-
1
-
-
0023985196
-
RSA and Rabin functions: Certain parts are as hard as the whole
-
W. ALEXI, B. CHOR, O. GOLDREICH, AND C. P. SCHNORR, RSA and Rabin functions: Certain parts are as hard as the whole, SIAM J. Comput., 17 (1988), pp. 194-209.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 194-209
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.P.4
-
2
-
-
0001338853
-
BPP has subexponential time simulations unless EXPTIME has publishable proofs
-
L. BABAI, L. FORTNOW, N. NISAN, AND A. WIGDERSON, BPP has subexponential time simulations unless EXPTIME has publishable proofs, Comput. Complexity, 3 (1993), pp. 307-318.
-
(1993)
Comput. Complexity
, vol.3
, pp. 307-318
-
-
Babai, L.1
Fortnow, L.2
Nisan, N.3
Wigderson, A.4
-
3
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. BENNETT, G. BRASSARD, AND J.-M. ROBERT, Privacy amplification by public discussion, SIAM J. Comput., 17 (1988), pp. 210-229.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
4
-
-
51249178917
-
Independent unbiased coin flips from a correlated biased source - A finite state Markov chain
-
M. BLUM, Independent unbiased coin flips from a correlated biased source - a finite state Markov chain, Combinatoria, 6 (1986), pp. 97-108.
-
(1986)
Combinatoria
, vol.6
, pp. 97-108
-
-
Blum, M.1
-
5
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. BLUM AND S. MICALI, How to generate cryptographically strong sequences of pseudo-random bits, SIAM J. Comput., 13 (1984), pp. 850-864.
-
(1984)
SIAM J. Comput.
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
6
-
-
0037708071
-
Pseudo-random generators and complexity classes
-
S. Micali, ed., JAI Press, Greenwich, CT
-
R. BOPPANA AND R. HIRSCHFELD, Pseudo-random generators and complexity classes, in Advances in Comp. Research 5, S. Micali, ed., JAI Press, Greenwich, CT, 1989, pp. 1-26.
-
(1989)
Advances in Comp. Research
, vol.5
, pp. 1-26
-
-
Boppana, R.1
Hirschfeld, R.2
-
7
-
-
0024303956
-
Inferring sequences produced by pseudo-random number generators
-
J. BOYAR, Inferring sequences produced by pseudo-random number generators, J. Assoc. Comput. Mach., 36 (1989), pp. 129-141.
-
(1989)
J. Assoc. Comput. Mach.
, vol.36
, pp. 129-141
-
-
Boyar, J.1
-
8
-
-
0018456171
-
Universal classes of hash functions
-
L. CARTER AND M. WEGMAN, Universal classes of hash functions, J. Comput. System Sci., 18 (1979), pp. 143-154.
-
(1979)
J. Comput. System Sci.
, vol.18
, pp. 143-154
-
-
Carter, L.1
Wegman, M.2
-
9
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complex
-
B. CHOR AND O. GOLDREICH, Unbiased bits from sources of weak randomness and probabilistic communication complex, SIAM J. Comput., 17 (1988), pp. 230-261.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
11
-
-
0025430107
-
A note on computational indistinguishability
-
O. GOLDREICH, A note on computational indistinguishability, Inform. Process. Lett., 34 (1990), pp. 277-281.
-
(1990)
Inform. Process. Lett.
, vol.34
, pp. 277-281
-
-
Goldreich, O.1
-
12
-
-
0022793132
-
How to construct random functions
-
O. GOLDREICH, S. GOLDWASSER, AND S. MICALI, How to construct random functions, J. Assoc. Comput. Mach., 33 (1986), pp. 792-807.
-
(1986)
J. Assoc. Comput. Mach.
, vol.33
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
13
-
-
0027797493
-
On the existence of pseudorandom generators
-
O. GOLDREICH, H. KRAWCZYK, AND M. LUBY, On the existence of pseudorandom generators, SIAM J. Comput., 22 (1993), pp. 1163-1175.
-
(1993)
SIAM J. Comput.
