The odyssey of entropy: cryptography

B Zolfaghari, K Bibak, T Koshiba - Entropy, 2022 - mdpi.com
After being introduced by Shannon as a measure of disorder and unavailable information,
the notion of entropy has found its applications in a broad range of scientific disciplines. In …

Explicit two-source extractors and resilient functions

E Chattopadhyay, D Zuckerman - Proceedings of the forty-eighth annual …, 2016 - dl.acm.org
We explicitly construct an extractor for two independent sources on n bits, each with
polylogarithmic min-entropy. Our extractor outputs one bit and has polynomially small error …

Two source extractors for asymptotically optimal entropy, and (many) more

X Li - 2023 IEEE 64th Annual Symposium on Foundations of …, 2023 - ieeexplore.ieee.org
A long line of work in the past two decades or so established close connections between
several different pseudorandom objects and applications, including seeded or seedless non …

Non-malleable codes from two-source extractors

S Dziembowski, T Kazana, M Obremski - Annual Cryptology Conference, 2013 - Springer
We construct an efficient information-theoretically non-malleable code in the split-state
model for one-bit messages. Non-malleable codes were introduced recently by …

Improved non-malleable extractors, non-malleable codes and independent source extractors

X Li - Proceedings of the 49th Annual ACM SIGACT …, 2017 - dl.acm.org
In this paper we give improved constructions of several central objects in the literature of
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …

Non-malleable extractors and codes, with their many tampered extensions

E Chattopadhyay, V Goyal, X Li - Proceedings of the forty-eighth annual …, 2016 - dl.acm.org
Randomness extractors and error correcting codes are fundamental objects in computer
science. Recently, there have been several natural generalizations of these objects, in the …

Non-malleable coding against bit-wise and split-state tampering

M Cheraghchi, V Guruswami - Journal of Cryptology, 2017 - Springer
Non-malleable coding, introduced by Dziembowski et al.(ICS 2010), aims for protecting the
integrity of information against tampering attacks in situations where error detection is …

FlexIO: I/O middleware for location-flexible scientific data analytics

F Zheng, H Zou, G Eisenhauer… - 2013 IEEE 27th …, 2013 - ieeexplore.ieee.org
Increasingly severe I/O bottlenecks on High-End Computing machines are prompting
scientists to process simulation output data online while simulations are running and before …

Non-malleable extractors and non-malleable codes: Partially optimal constructions

X Li - arXiv preprint arXiv:1804.04005, 2018 - arxiv.org
The recent line of study on randomness extractors has been a great success, resulting in
exciting new techniques, new connections, and breakthroughs to long standing open …

Overcoming weak expectations

Y Dodis, Y Yu - Theory of Cryptography Conference, 2013 - Springer
Recently, there has been renewed interest in basing cryptographic primitives on weak
secrets, where the only information about the secret is some non-trivial amount of (min-) …