Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Leftover Hash Lemma, Revisited

TheIACR via YouTube

Overview

Explore a comprehensive analysis of the Leftover Hash Lemma (LHL) and its limitations in this Crypto 2011 conference talk. Delve into innovative approaches to overcome the drawbacks of large entropy loss and large seed length in LHL-based extractors. Discover how entropy loss can be reduced for deriving secret keys in various cryptographic applications, and examine the security implications of this reduction. Investigate the soundness of the expand-then-extract approach, which combines pseudorandom generators with randomness extractors. Learn about the conditions under which this approach is secure and its potential applications in practical scenarios. Gain insights into the latest advancements in randomness extraction techniques and their impact on cryptographic key derivation functions.

Syllabus

Leftover Hash Lemma, Revisited (Crypto 2011)

Taught by

TheIACR

Reviews

Start your review of Leftover Hash Lemma, Revisited

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.