ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
14
views
24
references
Top references
cited by
7
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,125
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology - EUROCRYPT 2009
Optimal Randomness Extraction from a Diffie-Hellman Element
other
Author(s):
Céline Chevalier
,
Pierre-Alain Fouque
,
David Pointcheval
,
Sébastien Zimmer
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH title and first author match)
oa repository (via OAI-PMH title and first author match)
oa repository (via OAI-PMH title and first author match)
oa repository (via OAI-PMH title and first author match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Trace Elements and Electrolytes
Most cited references
24
Record
: found
Abstract
: not found
Article
: not found
New directions in cryptography
W. Diffie
,
Chan Hellman
(1976)
0
comments
Cited
314
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
Ronald Cramer
,
Victor Shoup
(1998)
0
comments
Cited
177
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
A Pseudorandom Generator from any One-way Function
Johan HÅstad
,
Russell Impagliazzo
,
Leonid A. Levin
…
(1999)
0
comments
Cited
53
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 572-589
DOI:
10.1007/978-3-642-01001-9_33
SO-VID:
1df39be6-d01f-431d-bceb-5cfc66f94f8f
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
pp. 36
Breaking RSA Generically Is Equivalent to Factoring
pp. 171
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
pp. 206
Key Agreement from Close Secrets over Unsecured Channels
pp. 278
Cube Attacks on Tweakable Black Box Polynomials
pp. 313
Practical Chosen Ciphertext Secure Encryption from Factoring
pp. 351
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
pp. 371
Salvaging Merkle-Damgård for Practical Applications
pp. 407
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
pp. 425
On the Portability of Generalized Schnorr Proofs
pp. 443
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
pp. 462
A Leakage-Resilient Mode of Operation
pp. 518
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves
pp. 572
Optimal Randomness Extraction from a Diffie-Hellman Element
pp. 590
A New Randomness Extraction Paradigm for Hybrid Encryption
Similar content
3,125
Hellman-Feynman Operator Sampling in Diffusion Monte Carlo Calculations
Authors:
R Gaudoin
,
J M Pitarke
De Vita, Hellman and Rosemberg’s, cancer principles and practice of oncology
Authors:
GJ Bosı
,
DR Feldman
,
DF Bajorin
…
An appreciation of Milo Hellman's work
Authors:
William Gregory
See all similar
Cited by
7
Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
Authors:
Mihir Bellare
,
David Cash
Leftover Hash Lemma, Revisited
Authors:
Boaz Barak
,
Yevgeniy Dodis
,
Hugo Krawczyk
…
Additive combinatorics with a view towards computer science and cryptography: An exposition
Authors:
Khodakhast Bibak
See all cited by