메뉴 건너뛰기




Volumn 33, Issue 4, 1986, Pages 792-807

How to construct random functions

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER METATHEORY; COMPUTER PROGRAMMING - ALGORITHMS; CRYPTOGRAPHY;

EID: 0022793132     PISSN: 00045411     EISSN: 1557735X     Source Type: Journal    
DOI: 10.1145/6490.6503     Document Type: Article
Times cited : (1368)

References (43)
  • 1
    • 84918668916 scopus 로고
    • Tech. Memo 131, Laboratory for Computer Science MIT, Cambridge, Mass.]
    • ADELMAN, L. Time, Space and Randomness. Tech. Memo 131, Laboratory for Computer Science MIT, Cambridge, Mass., 1979.]
    • (1979) Time, Space and Randomness
    • Adelman, L.1
  • 2
    • 0021557360 scopus 로고
    • SIAM J. Comput., to appear. (An earlier version appeared in Proceedings of the 25th IEEE Symposium on Foundations of Computer Science. IEEE, New York,)]
    • ALEXI, W., CHOR, B., GOLDREICH, O., AND SCHNORR, C. P. RSA and Rabin functions: Certain parts are as hard as the whole. SIAM J. Comput., to appear. (An earlier version appeared in Proceedings of the 25th IEEE Symposium on Foundations of Computer Science. IEEE, New York, 1984, pp. 449-457.)]
    • (1984) RSA and Rabin functions: Certain parts are as hard as the whole , pp. 449-457
    • Alexi, W.1    Chor, B.2    Goldreich, O.3    Schnorr, C.P.4
  • 4
    • 0002872731 scopus 로고    scopus 로고
    • P^ ~ NP^ ~ co-NP^ with probability I. SIAM J. Comput. I 0 ( 198 l
    • BENNETT, C. H., AND GILL, J. Relative to a random oracle, A, P^ ~ NP^ ~ co-NP^ with probability I. SIAM J. Comput. I 0 ( 198 l), 96-113.]
    • Relative to a random oracle, A , pp. 96-113
    • Bennett, C.H.1    Gill, J.2
  • 5
    • 0020879150 scopus 로고
    • In Proceedings of the 15th ACM Symposium on Theory of Computing (Boston, Mass., Apr. 25-27). ACM, New~'ork,]
    • BEN-OR, M., CnOR, B., AND SHAMIR, A. On the cryptographic security of single RSA bits. In Proceedings of the 15th ACM Symposium on Theory of Computing (Boston, Mass., Apr. 25-27). ACM, New~'ork, 1983, pp. 421-430.]
    • (1983) On the cryptographic security of single RSA bits , pp. 421-430
    • Ben-Or, M.1    CnOR, B.2    Shamir, A.3
  • 6
    • 85032202466 scopus 로고
    • Ed. Lecture Notes in Computer Science, Springer-Vedag, New York,]
    • BEN-OR, M., GOLDREICH, O., MICALI, S., RIVEST, R.L. A fair protocol for signing contracts. In Automata, Languages and Programmingnd Programming, 12th Colloquium, W. Brauer, Ed. Lecture Notes in Computer Science, Vol. 194. Springer-Vedag, New York, 1985, pp. 43-52.]
    • (1985) , vol.194 , pp. 43-52
    • Ben-Or, M.1    Goldreich, O.2    Micali, S.3    Rivest, R.L.4    Brauer, W.5
  • 7
    • 0022716288 scopus 로고
    • A simpl~ unpredictable pseudo-random number generator
    • (May
    • BLUM, L., BLUM, M., and SHUB, M. A simpl~ unpredictable pseudo-random number generator. SIAM J. Comput. 15 (May 1986), 364-383.]
    • (1986) SIAM J. Comput. , vol.15 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 9
    • 0020913618 scopus 로고
    • In Advances in Cryptology: Proceedings of Crypto-82, D. Chaum, R. L. Rivest and A. T. Sherman, Eds. Plenum Press, New York,]
    • BRASSARD, G. On computationally secure authentication tags requiring short secret shared keys. In Advances in Cryptology: Proceedings of Crypto-82, D. Chaum, R. L. Rivest and A. T. Sherman, Eds. Plenum Press, New York, 1983, pp. 79-86.]
    • (1983) On computationally secure authentication tags requiring short secret shared keys , pp. 79-86
    • Brassard, G.1
  • 10
    • 84918358658 scopus 로고
    • On the length of programs for computing finite binary sequences
    • (Oct.
    • CnAITIN, G.J. On the length of programs for computing finite binary sequences. J. ACM 13, 4 (Oct. 1966), 547-570.]
    • (1966) J. ACM , vol.13 , Issue.4 , pp. 547-570
    • CnAITIN, G.J.1
  • 13
    • 0000189643 scopus 로고
    • On the symmetry of algorithmic information
