-
4.0 Introduction to From imperfect information to (near) perfect security
-
4.1 Introduction to privacy amplification
-
4.2 What’s an extractor and why does it achieve that task?
-
4.3 Randomness extraction using two-universal hashing
-
4.4 The pretty good measurement
-
4.5 Extractor and actual privacy amplification