The entropy universe

M Ribeiro, T Henriques, L Castro, A Souto, L Antunes… - Entropy, 2021 - mdpi.com
About 160 years ago, the concept of entropy was introduced in thermodynamics by Rudolf
Clausius. Since then, it has been continually extended, interpreted, and applied by …

[PDF][PDF] A proposal for: Functionality classes for random number generators

W Killmann, W Schindler - ser. BDI, Bonn, 2011 - cosec.bit.uni-bonn.de
1 Random Number Generators (RNG) are incorporated in many IT products and play an
important role in numerous cryptographic applications. However, the Information …

Leftover hash lemma, revisited

B Barak, Y Dodis, H Krawczyk, O Pereira… - Annual Cryptology …, 2011 - Springer
Abstract The famous Leftover Hash Lemma (LHL) states that (almost) universal hash
functions are good randomness extractors. Despite its numerous applications, LHL-based …

Efficient selective identity-based encryption without random oracles

D Boneh, X Boyen - Journal of Cryptology, 2011 - Springer
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-
identity security reductions without random oracles in groups equipped with a bilinear map …

Security of the J-PAKE password-authenticated key exchange protocol

M Abdalla, F Benhamouda… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
J-PAKE is an efficient password-authenticated key exchange protocol that is included in the
Open SSL library and is currently being used in practice. We present the first proof of …

Pseudorandom functions and permutations provably secure against related-key attacks

M Bellare, D Cash - Annual Cryptology Conference, 2010 - Springer
This paper fills an important foundational gap with the first proofs, under standard
assumptions and in the standard model, of the existence of PRFs and PRPs resisting rich …

The interplay between error, total variation, alpha-entropy and guessing: Fano and Pinsker direct and reverse inequalities

O Rioul - Entropy, 2023 - mdpi.com
Using majorization theory via “Robin Hood” elementary operations, optimal lower and upper
bounds are derived on Rényi and guessing entropies with respect to either error probability …

Efficient, secure, private distance bounding without key updates

J Hermans, R Peeters, C Onete - … of the sixth ACM conference on …, 2013 - dl.acm.org
We propose a new distance bounding protocol, which builds upon the private RFID
authentication protocol by Peeters and Hermans [25]. In contrast to most distance-bounding …

Prover anonymous and deniable distance-bounding authentication

S Gambs, C Onete, JM Robert - Proceedings of the 9th ACM symposium …, 2014 - dl.acm.org
In distance-bounding authentication protocols, a verifier assesses that a prover is (1)
legitimate and (2) in the verifier's proximity. Proximity checking is done by running time …

Rate-1 incompressible encryption from standard assumptions

P Branco, N Döttling, J Dujmović - Theory of Cryptography Conference, 2022 - Springer
Incompressible encryption, recently proposed by Guan, Wichs and Zhandry
(EUROCRYPT'22), is a novel encryption paradigm geared towards providing strong long …