Sciweavers

612 search results - page 2 / 123
» Hardness assumptions in the foundations of theoretical compu...
Sort
View
FOCS
2009
IEEE
14 years 4 days ago
2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness
Abstract— We show how to efficiently extract truly random bits from two independent sources of linear min-entropy, under a computational assumption. The assumption we rely on is...
Yael Tauman Kalai, Xin Li, Anup Rao