    • 1477.]
    • GACS, P. On the symmetry of algorithmic information. Soy. Math. Dokl. 15 (1974), 1477.]
    • (1974) Soy. Math. Dokl. , vol.15
    • Gacs, P.1
  • 15
    • 85028838274 scopus 로고
    • In Advances in Cryptology: Proceedings of Crypto-84. B. Blakely, Ed. Lecture Notes in Computer Science, Springer-Vedag, New York,]
    • GOLDREICH, O., GOLDWASSER, S., AND MICALI, S. On the cryptographic applications of random functions. In Advances in Cryptology: Proceedings of Crypto-84. B. Blakely, Ed. Lecture Notes in Computer Science, Vol. 196. Springer-Vedag, New York, 1985, pp. 276-288.]
    • (1985) On the cryptographic applications of random functions , vol.196 , pp. 276-288
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 16
    • 84910380863 scopus 로고
    • Ph.D. dissertation, Dept. of Computer Science, Univ. of California, Berkeley, Calif.]
    • GOLDWASSER, S. Probabilistic encryption: Theory and applications. Ph.D. dissertation, Dept. of Computer Science, Univ. of California, Berkeley, Calif., 1984.]
    • (1984) Probabilistic encryption: Theory and applications
    • Goldwasser, S.1
  • 17
    • 0021555016 scopus 로고
    • signature scheme. In Proceedings of the 25th IEEE Symposium on Foundations of Computer Science. IEEE, New York,]
    • GOLDWASSER, S., MICALI, S., AND RIVEST, R.L. A “paradoxical” signature scheme. In Proceedings of the 25th IEEE Symposium on Foundations of Computer Science. IEEE, New York, 1984, pp. 441-448.]
    • (1984) A “paradoxical , pp. 441-448
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 21
    • 0021975313 scopus 로고
    • In Proceedings of the 17th ACM Symposium on Theory of Computing (Providence, R.I., May 6-8). ACM, New York,]
    • HASTAD, J., AND SHAMIR, A. The cryptographic security of truncated linearly related variables. In Proceedings of the 17th ACM Symposium on Theory of Computing (Providence, R.I., May 6-8). ACM, New York, 1985, pp. 356-362.]
    • (1985) The cryptographic security of truncated linearly related variables , pp. 356-362
    • Hastad, J.1    Shamir, A.2
  • 25
    • 0000508181 scopus 로고
    • On the notion of a random sequence
    • 1413.]
    • LEVIN, L.A. On the notion of a random sequence. Soy. Math. Dokl. 14, 5 (1973), 1413.]
    • (1973) Soy. Math. Dokl. , vol.14 , Issue.5
    • Levin, L.A.1
  • 26
    • 0001041068 scopus 로고
    • Various measures of complexity for finite objects (axiomatic descriptions)
    • LEVlN, L. A. Various measures of complexity for finite objects (axiomatic descriptions). Soy. Math. Dokl. 17, 2 (1976), 522-526.]
    • (1976) Soy. Math. Dokl. , vol.17 , Issue.2 , pp. 522-526
    • Levln, L.A.1
  • 28
    • 0021902611 scopus 로고
    • In Proceedings of the 17th ACM Symposium on Theory of Computing (Providence, R.I., May 6-8). ACM, New York,]
    • LEVIN, L.A. One-way function and pseudorandom generators. In Proceedings of the 17th ACM Symposium on Theory of Computing (Providence, R.I., May 6-8). ACM, New York, 1985, pp. 363-365.]
    • (1985) One-way function and pseudorandom generators , pp. 363-365
    • Levin, L.A.1
  • 29
    • 0020891101 scopus 로고
    • In preparation. A preliminary version appeared in Proceedings of the 15th ACM Symposium on Theory of Computing (Boston, Mass., Apr. 25-27). ACM, New York,]
    • LONG, D. L., AND WIGDERSON, A. How discreet is discrete log? In preparation. A preliminary version appeared in Proceedings of the 15th ACM Symposium on Theory of Computing (Boston, Mass., Apr. 25-27). ACM, New York, 1983, pp. 413-420.]
    • (1983) How discreet is discrete log? , pp. 413-420
    • Long, D.L.1    Wigderson, A.2
  • 30
    • 5844291762 scopus 로고
    • In Proceedings of the 18th ACM Symposium on Theory of Computing (Berkeley, Calif., May 28-30). ACM, New York,]
    • Luav, M., AND RACKOFF, C. Pseudo random permutation generators and cryptographic composition. In Proceedings of the 18th ACM Symposium on Theory of Computing (Berkeley, Calif., May 28-30). ACM, New York, 1986, pp. 356-363.]
