Sciweavers

2237 search results - page 6 / 448
» On the Security of Random Sources
Sort
View
CCS
2006
ACM
13 years 10 months ago
Inferring the source of encrypted HTTP connections
Marc Liberatore, Brian Neil Levine
CCS
2010
ACM
13 years 7 months ago
Computationally sound verification of source code
Michael Backes, Matteo Maffei, Dominique Unruh
COCOON
2005
Springer
14 years 19 days ago
Randomized Quicksort and the Entropy of the Random Source
Abstract. The worst-case complexity of an implementation of Quicksort depends on the random number generator that is used to select the pivot elements. In this paper we estimate th...
Beatrice List, Markus Maucher, Uwe Schöning, ...
ECCC
1998
80views more  ECCC 1998»
13 years 6 months ago
Extracting All the Randomness from a Weakly Random Source
In this paper, we give two explicit constructions of extractors, both of which work for a source of any min-entropy on strings of length n. The rst extracts any constant fraction ...
Salil P. Vadhan