Bernoulli Types: Theory and Construction
Browse posts by tag
Cryptographic theory assumes random oracles with infinite output. We have 256 bits. This paper explores how we bridge that gap, and what it means that we can.
Space bounds, entropy requirements, and cryptographic security properties of perfect hash functions.
A C++ library for composable hash functions using algebraic structure over XOR, with template metaprogramming.
Three Python approximations of a random oracle, each showing a different tradeoff between true randomness, determinism, and composability.