Towards Key-Dependent Message Security in the Standard Model
Continuous variable quantum key distribution finite key analysis of composable security against coherent attacks
Discrete Gaussian Leftover Hash Lemma Shweta Agrawal IIT Delhi With Craig Gentry, Shai Halevi, Amit Sahai.
Oblivious Transfer and Bit Commitment from Noisy Channels Ivan Damgård BRICS, Århus University.
Discrete Gaussian Leftover Hash Lemma
Toyohiro Tsurumaru (Mitsubishi Electric Corporation)
Hash Tables – 2