-
1
-
-
84918668916
-
-
Tech. Memo 131, Laboratory for Computer Science MIT, Cambridge, Mass.]
-
ADELMAN, L. Time, Space and Randomness. Tech. Memo 131, Laboratory for Computer Science MIT, Cambridge, Mass., 1979.]
-
(1979)
Time, Space and Randomness
-
-
Adelman, L.1
-
2
-
-
0021557360
-
-
SIAM J. Comput., to appear. (An earlier version appeared in Proceedings of the 25th IEEE Symposium on Foundations of Computer Science. IEEE, New York,)]
-
ALEXI, W., CHOR, B., GOLDREICH, O., AND SCHNORR, C. P. RSA and Rabin functions: Certain parts are as hard as the whole. SIAM J. Comput., to appear. (An earlier version appeared in Proceedings of the 25th IEEE Symposium on Foundations of Computer Science. IEEE, New York, 1984, pp. 449-457.)]
-
(1984)
RSA and Rabin functions: Certain parts are as hard as the whole
, pp. 449-457
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.P.4
-
3
-
-
0011208228
-
-
Tech. Rep. 288, Dept. of Computer Science, Yale Univ. New Haven, Conn.]
-
ANGLUIN, O., AND LICHTENSTEIN, D. Provable security of cryptosystems: A survey. Tech. Rep. 288, Dept. of Computer Science, Yale Univ. New Haven, Conn., 1983.]
-
(1983)
Provable security of cryptosystems: A survey
-
-
Angluin, O.1
Lichtenstein, D.2
-
4
-
-
0002872731
-
-
P^ ~ NP^ ~ co-NP^ with probability I. SIAM J. Comput. I 0 ( 198 l
-
BENNETT, C. H., AND GILL, J. Relative to a random oracle, A, P^ ~ NP^ ~ co-NP^ with probability I. SIAM J. Comput. I 0 ( 198 l), 96-113.]
-
Relative to a random oracle, A
, pp. 96-113
-
-
Bennett, C.H.1
Gill, J.2
-
5
-
-
0020879150
-
-
In Proceedings of the 15th ACM Symposium on Theory of Computing (Boston, Mass., Apr. 25-27). ACM, New~'ork,]
-
BEN-OR, M., CnOR, B., AND SHAMIR, A. On the cryptographic security of single RSA bits. In Proceedings of the 15th ACM Symposium on Theory of Computing (Boston, Mass., Apr. 25-27). ACM, New~'ork, 1983, pp. 421-430.]
-
(1983)
On the cryptographic security of single RSA bits
, pp. 421-430
-
-
Ben-Or, M.1
CnOR, B.2
Shamir, A.3
-
6
-
-
85032202466
-
-
Ed. Lecture Notes in Computer Science, Springer-Vedag, New York,]
-
BEN-OR, M., GOLDREICH, O., MICALI, S., RIVEST, R.L. A fair protocol for signing contracts. In Automata, Languages and Programmingnd Programming, 12th Colloquium, W. Brauer, Ed. Lecture Notes in Computer Science, Vol. 194. Springer-Vedag, New York, 1985, pp. 43-52.]
-
(1985)
, vol.194
, pp. 43-52
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.L.4
Brauer, W.5
-
7
-
-
0022716288
-
A simpl~ unpredictable pseudo-random number generator
-
(May
-
BLUM, L., BLUM, M., and SHUB, M. A simpl~ unpredictable pseudo-random number generator. SIAM J. Comput. 15 (May 1986), 364-383.]
-
(1986)
SIAM J. Comput.
, vol.15
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
9
-
-
0020913618
-
-
In Advances in Cryptology: Proceedings of Crypto-82, D. Chaum, R. L. Rivest and A. T. Sherman, Eds. Plenum Press, New York,]
-
BRASSARD, G. On computationally secure authentication tags requiring short secret shared keys. In Advances in Cryptology: Proceedings of Crypto-82, D. Chaum, R. L. Rivest and A. T. Sherman, Eds. Plenum Press, New York, 1983, pp. 79-86.]
-
(1983)
On computationally secure authentication tags requiring short secret shared keys
, pp. 79-86
-
-
Brassard, G.1
-
10
-
-
84918358658
-
On the length of programs for computing finite binary sequences
-
(Oct.
-
CnAITIN, G.J. On the length of programs for computing finite binary sequences. J. ACM 13, 4 (Oct. 1966), 547-570.]
-
(1966)
J. ACM
, vol.13
, Issue.4
, pp. 547-570
-
-
CnAITIN, G.J.1
-
12
-
-
0021547328
-
-
In Proceedings of the 25th Symposium on Foundations of Computer Science. IEEE, New York, ’.]
-
FREIZE, A. M., KANNAN, R., AND LAGARIAS, J.C. Linear congruential generators do not produce random sequences. In Proceedings of the 25th Symposium on Foundations of Computer Science. IEEE, New York, 1984, pp. 480-484’.]
