2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness | IEEE Conference Publication | IEEE Xplore