-
3
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
Nov.. Preliminary version in FOCS '82
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput., 13(4):850-864, Nov. 1984. Preliminary version in FOCS '82.
-
(1984)
SIAM J. Comput.
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
4
-
-
84984842401
-
Maintaining security in the presence of transient faults
-
LNCS No. 839
-
R. Canetti and A. Herzberg. Maintaining security in the presence of transient faults. In Crypto '94, pages 425-438, 1994. LNCS No. 839.
-
(1994)
Crypto '94
, pp. 425-438
-
-
Canetti, R.1
Herzberg, A.2
-
5
-
-
35048839833
-
Randomness extraction and key derivation using the CBC, Cascade and HMAC modes
-
LNCS No. 3152
-
Y. Dodis, R. Gennaro, J. Håstad, H. Krawczyk, and T. Rabin. Randomness extraction and key derivation using the CBC, Cascade and HMAC modes. In Crypto '04, pages 494-510, 2004. LNCS No. 3152
-
(2004)
Crypto '04
, pp. 494-510
-
-
Dodis, Y.1
Gennaro, R.2
Håstad, J.3
Krawczyk, H.4
Rabin, T.5
-
6
-
-
24144460521
-
Entropic security and the encryption of high entropy messages
-
Y. Dodis and A. Smith. Entropic security and the encryption of high entropy messages. In Theory of Cryptography Conference (TCC) '05, pages 556-577, 2005.
-
(2005)
Theory of Cryptography Conference (TCC) '05
, pp. 556-577
-
-
Dodis, Y.1
Smith, A.2
-
8
-
-
0029755067
-
Randomness and the Netscape browser
-
I. Goldberg and D. Wagner. Randomness and the Netscape browser. Dr. Dobb's Journal, pages 66-70, 1996.
-
(1996)
Dr. Dobb's Journal
, pp. 66-70
-
-
Goldberg, I.1
Wagner, D.2
-
9
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
ACM
-
O. Goldreich and L. A. Levin. A hard-core predicate for all one-way functions. In Proc. 21st STOC, pages 25-32. ACM, 1989.
-
(1989)
Proc. 21st STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
10
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
ACM, 25-27 May
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In Proc. 19th STOC, pages 218-229. ACM, 25-27 May 1987.
-
(1987)
Proc. 19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
11
-
-
85084160278
-
Software generation of practically strong random numbers
-
P. Gutmann. Software generation of practically strong random numbers. In Proceedings of the 7th USENIX Security Symposium, 1998. Available from http://www.cs.auckland.ac.nz/~pgut001/.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Gutmann, P.1
-
12
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
Preliminary versions appeared in STOC' 89 and STOC' 90
-
J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. Comput., 28(4):1364-1396, 1999. Preliminary versions appeared in STOC' 89 and STOC' 90.
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
13
-
-
84947910726
-
Cryptanalytic attacks on pseudorandom number generators
-
LNCS No. 1372
-
J. Kelsey, B. Schneier, D. Wagner, and C. Hall. Cryptanalytic attacks on pseudorandom number generators. In FSE '98, pages 168-188, 1998. LNCS No. 1372.
-
(1998)
FSE '98
, pp. 168-188
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
14
-
-
33749012868
-
Recent developments in extractors
-
G. Paun, R. I. Virgili, G. Rozenberg, and A. Salomaa, editors. World Scientific, 2004. Preliminary version in bulletin of the EATCS
-
R. Shaltiel. Recent developments in extractors. In G. Paun, R. I. Virgili, G. Rozenberg, and A. Salomaa, editors, Current trends in theoretical computer science., volume 1. World Scientific, 2004. Preliminary version in bulletin of the EATCS, 2002. Available on http://www.cs.haifa.ac.il/~ronen/.
-
(2002)
Current Trends in Theoretical Computer Science
, vol.1
-
-
Shaltiel, R.1
|