, vol.22
, pp. 1163-1175
-
-
Goldreich, O.1
Krawczyk, H.2
Luby, M.3
-
14
-
-
0024868772
-
A hard-core predicate for any one-way function
-
ACM, New York
-
O. GOLDREICH AND L. A. LEVIN, A hard-core predicate for any one-way function, in Proc. 21st ACM Sympos. on Theory of Computing, ACM, New York, 1989, pp. 25-32.
-
(1989)
Proc. 21st ACM Sympos. on Theory of Computing
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
15
-
-
71149116146
-
Proofs that yield nothing but their validity, or all languages in NP have zero-knowledge proofs
-
O. GOLDREICH, S. MICALI, AND A. WIGDERSON, Proofs that yield nothing but their validity, or all languages in NP have zero-knowledge proofs, J. Assoc. Comput. Mach., 38 (1991), pp. 691-729.
-
(1991)
J. Assoc. Comput. Mach.
, vol.38
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
17
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. GOLDWASSER, S. MICALI, AND C. RACKOFF, The knowledge complexity of interactive proof systems, SIAM J. Comput., 18 (1989), pp. 186-208.
-
(1989)
SIAM J. Comput.
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
18
-
-
0020279669
-
Why and how to establish a private code on a public network
-
IEEE, New York
-
S. GOLDWASSER, S. MICALI, AND P. TONG, Why and how to establish a private code on a public network, in Proc. 23rd IEEE Sympos. on Found. of Comput. Sci., IEEE, New York, 1982, pp. 134-144.
-
(1982)
Proc. 23rd IEEE Sympos. on Found. of Comput. Sci.
, pp. 134-144
-
-
Goldwasser, S.1
Micali, S.2
Tong, P.3
-
19
-
-
0025115363
-
Pseudo-random generators under uniform assumptions
-
ACM, New York
-
J. HÅSTAD, Pseudo-random generators under uniform assumptions, in Proc. 22nd ACM Sympos. on Theory of Computing, ACM, New York, 1990, pp. 395-404.
-
(1990)
Proc. 22nd ACM Sympos. on Theory of Computing
, pp. 395-404
-
-
Håstad, J.1
-
20
-
-
0345352219
-
Public randomness in cryptography
-
Advances in Cryptology, Proc. 12th Annual Cryptology Conf. (CRYPTO '92), Santa Barbara, CA, 1992, Springer-Verlag, Berlin
-
A. HERZBERG AND M. LUBY, Public randomness in cryptography, in Advances in Cryptology, Proc. 12th Annual Cryptology Conf. (CRYPTO '92), Santa Barbara, CA, 1992, Lecture Notes in Comput. Sci. 740, Springer-Verlag, Berlin, 1993, pp. 421-432.
-
(1993)
Lecture Notes in Comput. Sci.
, vol.740
, pp. 421-432
-
-
Herzberg, A.1
Luby, M.2
-
21
-
-
0024770898
-
One-way functions are essential for information based cryptography
-
IEEE, New York
-
R. IMPAGLIAZZO AND M. LUBY, One-way functions are essential for information based cryptography, in Proc. 30th IEEE Sympos. on Found. of Comput. Sci., IEEE, New York, 1989, pp. 230-235.
-
(1989)
Proc. 30th IEEE Sympos. on Found. of Comput. Sci.
, pp. 230-235
-
-
Impagliazzo, R.1
Luby, M.2
-
22
-
-
0024866111
-
Pseudo-random number generation from one-way functions
-
ACM, New York
-
R. IMPAGLIAZZO, L. LEVIN, AND M. LUBY, Pseudo-random number generation from one-way functions, in Proc. 21st ACM Sympos. on Theory of Computing, ACM, New York, 1989, pp. 12-24.
-
(1989)
Proc. 21st ACM Sympos. on Theory of Computing
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.2
Luby, M.3
-
23
-
-
0001143795
-
Efficient cryptographic schemes provably as secure as subset sum
-
R. IMPAGLIAZZO AND M. NAOR, Efficient cryptographic schemes provably as secure as subset sum, J. Cryptology, 9 (1996), pp. 192-216.
