메뉴 건너뛰기




Volumn 58, Issue 2, 1999, Pages 336-375

Synthesizers and their application to the parallel construction of pseudo-random functions

Author keywords

[No Author keywords available]

Indexed keywords

FUNCTIONS; RANDOM PROCESSES;

EID: 0032647187     PISSN: 00220000     EISSN: None     Source Type: Journal    
DOI: 10.1006/jcss.1998.1618     Document Type: Article
Times cited : (83)

References (67)
  • 2
    • 0023985196 scopus 로고
    • RSA and Rabin functions: Certain parts are as hard as the whole
    • W. B. Alexi, B. Chor, O. Goldreich, and C. P. Schnorr, RSA and Rabin functions: Certain parts are as hard as the whole, SIAM J. Comput. 17, No. 2 (1988), 194-209.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 194-209
    • Alexi, W.B.1    Chor, B.2    Goldreich, O.3    Schnorr, C.P.4
  • 4
    • 0026940019 scopus 로고
    • Multiparty protocols, pseudo-random generators for logspace, and time-space tradeoffs
    • L. Babai, N. Nisan, and M. Szegedy, Multiparty protocols, pseudo-random generators for logspace, and time-space tradeoffs, J. Comput. System Sci. 45, No. 2 (1992), 204-232.
    • (1992) J. Comput. System Sci. , vol.45 , Issue.2 , pp. 204-232
    • Babai, L.1    Nisan, N.2    Szegedy, M.3
  • 5
    • 0023985412 scopus 로고
    • How to generate factored random numbers
    • E. Bach, How to generate factored random numbers, SIAM J. Comput. 17 No. 2 (1988), 179-193.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 179-193
    • Bach, E.1
  • 6
    • 0022811668 scopus 로고
    • Log depth circuits for division and related problems
    • P. W. Beame, S. A. Cook, and H. J. Hoover, Log depth circuits for division and related problems, SIAM J. Comput. 15 (1986), 994-1003.
    • (1986) SIAM J. Comput. , vol.15 , pp. 994-1003
    • Beame, P.W.1    Cook, S.A.2    Hoover, H.J.3
  • 7
    • 85024585723 scopus 로고
    • Incremental cryptography: The case of hashing and signing
    • Advances in Cryptology - CRYPTO '94," Springer-Verlag, New York/Berlin
    • M. Bellare, O. Goldreich, and S. Goldwasser, Incremental cryptography: The case of hashing and signing, in "Advances in Cryptology - CRYPTO '94," Lecture Notes in Computer Science, Vol. 839, pp. 216-233, Springer-Verlag, New York/Berlin, 1994.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 216-233
    • Bellare, M.1    Goldreich, O.2    Goldwasser, S.3
  • 9
    • 85032877754 scopus 로고
    • New paradigms for digital signatures and message authentication based on non-interactive zero knowledge proofs
    • Advances in Cryptology - CRYPTO '89," Springer-Verlag
    • M. Bellare and S. Goldwasser, New paradigms for digital signatures and message authentication based on non-interactive zero knowledge proofs, in "Advances in Cryptology - CRYPTO '89," Lecture Notes in Computer Science, Vol. 435, pp. 194-211, Springer-Verlag, 1990.
    • (1990) Lecture Notes in Computer Science , vol.435 , pp. 194-211
    • Bellare, M.1    Goldwasser, S.2
  • 10
    • 85031632127 scopus 로고    scopus 로고
    • Generalized Diffie-Hellman modulo a composite is not weaker than factoring
    • E. Biham, D. Boneh, and O. Reingold, Generalized Diffie-Hellman modulo a composite is not weaker than factoring, in "Theory of Cryptography Library," Record 97-14 at http://theory.lcs.mit.edu/t ̃cryptol/homepage.html.
    • Theory of Cryptography Library,Record , vol.97 , Issue.14
    • Biham, E.1    Boneh, D.2    Reingold, O.3
  • 11
    • 0022716288 scopus 로고
    • A simple secure unpredictable pseudo-random number generator
    • L. Blum, M. Blum, and M. Shub, A simple secure unpredictable pseudo-random number generator, SIAM J. Comput. 15 (1986), 364-383.
    • (1986) SIAM J. Comput. , vol.15 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 12
