메뉴 건너뛰기




Volumn , Issue , 2002, Pages 376-385

On the (non)universality of the one-time pad

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; ERRORS; GRAPH THEORY; PROBABILITY; RANDOM PROCESSES; THEOREM PROVING;

EID: 0036957025     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (64)

References (35)
  • 1
    • 0002128548 scopus 로고
    • The influence of large coalitions
    • M. Ajtai, N. Linial. The influence of large coalitions. Combinatorica, 13(2):129-145, 1993.
    • (1993) Combinatorica , vol.13 , Issue.2 , pp. 129-145
    • Ajtai, M.1    Linial, N.2
  • 2
    • 0033341167 scopus 로고    scopus 로고
    • Trevisan. Dispersers, deterministic amplification, and weak random sources
    • A. Andreev, A. Clementi, J. Rolim, L. Trevisan. Dispersers, deterministic amplification, and weak random sources. In SIAM J. on Comput., 28(6):2103-2116, 1999.
    • (1999) SIAM J. on Comput. , vol.28 , Issue.6 , pp. 2103-2116
    • Andreev, A.1    Clementi, A.2    Rolim, J.L.3
  • 3
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. Bennett, G. Brassard, and J. Robert. Privacy Amplification by public discussion. In SIAM J. on Computing, pp. 17(2):210-229, 1988.
    • (1988) SIAM J. on Computing , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.1    Brassard, G.2    Robert, J.3
  • 5
    • 51249178917 scopus 로고
    • Independent unbiased coin-flipsfrom a correclated biased source - a finite state Markov chain
    • M. Blum. Independent unbiased coin-flipsfrom a correclated biased source - a finite state Markov chain. Combinatorica, 6(2):97-108, 1986.
    • (1986) Combinatorica , vol.6 , Issue.2 , pp. 97-108
    • Blum, M.1
  • 6
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • L. Carter and M. Wegman. Universal classes of hash functions. In JCSS, vol. 18, pp. 143-154, 1979.
    • (1979) JCSS , vol.18 , pp. 143-154
    • Carter, L.1    Wegman, M.2
  • 8
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • B. Chor, O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput., 17(2):230-261, 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 9
    • 0024766880 scopus 로고
    • Dispersers, deterministic amplification, and weak random sources
    • A. Cohen, A. Wigderson. Dispersers, deterministic amplification, and weak random sources. In Proc. of FOCS, pp. 14-19, 1989.
    • (1989) Proc. of FOCS , pp. 14-19
    • Cohen, A.1    Wigderson, A.2
  • 10
    • 84879512073 scopus 로고    scopus 로고
    • New imperfect random source with applications to coin-flipping
    • Y. Dodis. New Imperfect Random Source with Applications to Coin-Flipping. In Proc. of ICALP, pp. 297-309, 2001.
    • (2001) Proc. of ICALP , pp. 207-309
    • Dodis, Y.1
  • 11
    • 84945116168 scopus 로고    scopus 로고
    • On perfect and adaptive security in exposure-resilient cryptography
    • Y. Dodis, A. Sahai and A. Smith. On Perfect and Adaptive Security in Exposure-Resilient Cryptography. In Proc. of EuroCrypt, pp. 301-324, 2001.
    • (2001) Proc. of EuroCrypt , pp. 301-324
    • Dodis, Y.1    Sahai, A.2    Smith, A.3
  • 12
    • 0012578418 scopus 로고
    • The efficient construction of an unbiased random sequence
    • P. Elias. The Efficient Construction of an Unbiased Random Sequence. Ann. Math. Stat., 43(3):865-870, 1972.
    • (1972) Ann. Math. Stat. , vol.43 , Issue.3 , pp. 865-870
    • Elias, P.1
  • 13
    • 85024964126 scopus 로고
    • On the bit extraction problem
    • J. Friedman. On the Bit Extraction Problem. In Proc. of FOCS, pp. 314-319, 1992.
    • (1992) Proc. of FOCS , pp. 314-319
    • Friedman, J.1
  • 15
    • 84955569997 scopus 로고    scopus 로고
    • Universal hash functions from exponential sums over finite fields and galois rings
    • T. Helleseth, T. Johansson. Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings. In proc. of CRYPTO, pp. 31-44, 1996.
    • (1996) Proc. of CRYPTO , pp. 31-44
    • Helleseth, T.1    Johansson, T.2
  • 16
    • 0002431403 scopus 로고
    • The influence of variables on boolean functions
    • J. Kahn, G. Kalai, N. Linial. The Influence of Variables on Boolean Functions. In Proc. of 30th FOCS, pp. 68-80, 1989.
    • (1989) Proc. of 30th FOCS , pp. 68-80
    • Kahn, J.1    Kalai, G.2    Linial, N.3
  • 17
    • 0012575273 scopus 로고    scopus 로고
    • Almost k-wise independent sample spaces and their cryptologic applications
    • K. Kurosawa, T. Johansson and D. Stinson. Almost k-wise independent sample spaces and their cryptologic applications. In J. of Cryptology, 14:231-253, 2001.
    • (2001) J. of Cryptology , vol.14 , pp. 231-253
    • Kurosawa, K.1    Johansson, T.2    Stinson, D.3
  • 18
    • 0012523366 scopus 로고