-
(1984)
Linear congruential generators do not produce random sequences
, pp. 480-484
-
-
Freize, A.M.1
Kannan, R.2
Lagarias, J.C.3
-
13
-
-
0000189643
-
On the symmetry of algorithmic information
-
1477.]
-
GACS, P. On the symmetry of algorithmic information. Soy. Math. Dokl. 15 (1974), 1477.]
-
(1974)
Soy. Math. Dokl.
, vol.15
-
-
Gacs, P.1
-
14
-
-
84945710882
-
-
Tech. Memo 244, Laboratory for Computer Science, MIT, Cambridge, Mass., Nov.]
-
GOLDREICH, O., GOLDWASSER, S., AND MICALI, S. How to construct random functions. Tech. Memo 244, Laboratory for Computer Science, MIT, Cambridge, Mass., Nov. 1983.]
-
(1983)
How to construct random functions
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
15
-
-
85028838274
-
-
In Advances in Cryptology: Proceedings of Crypto-84. B. Blakely, Ed. Lecture Notes in Computer Science, Springer-Vedag, New York,]
-
GOLDREICH, O., GOLDWASSER, S., AND MICALI, S. On the cryptographic applications of random functions. In Advances in Cryptology: Proceedings of Crypto-84. B. Blakely, Ed. Lecture Notes in Computer Science, Vol. 196. Springer-Vedag, New York, 1985, pp. 276-288.]
-
(1985)
On the cryptographic applications of random functions
, vol.196
, pp. 276-288
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
16
-
-
84910380863
-
-
Ph.D. dissertation, Dept. of Computer Science, Univ. of California, Berkeley, Calif.]
-
GOLDWASSER, S. Probabilistic encryption: Theory and applications. Ph.D. dissertation, Dept. of Computer Science, Univ. of California, Berkeley, Calif., 1984.]
-
(1984)
Probabilistic encryption: Theory and applications
-
-
Goldwasser, S.1
-
17
-
-
0021555016
-
-
signature scheme. In Proceedings of the 25th IEEE Symposium on Foundations of Computer Science. IEEE, New York,]
-
GOLDWASSER, S., MICALI, S., AND RIVEST, R.L. A “paradoxical” signature scheme. In Proceedings of the 25th IEEE Symposium on Foundations of Computer Science. IEEE, New York, 1984, pp. 441-448.]
-
(1984)
A “paradoxical
, pp. 441-448
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
19
-
-
0020279669
-
-
In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science. IEEE, New York,]
-
GOLDWASSER, S., MICALI, S., AND TONG, P. Why and how to establish a private code on a public network. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science. IEEE, New York, 1982, pp. 134-144.]
-
(1982)
Why and how to establish a private code on a public network
, pp. 134-144
-
-
Goldwasser, S.1
Micali, S.2
Tong, P.3
-
21
-
-
0021975313
-
-
In Proceedings of the 17th ACM Symposium on Theory of Computing (Providence, R.I., May 6-8). ACM, New York,]
-
HASTAD, J., AND SHAMIR, A. The cryptographic security of truncated linearly related variables. In Proceedings of the 17th ACM Symposium on Theory of Computing (Providence, R.I., May 6-8). ACM, New York, 1985, pp. 356-362.]
-
(1985)
The cryptographic security of truncated linearly related variables
, pp. 356-362
-
-
Hastad, J.1
Shamir, A.2
-
25
-
-
0000508181
-
On the notion of a random sequence
-
1413.]
-
LEVIN, L.A. On the notion of a random sequence. Soy. Math. Dokl. 14, 5 (1973), 1413.]
-
(1973)
Soy. Math. Dokl.
, vol.14
, Issue.5
-
-
Levin, L.A.1
-
26
-
-
0001041068
-
Various measures of complexity for finite objects (axiomatic descriptions)
-
LEVlN, L. A. Various measures of complexity for finite objects (axiomatic descriptions). Soy. Math. Dokl. 17, 2 (1976), 522-526.]
-
(1976)
Soy. Math. Dokl.
, vol.17
, Issue.2
, pp. 522-526
-
-
Levln, L.A.1
-
28
-
-
0021902611
-
-
In Proceedings of the 17th ACM Symposium on Theory of Computing (Providence, R.I., May 6-8). ACM, New York,]
-
LEVIN, L.A. One-way function and pseudorandom generators. In Proceedings of the 17th ACM Symposium on Theory of Computing (Providence, R.I., May 6-8). ACM, New York, 1985, pp. 363-365.]
-
(1985)
One-way function and pseudorandom generators
, pp. 363-365
-
-
Levin, L.A.1
-
29
-
-
0020891101
-
-
In preparation. A preliminary version appeared in Proceedings of the 15th ACM Symposium on Theory of Computing (Boston, Mass., Apr. 25-27). ACM, New York,]
-
LONG, D. L., AND WIGDERSON, A. How discreet is discrete log? In preparation. A preliminary version appeared in Proceedings of the 15th ACM Symposium on Theory of Computing (Boston, Mass., Apr. 25-27). ACM, New York, 1983, pp. 413-420.]