    • 0028482823 scopus 로고    scopus 로고
    • Checking the correctness of memories
    • Preliminary version: "Proc. 31st Symp. on Foundations of Computer Science, 1990
    • M. Blum, W. Evans, P. Gemmell, S. Kannan, and M. Naor, Checking the correctness of memories, in "Algorithmica, 1994," pp. 225-244. [Preliminary version: "Proc. 31st Symp. on Foundations of Computer Science, 1990"]
    • Algorithmica, 1994 , pp. 225-244
    • Blum, M.1    Evans, W.2    Gemmell, P.3    Kannan, S.4    Naor, M.5
  • 13
    • 84877639283 scopus 로고
    • Cryptographic primitives based on hard learning problems
    • Advances in Cryptology - CRYPTO '93," Springer-Verlag
    • A. Blum, M. Furst, M. Kearns, and R. J. Lipton, Cryptographic primitives based on hard learning problems, in "Advances in Cryptology - CRYPTO '93," Lecture Notes in Computer Science, Vol. 773, pp. 278-291, Springer-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 278-291
    • Blum, A.1    Furst, M.2    Kearns, M.3    Lipton, R.J.4
  • 14
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequence of pseudo-random bits
    • M. Blum and S. Micali, How to generate cryptographically strong sequence of pseudo-random bits, SIAM J. Comput. 13 (1984), 850-864.
    • (1984) SIAM J. Comput. , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 15
    • 84955604812 scopus 로고    scopus 로고
    • Algorithms for Black-Box fields and their application to cryptography
    • Springer
    • D. Boneh and R. Lipton, Algorithms for Black-Box fields and their application to cryptography, in "Advances in Cryptology - CRYPTO '96," LNCS, Vol. 1109, pp. 283-297, Springer, 1996.
    • (1996) Advances in Cryptology - CRYPTO '96, LNCS , vol.1109 , pp. 283-297
    • Boneh, D.1    Lipton, R.2
  • 16
    • 0008966306 scopus 로고
    • Modern Cryptology
    • Springer-Verlag, New York/Berlin
    • G. Brassard, "Modern Cryptology," Lecture Notes in Computer Science, Vol. 325, Springer-Verlag, New York/Berlin, 1988.
    • (1988) Lecture Notes in Computer Science , vol.325
    • Brassard, G.1
  • 18
    • 33847493960 scopus 로고
    • Complexity theoretic issues concerning block ciphers related to D.E.S
    • Advances in Cryptology - CRYPTO '90," Springer-Verlag
    • R. Cleve, Complexity theoretic issues concerning block ciphers related to D.E.S., in "Advances in Cryptology - CRYPTO '90," Lecture Notes in Computer Science, Vol. 537, pp. 530-544, Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.537 , pp. 530-544
    • Cleve, R.1
  • 20
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • B. Chor and O. Goldreich, Unbiased bits from sources of weak randomness and probabilistic communication complexity, SIAM J. Comput. 17 (1988), 230-261.
    • (1988) SIAM J. Comput. , vol.17 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 22
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory 22, No. 6 (1976), 644-654.
    • (1976) IEEE Trans. Inform. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 23
    • 84957376046 scopus 로고    scopus 로고
    • Stronger security proofs for RSA and Rabin bits
    • Advances in Cryptology - EUROCRYPT '97, Springer-Verlag
    • R. Fischlin and C. P. Schnorr, Stronger security proofs for RSA and Rabin bits, in "Advances in Cryptology - EUROCRYPT '97," Lecture Notes in Computer Science, Vol. 1233, pp. 267-279, Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 267-279
    • Fischlin, R.1    Schnorr, C.P.2
  • 24
    • 84969346237 scopus 로고
    • Two remarks concerning the Goldwasser-Micali-Rivest signature scheme
    • Advances in Cryptology - CRYPTO '86," Springer-Verlag
