non-malleable code in the split-state model for one-bit messages. Non-malleable codes were introduced recently by …
X Li - Proceedings of the 49th Annual ACM SIGACT …, 2017 - dl.acm.org
In this paper we give improved constructions of several central objects in the literature of randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …
Randomness extractors and error correcting codes are fundamental objects in computer science. Recently, there have been several natural generalizations of these objects, in the …
Non-malleable coding, introduced by Dziembowski et al.(ICS 2010), aims for protecting the integrity of information against tampering attacks in situations where error detection is …
F Zheng, H Zou, G Eisenhauer… - 2013 IEEE 27th …, 2013 - ieeexplore.ieee.org
Increasingly severe I/O bottlenecks on High-End Computing machines are prompting scientists to process simulation output data online while simulations are running and before …
X Li - arXiv preprint arXiv:1804.04005, 2018 - arxiv.org
The recent line of study on randomness extractors has been a great success, resulting in exciting new techniques, new connections, and breakthroughs to long standing open …
Y Dodis, Y Yu - Theory of Cryptography Conference, 2013 - Springer
Recently, there has been renewed interest in basing cryptographic primitives on weak secrets, where the only information about the secret is some non-trivial amount of (min-) …