Non-malleable extractors and symmetric key cryptography from weak secrets
FREE-DOWNLOAD Y Dodis… – Proceedings of the 41st annual ACM symposium …, 2009 – We study the question of basing symmetric key cryptogra- phy on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the adversary has at least k bits of uncertainty about […]
Security bounds for quantum cryptography with finite resources
FREE-DOWNLOAD V Scarani… – … Computation, Communication, and Cryptography, 2008 Abstract. A practical quantum key distribution (QKD) protocol neces- sarily runs in finite time and, hence, only a finite amount of communica- tion is exchanged. This is in contrast to most of the standard results on the security of QKD, which only hold in the limit […]
ultra-lightweight cryptography for resource-constrained devices
FREE-DOWNLOAD D Engels, X Fan, G Gong, H Hu… – Financial Cryptography and …, Abstract. Due to the tight cost and constrained resources of high- volume consumer devices such as RFID tags, smart cards and wireless sensor nodes, it is desirable to employ lightweight and specialized cryp- tographic primitives for many security applications. Motivated by the