This paper is an expository treatment of the Leftover Hash Lemma and some of its applications in cryptography and complexity theory.