    • Some extremal problems arising from discrete control processes
    • D. Lichtenstein, N. Linial, M. Saks. Some Extremal Problems Arising from Discrete Control Processes. Combinatorica, 9:269-287, 1989.
    • (1989) Combinatorica , vol.9 , pp. 269-287
    • Lichtenstein, D.1    Linial, N.2    Saks, M.3
  • 19
    • 0012524233 scopus 로고
    • On the impossibility of private key cryptography with weakly random keys
    • J. McInnes, B. Pinkas. On the Impossibility of Private Key Cryptography with Weakly Random Keys. In Proc. of CRYPTO, pp. 421-435, 1990.
    • (1990) Proc. of CRYPTO , pp. 421-435
    • McInnes, J.1    Pinkas, B.2
  • 20
    • 0033075850 scopus 로고    scopus 로고
    • Extracting randomness: A survey and new constructions
    • N. Nisan, A. Ta-Shma. Extracting Randomness: a survey and new constructions. In JCSS, 58(1):148-173, 1999.
    • (1999) JCSS , vol.58 , Issue.1 , pp. 148-173
    • Nisan, N.1    Ta-Shma, A.2
  • 21
    • 0030086632 scopus 로고    scopus 로고
    • Randomness is linear in space
    • N. Nisan, D. Zuckerman. Randomness is Linear in Space. In JCSS, 52(1):43-52, 1996.
    • (1996) JCSS , vol.52 , Issue.1 , pp. 43-52
    • Nisan, N.1    Zuckerman, D.2
  • 23
    • 0021469810 scopus 로고
    • Generating quasi-random sequences from semi-random sources
    • M. Sántha, U. Vazirani. Generating Quasi-Random Sequences from Semi-Random Sources. Journal of Computer and System Sciences, 33(1): 75-87, 1986.
    • (1986) Journal of Computer and System Sciences , vol.33 , Issue.1 , pp. 75-87
    • Sántha, M.1    Vazirani, U.2
  • 24
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon. Communication Theory of Secrecy systems. In Bell Systems Technical J., 28:656-715, 1949.
    • (1949) Bell Systems Technical J. , vol.28 , pp. 656-715
    • Shannon, C.1
  • 25
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control schemes and their application
    • G. J. Simmons, ed., IEEE Press
    • G. J. Simmons. An introduction to shared secret and/or shared control schemes and their application. In "Contemporary Cryptology, the Science of Information Integrity", G. J. Simmons, ed., IEEE Press, pp. 441-497, 1992.
    • (1992) Contemporary Cryptology, the Science of Information Integrity , pp. 441-497
    • Simmons, G.J.1
  • 26
    • 0003570960 scopus 로고
    • Implementing discrete mathematics: Combinatorics and graph theory with mathematica
    • Addison-Wesley
    • S. Skiena. Implementing Discrete Mathematics: Combinatorics and Graph Theory with Mathematica. Addison-Wesley, 1990.
    • (1990)
    • Skiena, S.1
  • 27
    • 0000410707 scopus 로고
    • Universal hashing and authentication codes
    • D. Stinson. Universal Hashing and Authentication Codes. In Designs, Codes and Cryptography, 4(4):369-380, 1994.
    • (1994) Designs, Codes and Cryptography , vol.4 , Issue.4 , pp. 369-380
    • Stinson, D.1
  • 28
    • 0032624550 scopus 로고    scopus 로고
    • Construction of extractors using pseudorandom generators
    • L. Trevisan. Construction of Extractors Using PseudoRandom Generators. In Proc. of STOC, pp. 141-148, 1999.
    • (1999) Proc. of STOC , pp. 141-148
    • Trevisan, L.1
  • 30
    • 0004262006 scopus 로고
    • Randomness, adversaries and computation
    • PhD Thesis, University of California, Berkeley
    • U. Vazirani. Randomness, Adversaries and Computation. PhD Thesis, University of California, Berkeley, 1986.
    • (1986)
    • Vazirani, U.1
  • 31
    • 51249175241 scopus 로고
    • Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources
    • U. Vazirani. Strong Communication Complexity or Generating Quasi-Random Sequences from Two Communicating Semi-Random Sources. Combinatorica, 7(4):375-392, 1987.
    • (1987) Combinatorica , vol.7 , Issue.4 , pp. 375-392
    • Vazirani, U.1
  • 32
    • 0022252339 scopus 로고
    • Random polynomial time is equal to slightly-random polynomial time
    • U. Vazirani, V. Vazirani. Random polynomial time is equal to slightly-random polynomial time. In Proc. of 26th FOCS, pp. 417-428, 1985.
    • (1985) Proc. of 26th FOCS , pp. 417-428
    • Vazirani, U.1    Vazirani, V.2
  • 33
    • 4243554239 scopus 로고
    • Secret signaling systems
    • US Patent
    • G. Vernam. Secret Signaling Systems. US Patent, 1919.
    • (1919)
    • Vernam, G.1
  • 35
    • 0001023343 scopus 로고    scopus 로고
    • Simulating BPP using a general weak random source
    • D. Zuckerman. Simulating BPP Using a General Weak Random Source. Algorithmica, 16(4/5):367-391, 1996.
    • (1996) Algorithmica , vol.16 , Issue.4-5 , pp. 367-391
    • Zuckerman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.