Skip to search formSkip to main contentSkip to account menu

Leftover hash lemma

Known as: Leftover hash-lemma, Privacy amplification 
The leftover hash lemma is a lemma in cryptography first stated by Russell Impagliazzo, Leonid Levin, and Michael Luby. Imagine that you have a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Achieving security against adversaries with unlimited computational power is of great interest in a communication scenario. Since… 
2012
2012
We experimentally demonstrate a quantum key distribution protocol using entangled photon pairs in orbital angular momentum (OAM… 
2011
2011
Copyright c � 2013 Abdoul Aziz Ciss and Djiby Sow. This is an open access article distributed under the Creative Commons… 
2009
2009
We investigated the characteristics of shared keys obtained through quantum key distribution (QKD) from the viewpoint of… 
2009
2009
We present an extension to the error correction facility that is at the core of classical quantum cryptographic key exchange in… 
2007
2007
A practical quantum cryptosystem prototype has been developed for metro area applications. It is of the size of a desktop and… 
2006
2006
This paper evaluates security of the key agreement system for wireless networks proposed recently by Aono et al. This system… 
2002
2002
Privacy threats and problems in the context of electronic commerce are extensively discussed in literature since the discovery of… 
1999
1999
Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce… 
Review
1998
Review
1998
An experimental free-space quantum key distribution (QKD) system has been tested over an outdoor optical path of approximately 1…