{"status":"public","oa":1,"publisher":"IEEE","volume":2018,"oa_version":"Submitted Version","conference":{"start_date":"2018-06-17 ","end_date":"2018-06-22","location":"Vail, CO, USA","name":"ISIT: International Symposium on Information Theory"},"isi":1,"author":[{"last_name":"Obremski","first_name":"Marciej","full_name":"Obremski, Marciej"},{"full_name":"Skorski, Maciej","first_name":"Maciej","id":"EC09FA6A-02D0-11E9-8223-86B7C91467DD","last_name":"Skorski"}],"article_processing_charge":"No","quality_controlled":"1","scopus_import":"1","_id":"108","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","day":"16","abstract":[{"text":"Universal hashing found a lot of applications in computer science. In cryptography the most important fact about universal families is the so called Leftover Hash Lemma, proved by Impagliazzo, Levin and Luby. In the language of modern cryptography it states that almost universal families are good extractors. In this work we provide a somewhat surprising characterization in the opposite direction. Namely, every extractor with sufficiently good parameters yields a universal family on a noticeable fraction of its inputs. Our proof technique is based on tools from extremal graph theory applied to the \\'collision graph\\' induced by the extractor, and may be of independent interest. We discuss possible applications to the theory of randomness extractors and non-malleable codes.","lang":"eng"}],"external_id":{"isi":["000448139300368"]},"type":"conference","publist_id":"7946","date_created":"2018-12-11T11:44:40Z","doi":"10.1109/ISIT.2018.8437654","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2017/507"}],"month":"08","title":"Inverted leftover hash lemma","intvolume":" 2018","date_updated":"2023-09-13T08:23:18Z","language":[{"iso":"eng"}],"alternative_title":["ISIT Proceedings"],"publication_status":"published","date_published":"2018-08-16T00:00:00Z","citation":{"ista":"Obremski M, Skórski M. 2018. Inverted leftover hash lemma. ISIT: International Symposium on Information Theory, ISIT Proceedings, vol. 2018.","ama":"Obremski M, Skórski M. Inverted leftover hash lemma. In: Vol 2018. IEEE; 2018. doi:10.1109/ISIT.2018.8437654","apa":"Obremski, M., & Skórski, M. (2018). Inverted leftover hash lemma (Vol. 2018). Presented at the ISIT: International Symposium on Information Theory, Vail, CO, USA: IEEE. https://doi.org/10.1109/ISIT.2018.8437654","mla":"Obremski, Marciej, and Maciej Skórski. Inverted Leftover Hash Lemma. Vol. 2018, IEEE, 2018, doi:10.1109/ISIT.2018.8437654.","chicago":"Obremski, Marciej, and Maciej Skórski. “Inverted Leftover Hash Lemma,” Vol. 2018. IEEE, 2018. https://doi.org/10.1109/ISIT.2018.8437654.","short":"M. Obremski, M. Skórski, in:, IEEE, 2018.","ieee":"M. Obremski and M. Skórski, “Inverted leftover hash lemma,” presented at the ISIT: International Symposium on Information Theory, Vail, CO, USA, 2018, vol. 2018."},"year":"2018","department":[{"_id":"KrPi"}]}