-
2
-
-
26444485170
-
-
(See also SIGACT News, vol. 15(1), 1983.)
-
(1983)
SIGACT News
, vol.15
, Issue.1
-
-
-
3
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. In SIAM J. Computing, vol. 13(4), pp. 850-864, 1984.
-
(1984)
SIAM J. Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
7
-
-
85028838274
-
On the cryptographic applications of random functions
-
LNCS, Springer-Verlag
-
O. Goldreich, S. Goldwasser, and S. Micali. On the Cryptographic Applications of Random Functions. In Advances in Cryptology - CRYPTO 84, LNCS vol. 263, Springer-Verlag, pp. 276-288, 1985.
-
(1985)
Advances in Cryptology - CRYPTO 84
, vol.263
, pp. 276-288
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
8
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali. How to Construct Random Functions. In J. ACM, vol. 33(4), pp. 792-807, 1986.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
10
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Håstad, R. Impagliazzo, L. Levin, and M. Luby. A Pseudorandom Generator From any One-Way Function. In SIAM J. Computing, vol. 28(4), pp. 1364-1396, 1999.
-
(1999)
SIAM J. Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
14
-
-
0001448484
-
Bit commitment using pseudorandomness
-
M. Naor. Bit Commitment Using Pseudorandomness. In J. Cryptology, vol. 4(2), pp. 151-158, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.2
, pp. 151-158
-
-
Naor, M.1
-
15
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
ACM
-
M. Naor and M. Yung. Universal One-Way Hash Functions and their Cryptographic Applications. In 21st ACM Symposium on Theory of Computing (STOC), ACM, pp. 33-43, 1989.
-
(1989)
21st ACM Symposium on Theory of Computing (STOC)
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
17
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
ACM
-
J. Rompel. One-Way Functions are Necessary and Sufficient for Secure Signatures. In 22nd ACM Symposium on Theory of Computing (STOC), ACM, pp. 387-394, 1990.
-
(1990)
22nd ACM Symposium on Theory of Computing (STOC)
, pp. 387-394
-
-
Rompel, J.1
-
18
-
-
84947798969
-
Notions of reducibility between cryptographic primitives
-
LNCS, Springer-Verlag
-
O. Reingold, L. Trevisan, and S. Vadhan. Notions of Reducibility Between Cryptographic Primitives. In 1st Theory of Cryptography Conference, LNCS vol. 2951, Springer-Verlag, pp. 1-20, 2004.
-
(2004)
1st Theory of Cryptography Conference
, vol.2951
, pp. 1-20
-
-
Reingold, O.1
Trevisan, L.2
Vadhan, S.3
|