Published in: LIPIcs, Volume 230, 3rd Conference on Information-Theoretic Cryptography (ITC 2022)
Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, and Stefano Tessaro. On Seedless PRNGs and Premature Next. In 3rd Conference on Information-Theoretic Cryptography (ITC 2022). Leibniz International Proceedings in Informatics (LIPIcs), Volume 230, pp. 9:1-9:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2022)
@InProceedings{coretti_et_al:LIPIcs.ITC.2022.9,
author = {Coretti, Sandro and Dodis, Yevgeniy and Karthikeyan, Harish and Stephens-Davidowitz, Noah and Tessaro, Stefano},
title = {{On Seedless PRNGs and Premature Next}},
booktitle = {3rd Conference on Information-Theoretic Cryptography (ITC 2022)},
pages = {9:1--9:20},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-238-9},
ISSN = {1868-8969},
year = {2022},
volume = {230},
editor = {Dachman-Soled, Dana},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2022.9},
URN = {urn:nbn:de:0030-drops-164870},
doi = {10.4230/LIPIcs.ITC.2022.9},
annote = {Keywords: seedless PRNGs, pseudorandom number generators, PRNG, Fortuna, premature next}
}
Published in: LIPIcs, Volume 230, 3rd Conference on Information-Theoretic Cryptography (ITC 2022)
Chandranan Dhar, Yevgeniy Dodis, and Mridul Nandi. Revisiting Collision and Local Opening Analysis of ABR Hash. In 3rd Conference on Information-Theoretic Cryptography (ITC 2022). Leibniz International Proceedings in Informatics (LIPIcs), Volume 230, pp. 11:1-11:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2022)
@InProceedings{dhar_et_al:LIPIcs.ITC.2022.11,
author = {Dhar, Chandranan and Dodis, Yevgeniy and Nandi, Mridul},
title = {{Revisiting Collision and Local Opening Analysis of ABR Hash}},
booktitle = {3rd Conference on Information-Theoretic Cryptography (ITC 2022)},
pages = {11:1--11:22},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-238-9},
ISSN = {1868-8969},
year = {2022},
volume = {230},
editor = {Dachman-Soled, Dana},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2022.11},
URN = {urn:nbn:de:0030-drops-164890},
doi = {10.4230/LIPIcs.ITC.2022.11},
annote = {Keywords: ABR hash, collision resistance, local opening}
}
Published in: LIPIcs, Volume 215, 13th Innovations in Theoretical Computer Science Conference (ITCS 2022)
Yevgeniy Dodis, Harish Karthikeyan, and Daniel Wichs. Small-Box Cryptography. In 13th Innovations in Theoretical Computer Science Conference (ITCS 2022). Leibniz International Proceedings in Informatics (LIPIcs), Volume 215, pp. 56:1-56:25, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2022)
@InProceedings{dodis_et_al:LIPIcs.ITCS.2022.56,
author = {Dodis, Yevgeniy and Karthikeyan, Harish and Wichs, Daniel},
title = {{Small-Box Cryptography}},
booktitle = {13th Innovations in Theoretical Computer Science Conference (ITCS 2022)},
pages = {56:1--56:25},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-217-4},
ISSN = {1868-8969},
year = {2022},
volume = {215},
editor = {Braverman, Mark},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2022.56},
URN = {urn:nbn:de:0030-drops-156527},
doi = {10.4230/LIPIcs.ITCS.2022.56},
annote = {Keywords: Block Ciphers, S-Box, Cryptography}
}
Published in: LIPIcs, Volume 199, 2nd Conference on Information-Theoretic Cryptography (ITC 2021)
Yevgeniy Dodis and Kevin Yeo. Doubly-Affine Extractors, and Their Applications. In 2nd Conference on Information-Theoretic Cryptography (ITC 2021). Leibniz International Proceedings in Informatics (LIPIcs), Volume 199, pp. 13:1-13:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2021)
@InProceedings{dodis_et_al:LIPIcs.ITC.2021.13,
author = {Dodis, Yevgeniy and Yeo, Kevin},
title = {{Doubly-Affine Extractors, and Their Applications}},
booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)},
pages = {13:1--13:23},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-197-9},
ISSN = {1868-8969},
year = {2021},
volume = {199},
editor = {Tessaro, Stefano},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.13},
URN = {urn:nbn:de:0030-drops-143320},
doi = {10.4230/LIPIcs.ITC.2021.13},
annote = {Keywords: extractors, information-theoretic privacy, everlasting privacy}
}
Published in: LIPIcs, Volume 199, 2nd Conference on Information-Theoretic Cryptography (ITC 2021)
Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, and Zhiye Xie. Online Linear Extractors for Independent Sources. In 2nd Conference on Information-Theoretic Cryptography (ITC 2021). Leibniz International Proceedings in Informatics (LIPIcs), Volume 199, pp. 14:1-14:14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2021)
@InProceedings{dodis_et_al:LIPIcs.ITC.2021.14,
author = {Dodis, Yevgeniy and Guo, Siyao and Stephens-Davidowitz, Noah and Xie, Zhiye},
title = {{Online Linear Extractors for Independent Sources}},
booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)},
pages = {14:1--14:14},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-197-9},
ISSN = {1868-8969},
year = {2021},
volume = {199},
editor = {Tessaro, Stefano},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.14},
URN = {urn:nbn:de:0030-drops-143339},
doi = {10.4230/LIPIcs.ITC.2021.14},
annote = {Keywords: feasibility of randomness extraction, randomness condensers, Fourier analysis}
}
Published in: LIPIcs, Volume 199, 2nd Conference on Information-Theoretic Cryptography (ITC 2021)
Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, and Mridul Nandi. T₅: Hashing Five Inputs with Three Compression Calls. In 2nd Conference on Information-Theoretic Cryptography (ITC 2021). Leibniz International Proceedings in Informatics (LIPIcs), Volume 199, pp. 24:1-24:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2021)
@InProceedings{dodis_et_al:LIPIcs.ITC.2021.24,
author = {Dodis, Yevgeniy and Khovratovich, Dmitry and Mouha, Nicky and Nandi, Mridul},
title = {{T₅: Hashing Five Inputs with Three Compression Calls}},
booktitle = {2nd Conference on Information-Theoretic Cryptography (ITC 2021)},
pages = {24:1--24:23},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-197-9},
ISSN = {1868-8969},
year = {2021},
volume = {199},
editor = {Tessaro, Stefano},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.24},
URN = {urn:nbn:de:0030-drops-143430},
doi = {10.4230/LIPIcs.ITC.2021.24},
annote = {Keywords: hash functions, Merkle trees, Merkle-Damg\r{a}rd, collision resistance}
}