    • (1986) Pseudo random permutation generators and cryptographic composition , pp. 356-363
    • Luav, M.1    Rackoff, C.2
  • 31
    • 18344371384 scopus 로고
    • The definition of random sequences
    • MARTIN-LOF, P. The definition of random sequences. Inf. Control 9 (1966), 602-619.]
    • (1966) Inf. Control , vol.9 , pp. 602-619
    • Martin-Lof, P.1
  • 32
    • 0020271558 scopus 로고
    • In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science. IEEE, New York,]
    • PLUMSTEAD, J. Inferring a sequence generated by a linear congruence. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science. IEEE, New York, 1982, pp. 153-159.]
    • (1982) Inferring a sequence generated by a linear congruence , pp. 153-159
    • Plumstead, J.1
  • 34
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • (Feb.
    • RIVEST, R., SHAMIR, A., and ADLEMAN, L. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 21, 2 (Feb. 1978), 120-126.]
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 35
    • 0002411710 scopus 로고    scopus 로고
    • Zufaelligkeit und Wahrscheinlichkeit
    • Springer-Verlag, New York, 197 i.]
    • SCHNORR, C.P. Zufaelligkeit und Wahrscheinlichkeit. Lecture Notes in Mathematics, Vol. 218. Springer-Verlag, New York, 197 i.]
    • Lecture Notes in Mathematics , vol.218
    • Schnorr, C.P.1
  • 37
    • 0020931594 scopus 로고
    • Proceedings of the 15th ACM Symposium on Theory of Computing (Boston, Mass., Apr. 25-27). ACM, New York,]
    • SIr'SER, M. A complexity theoretic approach to randomness, in Proceedings of the 15th ACM Symposium on Theory of Computing (Boston, Mass., Apr. 25-27). ACM, New York, 1983, 330-335.]
    • (1983) A complexity theoretic approach to randomness , pp. 330-335
    • Sir'Ser, M.1
  • 39
    • 0020881177 scopus 로고
    • In Proceedings of 24th IEEE Symposium on Foundations of Computer Science. IEEE, New York,]
    • WILBER, R.E. Randomness and the density of hard problems. In Proceedings of 24th IEEE Symposium on Foundations of Computer Science. IEEE, New York, 1983, pp. 335-342.]
    • (1983) Randomness and the density of hard problems , pp. 335-342
    • Wilber, R.E.1
  • 40
    • 4243132083 scopus 로고
    • Ed. Plenum Press, New York,]
    • VAZIRANI, U. V., and VAZIRANI, V.V. RSA bits are.732 + ~ secure, tn Advances in Cryptology: Proceedings ofCrypto-83, D. Chaum, Ed. Plenum Press, New York, 1984, pp. 369-375.]
    • (1984) , pp. 369-375
    • Vazirani, U.V.1    Vazirani, V.V.2    Chaum, D.3
  • 41
    • 0021548502 scopus 로고
    • In Proceedings of the 25th IEEE Symposium on Foundations of Computer Science. IEEE, New York,]
    • VAZIRANI, U. V., AND VAZIRANI, V.V. Efficient and secure pseudo-random number generation. In Proceedings of the 25th IEEE Symposium on Foundations of Computer Science. IEEE, New York, 1984, pp. 458-463.]
    • (1984) Efficient and secure pseudo-random number generation , pp. 458-463
    • Vazirani, U.V.1    Vazirani, V.V.2
  • 42
    • 0020301290 scopus 로고
    • In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science. IEEE, New York, I.]
    • YAO, A.C. Theory and applications of trapdoor functions. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science. IEEE, New York, 1982, pp 80-9 I.]
    • (1982) Theory and applications of trapdoor functions , pp. 80-89
    • Yao, A.C.1
  • 43
    • 77951203397 scopus 로고
    • The complexity of finite objects and the algorithmic concepts of randomness and information
    • ZVONKIN, A. K., AND LEVIN, L.A. The complexity of finite objects and the algorithmic concepts of randomness and information. UMN (Russian Math. Surveys), 25, 6 (1970), 83-124.]
    • (1970) UMN (Russian Math. Surveys) , vol.25 , Issue.6 , pp. 83-124
    • Zvonkin, A.K.1    Levin, L.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.