-
(1996)
J. Cryptology
, vol.9
, pp. 192-216
-
-
Impagliazzo, R.1
Naor, M.2
-
24
-
-
0024866742
-
Limits on the provable consequences of one-way functions
-
ACM, New York
-
R. IMPAGLIAZZO AND S. RUDICH, Limits on the provable consequences of one-way functions, in 21st ACM Sympos. on Theory of Computing, ACM, New York, 1989, pp. 44-56.
-
(1989)
21st ACM Sympos. on Theory of Computing
, pp. 44-56
-
-
Impagliazzo, R.1
Rudich, S.2
-
25
-
-
0024771884
-
How to recycle random bits
-
IEEE, New York
-
R. IMPAGLIAZZO AND D. ZUCKERMAN, How to recycle random bits, in Proc. 30th IEEE Sympos. on Found. of Comput. Sci., IEEE, New York, 1989, pp. 248-253.
-
(1989)
Proc. 30th IEEE Sympos. on Found. of Comput. Sci.
, pp. 248-253
-
-
Impagliazzo, R.1
Zuckerman, D.2
-
27
-
-
0001902056
-
Three approaches to the concept of the amount of information
-
A. N. KOLMOGOROV, Three approaches to the concept of the amount of information, Problems Inform Transmission, 1 (1965), pp. 1-7.
-
(1965)
Problems Inform Transmission
, vol.1
, pp. 1-7
-
-
Kolmogorov, A.N.1
-
28
-
-
0012168966
-
How to predict congruential generators
-
H. KRAWCZYK, How to predict congruential generators, J. Algorithms, 13 (1992), pp. 527-545.
-
(1992)
J. Algorithms
, vol.13
, pp. 527-545
-
-
Krawczyk, H.1
-
29
-
-
51249173191
-
One-way function and pseudorandom generators
-
L. A. LEVIN, One-way function and pseudorandom generators, Combinatorica, 7 (1987), pp. 357-363.
-
(1987)
Combinatorica
, vol.7
, pp. 357-363
-
-
Levin, L.A.1
-
30
-
-
0042496106
-
Randomness and non-determinism
-
L. A. LEVIN, Randomness and non-determinism, J. Symbolic Logic, 58 (1993), pp.1102-1103.
-
(1993)
J. Symbolic Logic
, vol.58
, pp. 1102-1103
-
-
Levin, L.A.1
-
31
-
-
0344920896
-
Pseudorandomness and Cryptographic Applications
-
Princeton University Press, Princeton, NJ
-
M. LUBY, Pseudorandomness and Cryptographic Applications, Princeton Computer Science Notes, Princeton University Press, Princeton, NJ, 1996.
-
(1996)
Princeton Computer Science Notes
-
-
Luby, M.1
-
32
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
M. LUBY AND C. RACKOFF, How to construct pseudorandom permutations from pseudorandom functions, SIAM J. Comput., 17 (1988), pp. 373-386.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
33
-
-
0002448405
-
A Public Key Cryptosystem Based on Algebraic Coding Theory
-
Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA
-
R. J. MCELIECE, A Public Key Cryptosystem Based on Algebraic Coding Theory, DSN Progress report, Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA, 1978.
-
(1978)
DSN Progress Report
-
-
Mceliece, R.J.1
-
34
-
-
0344920890
-
Cryptography Using Weak Sources of Randomness
-
University of Toronto
-
J. MCINNES, Cryptography Using Weak Sources of Randomness, Tech. report 194/87, University of Toronto, 1987.
-
(1987)
Tech. Report 194/87
-
-
Mcinnes, J.1
-
36
-
-
0001448484
-
Bit commitment using pseudorandom generators
-
M. NAOR, Bit commitment using pseudorandom generators, J. Cryptology, 4 (1991), pp. 151-158.
-
(1991)
J. Cryptology
, vol.4
, pp. 151-158
-
-
Naor, M.1
-
37
-
-
0024867751
-
Universal one-way hash functions and their applications
-
ACM, New York
-
M. NAOR AND M. YUNG, Universal one-way hash functions and their applications, in Proc. 21st ACM Sympos. on Theory of Computing, ACM, New York, 1989, pp. 33-43.