-
(1983)
How discreet is discrete log?
, pp. 413-420
-
-
Long, D.L.1
Wigderson, A.2
-
30
-
-
5844291762
-
-
In Proceedings of the 18th ACM Symposium on Theory of Computing (Berkeley, Calif., May 28-30). ACM, New York,]
-
Luav, M., AND RACKOFF, C. Pseudo random permutation generators and cryptographic composition. In Proceedings of the 18th ACM Symposium on Theory of Computing (Berkeley, Calif., May 28-30). ACM, New York, 1986, pp. 356-363.]
-
(1986)
Pseudo random permutation generators and cryptographic composition
, pp. 356-363
-
-
Luav, M.1
Rackoff, C.2
-
31
-
-
18344371384
-
The definition of random sequences
-
MARTIN-LOF, P. The definition of random sequences. Inf. Control 9 (1966), 602-619.]
-
(1966)
Inf. Control
, vol.9
, pp. 602-619
-
-
Martin-Lof, P.1
-
32
-
-
0020271558
-
-
In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science. IEEE, New York,]
-
PLUMSTEAD, J. Inferring a sequence generated by a linear congruence. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science. IEEE, New York, 1982, pp. 153-159.]
-
(1982)
Inferring a sequence generated by a linear congruence
, pp. 153-159
-
-
Plumstead, J.1
-
34
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
(Feb.
-
RIVEST, R., SHAMIR, A., and ADLEMAN, L. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 21, 2 (Feb. 1978), 120-126.]
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
35
-
-
0002411710
-
Zufaelligkeit und Wahrscheinlichkeit
-
Springer-Verlag, New York, 197 i.]
-
SCHNORR, C.P. Zufaelligkeit und Wahrscheinlichkeit. Lecture Notes in Mathematics, Vol. 218. Springer-Verlag, New York, 197 i.]
-
Lecture Notes in Mathematics
, vol.218
-
-
Schnorr, C.P.1
-
37
-
-
0020931594
-
-
Proceedings of the 15th ACM Symposium on Theory of Computing (Boston, Mass., Apr. 25-27). ACM, New York,]
-
SIr'SER, M. A complexity theoretic approach to randomness, in Proceedings of the 15th ACM Symposium on Theory of Computing (Boston, Mass., Apr. 25-27). ACM, New York, 1983, 330-335.]
-
(1983)
A complexity theoretic approach to randomness
, pp. 330-335
-
-
Sir'Ser, M.1
-
39
-
-
0020881177
-
-
In Proceedings of 24th IEEE Symposium on Foundations of Computer Science. IEEE, New York,]
-
WILBER, R.E. Randomness and the density of hard problems. In Proceedings of 24th IEEE Symposium on Foundations of Computer Science. IEEE, New York, 1983, pp. 335-342.]
-
(1983)
Randomness and the density of hard problems
, pp. 335-342
-
-
Wilber, R.E.1
-
40
-
-
4243132083
-
-
Ed. Plenum Press, New York,]
-
VAZIRANI, U. V., and VAZIRANI, V.V. RSA bits are.732 + ~ secure, tn Advances in Cryptology: Proceedings ofCrypto-83, D. Chaum, Ed. Plenum Press, New York, 1984, pp. 369-375.]
-
(1984)
, pp. 369-375
-
-
Vazirani, U.V.1
Vazirani, V.V.2
Chaum, D.3
-
41
-
-
0021548502
-
-
In Proceedings of the 25th IEEE Symposium on Foundations of Computer Science. IEEE, New York,]
-
VAZIRANI, U. V., AND VAZIRANI, V.V. Efficient and secure pseudo-random number generation. In Proceedings of the 25th IEEE Symposium on Foundations of Computer Science. IEEE, New York, 1984, pp. 458-463.]
-
(1984)
Efficient and secure pseudo-random number generation
, pp. 458-463
-
-
Vazirani, U.V.1
Vazirani, V.V.2
-
42
-
-
0020301290
-
-
In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science. IEEE, New York, I.]
-
YAO, A.C. Theory and applications of trapdoor functions. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science. IEEE, New York, 1982, pp 80-9 I.]
-
(1982)
Theory and applications of trapdoor functions
, pp. 80-89
-
-
Yao, A.C.1
-
43
-
-
77951203397
-
The complexity of finite objects and the algorithmic concepts of randomness and information
-
ZVONKIN, A. K., AND LEVIN, L.A. The complexity of finite objects and the algorithmic concepts of randomness and information. UMN (Russian Math. Surveys), 25, 6 (1970), 83-124.]
-
(1970)
UMN (Russian Math. Surveys)
, vol.25
, Issue.6
, pp. 83-124
-
-
Zvonkin, A.K.1
Levin, L.A.2
|