    • O. Goldreich, Two remarks concerning the Goldwasser-Micali-Rivest signature scheme, in "Advances in Cryptology - CRYPTO '86," Lecture Notes in Computer Science, Vol. 263, pp. 104-110, Springer-Verlag, 1987.
    • (1987) Lecture Notes in Computer Science , vol.263 , pp. 104-110
    • Goldreich, O.1
  • 26
    • 85031619888 scopus 로고
    • Electronic publication: Electronic Colloquium on Computational Complexity.
    • O. Goldreich, "Foundations of Cryptography (Fragments of a Book)," 1995. Electronic publication: http://www.eccc.uni-trier.de/eccc/info/ECCC-Books/eccc-books.html (Electronic Colloquium on Computational Complexity).
    • (1995) Foundations of Cryptography (Fragments of a Book)
    • Goldreich, O.1
  • 28
    • 85028838274 scopus 로고
    • On the cryptographic applications of random functions
    • Advances in Cryptology - CRYPTO '84," Springer-Verlag
    • O. Goldreich, S. Goldwasser, and S. Micali, On the cryptographic applications of random functions, in "Advances in Cryptology - CRYPTO '84," Lecture Notes in Computer Science, Vol. 196, pp. 276-288, Springer-Verlag, 1985.
    • (1985) Lecture Notes in Computer Science , vol.196 , pp. 276-288
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 32
    • 70350343066 scopus 로고    scopus 로고
    • Construction of a pseudo-random generator from any one-way function
    • to appear in [Preliminary versions by Impagliazzo et al. in "21st STOC 1989" and Hastad in "22nd STOC, 1990"]
    • J. Hastad, R. Impagliazzo, L. A. Levin, and M. Luby, Construction of a pseudo-random generator from any one-way function, SIAM J. Comput., to appear in [Preliminary versions by Impagliazzo et al. in "21st STOC 1989" and Hastad in "22nd STOC, 1990"]
    • SIAM J. Comput.
    • Hastad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 33
    • 0345352219 scopus 로고
    • Public randomness in cryptography
    • Advances in Cryptology - CRYPTO '92," Springer-Verlag
    • A. Herzberg and M. Luby, Public randomness in cryptography, in "Advances in Cryptology - CRYPTO '92," Lecture Notes in Computer Science, Vol. 740, pp. 421-432, Springer-Verlag, 1992.
    • (1992) Lecture Notes in Computer Science , vol.740 , pp. 421-432
    • Herzberg, A.1    Luby, M.2
  • 35
    • 0001143795 scopus 로고    scopus 로고
    • Efficient cryptographic schemes probably secure as subset sum
    • R. Impagliazzo and M. Naor, Efficient cryptographic schemes probably secure as subset sum, J. Cryptology 9 (1996), 199-216.
    • (1996) J. Cryptology , vol.9 , pp. 199-216
    • Impagliazzo, R.1    Naor, M.2
  • 37
    • 0002065879 scopus 로고
    • Parallel algorithms for shared-memory machines
    • (J. van Leeuwen, Ed.), MIT Press, Cambridge, MA
    • R. M. Karp and V. Ramachandran, Parallel algorithms for shared-memory machines, in "Handbook of Theoretical Computer Science, Vol. A" (J. van Leeuwen, Ed.), pp. 869-941, MIT Press, Cambridge, MA, 1990.
    • (1990) Handbook of Theoretical Computer Science , vol.A , pp. 869-941
    • Karp, R.M.1    Ramachandran, V.2
  • 38
    • 0028324717 scopus 로고
    • Cryptographic limitations on learning Boolean formulae and finite automata
    • M. Kearns and L. Valiant, Cryptographic limitations on learning Boolean formulae and finite automata, J. Assoc. Comput. Mach. 41, No. 1 (1994), 67-95.
    • (1994) J. Assoc. Comput. Mach. , vol.41 , Issue.1 , pp. 67-95
    • Kearns, M.1    Valiant, L.2
  • 40
    • 0027627287 scopus 로고
    • Constant depth circuits, Fourier transform, and learnability
    • N. Linial, Y. Mansour, and N. Nisan, Constant depth circuits, Fourier transform, and learnability, J. Assoc. Comput. Mach. 40, No. 3 (1993), 607-620.
    • (1993) J. Assoc. Comput. Mach. , vol.40 , Issue.3 , pp. 607-620
    • Linial, N.1    Mansour, Y.2    Nisan, N.3
  • 42
    • 0023984964 scopus 로고