-
(1989)
Proc. 21st ACM Sympos. on Theory of Computing
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
38
-
-
0008519096
-
One-way functions are essential for non-trivial zero-knowledge
-
IEEE Computer Society Press, Los Alamitos, CA
-
R. OSTROVSKY AND A. WIGDERSON, One-way functions are essential for non-trivial zero-knowledge, in Proc. 2nd Israel Sympos. on the Theory of Computing and Systems, IEEE Computer Society Press, Los Alamitos, CA, 1993, pp. 3-17.
-
(1993)
Proc. 2nd Israel Sympos. on the Theory of Computing and Systems
, pp. 3-17
-
-
Ostrovsky, R.1
Wigderson, A.2
-
40
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. RIVEST, A. SHAMIR, AND L. ADLEMAN, A method for obtaining digital signatures and public-key cryptosystems, Comm. ACM, 21 (1978), pp. 120-126.
-
(1978)
Comm. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
41
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
ACM, New York
-
J. ROMPEL, One-way functions are necessary and sufficient for secure signatures, in Proc. 22nd ACM Sympos. on Theory of Computing, ACM, New York, 1990, pp. 387-394.
-
(1990)
Proc. 22nd ACM Sympos. on Theory of Computing
, pp. 387-394
-
-
Rompel, J.1
-
42
-
-
0021469810
-
Generating quasi-random sequences from slightly-random sources
-
M. SANTHA AND U. VAZIRANI, Generating quasi-random sequences from slightly-random sources, J. Comput. System Sci., 33 (1986), pp. 75-87.
-
(1986)
J. Comput. System Sci.
, vol.33
, pp. 75-87
-
-
Santha, M.1
Vazirani, U.2
-
43
-
-
84856043672
-
A mathematical theory of communication
-
C. SHANNON, A mathematical theory of communication, Bell System Tech. J., 27 (1948), pp. 379-423; 623-656.
-
(1948)
Bell System Tech. J.
, vol.27
, pp. 379-423
-
-
Shannon, C.1
-
44
-
-
0020931594
-
A complexity theoretic approach to randomness
-
ACM New York
-
M. SIPSER, A complexity theoretic approach to randomness, in Proc. 15th ACM Sympos. on Theory of Computing, ACM New York, 1983, pp. 330-335.
-
(1983)
Proc. 15th ACM Sympos. on Theory of Computing
, pp. 330-335
-
-
Sipser, M.1
-
45
-
-
51249175241
-
Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly-random sources
-
U. VAZIRANI, Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly-random sources, Combinatorica, 7 (1987), pp. 375-392.
-
(1987)
Combinatorica
, vol.7
, pp. 375-392
-
-
Vazirani, U.1
-
46
-
-
0022252339
-
Random polynomial time is equal to slightly-random polynomial time
-
IEEE, New York
-
U. VAZIRANI AND V. VAZIRANI, Random polynomial time is equal to slightly-random polynomial time, in Proc. 26th IEEE Sympos. on Found. of Comput. Sci., IEEE, New York, 1985, pp. 417-428.
-
(1985)
Proc. 26th IEEE Sympos. on Found. of Comput. Sci.
, pp. 417-428
-
-
Vazirani, U.1
Vazirani, V.2
-
47
-
-
0020301290
-
Theory and applications of trapdoor functions
-
IEEE, New York
-
A. C. YAO, Theory and applications of trapdoor functions, in Proc. 23rd IEEE Sympos. on Found. of Comput. Sci., IEEE, New York, 1982, pp. 80-91.
-
(1982)
Proc. 23rd IEEE Sympos. on Found. of Comput. Sci.
, pp. 80-91
-
-
Yao, A.C.1
|