{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:57:51Z","timestamp":1729666671855,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/itw.2012.6404636","type":"proceedings-article","created":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T20:30:12Z","timestamp":1358454612000},"page":"109-113","source":"Crossref","is-referenced-by-count":7,"title":["Overcoming weak expectations"],"prefix":"10.1109","author":[{"given":"Yevgeniy","family":"Dodis","sequence":"first","affiliation":[]},{"given":"Yu","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2000.892063"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"13","first-page":"1","article-title":"Leftover hash lemma, revisited","author":"barak","year":"2011","journal-title":"Crypto"},{"key":"14","first-page":"31","article-title":"From absolute distinguishability to positive distinguishability","volume":"16","author":"brakerski","year":"2009","journal-title":"Electronic Colloquium on Computational Complexity (ECCC)"},{"key":"11","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1007\/978-3-642-01001-9_27","article-title":"A leakage-resilient mode of operation","volume":"5479","author":"pietrzak","year":"2009","journal-title":"Advances in Cryptology - EUROCRYPT 2009"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_35"},{"key":"3","first-page":"166","article-title":"True random number generators secure in a changing environment","author":"barak","year":"2003","journal-title":"Proceedings of the 5th Cryptographic Hardware and Embedded Systems"},{"key":"2","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/11426639_9","article-title":"Secure remote authentication using biometric data","volume":"3494","author":"boyen","year":"2005","journal-title":"Advances in Cryptology - EUROCRYPT 2005"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2012.26"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536496"},{"key":"6","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1007\/978-3-642-14623-7_34","article-title":"Cryptographic extraction and key derivation: The HKDF scheme","volume":"6223","author":"krawczyk","year":"2010","journal-title":"Advances in Cryptology - CRYPTO 2010"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_22"},{"key":"4","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1145\/1102120.1102148","article-title":"A model and architecture for pseudo-random generation with applications to \/dev\/random","author":"barak","year":"2005","journal-title":"Proceedings of the 12th ACM Conference on Computer and Communication Security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2012.21"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.67"}],"event":{"name":"2012 IEEE Information Theory Workshop (ITW 2012)","start":{"date-parts":[[2012,9,3]]},"location":"Lausanne, Switzerland","end":{"date-parts":[[2012,9,7]]}},"container-title":["2012 IEEE Information Theory Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6389798\/6404631\/06404636.pdf?arnumber=6404636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T05:50:56Z","timestamp":1498024256000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6404636\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/itw.2012.6404636","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}