Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,513,943 papers from all fields of science
Search
Sign In
Create Free Account
Leftover hash lemma
Known as:
Leftover hash-lemma
, Privacy amplification
The leftover hash lemma is a lemma in cryptography first stated by Russell Impagliazzo, Leonid Levin, and Michael Luby. Imagine that you have a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Adversary (cryptography)
Cryptography
Hash function
Information-theoretic security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
On the construction of polar codes for achieving the capacity of marginal channels
A. Torfi
,
Sobhan Soleymani
,
Siamak Aram
,
V. Vakili
Allerton Conference on Communication, Control…
2017
Corpus ID: 21851962
Achieving security against adversaries with unlimited computational power is of great interest in a communication scenario. Since…
Expand
2012
2012
A Large-alphabet Quantum Key Distribution Protocol Using Orbital Angular Momentum Entanglement
S. Zhao 赵
,
L. Gong 巩
,
Yong-Qiang 永强 Li 李
,
Hua 华 Yang 杨
,
Yu-Bo 宇波 Sheng 盛
,
W. Cheng 程
2012
Corpus ID: 124394557
We experimentally demonstrate a quantum key distribution protocol using entangled photon pairs in orbital angular momentum (OAM…
Expand
2011
2011
Randomness Extraction in finite fields Fpn
A. A. Ciss
,
Djiby Sow
IACR Cryptology ePrint Archive
2011
Corpus ID: 10992471
Copyright c � 2013 Abdoul Aziz Ciss and Djiby Sow. This is an open access article distributed under the Creative Commons…
Expand
2009
2009
Ensuring Quality of Shared Keys Through Quantum Key Distribution for Practical Application
A. Tanaka
,
Wakako Maeda
,
Seigo Takahashi
,
A. Tajima
,
Akihisa Tomita
IEEE Journal of Selected Topics in Quantum…
2009
Corpus ID: 41928776
We investigated the characteristics of shared keys obtained through quantum key distribution (QKD) from the viewpoint of…
Expand
2009
2009
Adaptive Error Correction with Dynamic Initial Block Size in Quantum Cryptographic Key Distribution Protocols
S. Rass
,
C. Kollmitzer
Third International Conference on Quantum, Nano…
2009
Corpus ID: 30117632
We present an extension to the error correction facility that is at the core of classical quantum cryptographic key exchange in…
Expand
2007
2007
Practical Quantum Cryptosystem for Metro Area Applications
A. Tajima
,
A. Tanaka
,
W. Maeda
,
Seigo Takahashi
,
A. Tomita
IEEE Journal of Selected Topics in Quantum…
2007
Corpus ID: 27136100
A practical quantum cryptosystem prototype has been developed for metro area applications. It is of the size of a desktop and…
Expand
2006
2006
On the Possibility of Key Agreement Using Variable Directional Antenna
H. Imai
,
K. Kobara
,
Kirill Morozov
2006
Corpus ID: 2954610
This paper evaluates security of the key agreement system for wireless networks proposed recently by Aono et al. This system…
Expand
2002
2002
Using Mobile Agents for Privacy Amplification in the Trade with Tangible Goods
Matthias Enzmann
,
T. Kunz
,
Markus Schneider Fraunhofergesellschaft
2002
Corpus ID: 17687791
Privacy threats and problems in the context of electronic commerce are extensively discussed in literature since the discovery of…
Expand
1999
1999
Anonymous Fingerprinting Based on Committed Oblivious Transfer
J. Domingo-Ferrer
International Conference on Theory and Practice…
1999
Corpus ID: 1036843
Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce…
Expand
Review
1998
Review
1998
Free-space quantum key distribution at night
W. T. Buttler
,
Richard J. Hughes
,
+6 authors
C. Simmons
Defense, Security, and Sensing
1998
Corpus ID: 121693131
An experimental free-space quantum key distribution (QKD) system has been tested over an outdoor optical path of approximately 1…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE