First Page | Document Content | |
---|---|---|
Date: 2014-07-24 05:23:52Cryptography Message authentication codes Pseudorandom function family Pseudorandomness Error detection and correction Hash-based message authentication code Advantage Randomness extractor | The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into aAdd to Reading ListSource URL: pub.ist.ac.atDownload Document from Source WebsiteFile Size: 529,52 KBShare Document on Facebook |
Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream∗ Michael Mitzenmacher† Salil Vadhan‡ School of Engineering & Applied Sciences Harvard UniversityDocID: 1r5sy - View Document | |
Why Simple Hash Functions Work: Exploiting the Entropy in a Data StreamDocID: 1qUBE - View Document | |
Lossless Condensers, Unbalanced Expanders, and Extractors Amnon Ta-Shma∗ Christopher Umans† David Zuckerman‡DocID: 1qPOU - View Document | |
Simple Extractors for All Min-Entropies and a New Pseudorandom Generator∗ Ronen Shaltiel † Christopher Umans ‡DocID: 1qB1P - View Document | |
LNCSOur Data, Ourselves: Privacy Via Distributed Noise GenerationDocID: 1pOcL - View Document |