    • How to construct pseudo-random permutations and pseudo-random functions
    • M. Luby and C. Rackoff, How to construct pseudo-random permutations and pseudo-random functions, SIAM J. Comput. 17 (1988), 373-386.
    • (1988) SIAM J. Comput. , vol.17 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 44
    • 84947597805 scopus 로고
    • Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
    • Springer
    • U. Maurer, Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms, in "Advances in Cryptology - CRYPTO '94," LNCS, Vol.740, pp. 271-281, Springer, 1994.
    • (1994) Advances in Cryptology - CRYPTO '94," LNCS , vol.740 , pp. 271-281
    • Maurer, U.1
  • 45
    • 0024139776 scopus 로고
    • A key distribution system equivalent to factoring
    • K. McCurley, A key distribution system equivalent to factoring, J. of Cryptology 1 (1988), 95-105.
    • (1988) J. of Cryptology , vol.1 , pp. 95-105
    • McCurley, K.1
  • 46
    • 0003064824 scopus 로고    scopus 로고
    • On the construction of pseudo-random permutations: Luby-Rackoff revisited
    • M. Naor and O. Reingold, On the construction of pseudo-random permutations: Luby-Rackoff revisited, J. of Cryptology 12 (1999), 29-66.
    • (1999) J. of Cryptology , vol.12 , pp. 29-66
    • Naor, M.1    Reingold, O.2
  • 49
    • 0000947929 scopus 로고
    • Pseudo-random generators for space-bounded computation
    • N. Nisan, Pseudo-random generators for space-bounded computation, Combinatorica 12, No. 4 (1992), 449-461.
    • (1992) Combinatorica , vol.12 , Issue.4 , pp. 449-461
    • Nisan, N.1
  • 51
  • 56
    • 0003106775 scopus 로고
    • Artin's conjecture for primitive roots
    • Springer-Verlag
    • M. Ram Murty, Artin's conjecture for primitive roots, in "The Mathematical Intelligencer," Vol. 10, No. 4, pp. 59-67, Springer-Verlag, 1988.
    • (1988) The Mathematical Intelligencer , vol.10 , Issue.4 , pp. 59-67
    • Ram Murty, M.1
  • 59
    • 0023985374 scopus 로고
    • Efficient parallel pseudo-random number generation
    • J. H. Reif and J. D. Tygar, Efficient parallel pseudo-random number generation, SIAM J. Comput. 17, No. 2 (1988), 404-411.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 404-411
    • Reif, J.H.1    Tygar, J.D.2
  • 60
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman, A method for obtaining digital signature and public key cryptosystems, Comm. ACM 21 (1978), 120-126.
    • (1978) Comm. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 61
    • 38049015677 scopus 로고    scopus 로고
    • On the generation of cryptographically strong pseudo-random number sequences
    • A. Shamir, On the generation of cryptographically strong pseudo-random number sequences, in "ACM Trans. Comput. Sys., 1983," pp. 38-44.
    • ACM Trans. Comput. Sys., 1983 , pp. 38-44
    • Shamir, A.1
  • 63
    • 0009435059 scopus 로고
    • Composite Diffie-Hellman Public-Key Generating Systems Are Hard to Break
    • Computer Science Department, Technion, Israel
    • Z. Shmuely, "Composite Diffie-Hellman Public-Key Generating Systems Are Hard to Break," Technical Report No. 356, Computer Science Department, Technion, Israel, 1985.
    • (1985) Technical Report No. 356 , vol.356
    • Shmuely, Z.1
  • 64
    • 0021518106 scopus 로고
    • A theory of the learnable
    • L. G. Valiant, A theory of the learnable, Comm. ACM 21 (1984), 1134-1142.
    • (1984) Comm. ACM , vol.21 , pp. 1134-1142
    • Valiant, L.G.1
  • 65
    • 51249175241 scopus 로고
    • Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources
    • U. V. Vazirani, Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources, Combinatorica 7 (1987).
    • (1987) Combinatorica , vol.7
    • Vazirani, U.V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.