Leftover Hash Lemma, Revisited
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a comprehensive analysis of the Leftover Hash Lemma (LHL) and its limitations in this Crypto 2011 conference talk. Delve into innovative approaches to overcome the drawbacks of large entropy loss and large seed length in LHL-based extractors. Discover how entropy loss can be reduced for deriving secret keys in various cryptographic applications, and examine the security implications of this reduction. Investigate the soundness of the expand-then-extract approach, which combines pseudorandom generators with randomness extractors. Learn about the conditions under which this approach is secure and its potential applications in practical scenarios. Gain insights into the latest advancements in randomness extraction techniques and their impact on cryptographic key derivation functions.
Syllabus
Leftover Hash Lemma, Revisited (Crypto 2011)
Taught by
TheIACR
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera