-
1
-
-
0012110444
-
Design of Practical and Provably Good Random Number Generators
-
Appeared previously in 5th Annual ACM-SIAM Symp. Disc. Alg. (1995) 1-8
-
W. Aiello, S. Rajagopalan, R. Venkatesan. “Design of Practical and Provably Good Random Number Generators,” J. Algorithms 29, (1998) 358-389. Appeared previously in 5th Annual ACM-SIAM Symp. Disc. Alg. (1995) 1-8.
-
(1998)
J. Algorithms
, vol.29
, pp. 358-389
-
-
Aiello, W.1
Rajagopalan, S.2
Venkatesan, R.3
-
2
-
-
51249173340
-
Eigenvalues and expanders
-
N. Alon, “Eigenvalues and expanders,” Combinatorica 6 (1986) 83-96.
-
(1986)
Combinatorica
, vol.6
, pp. 83-96
-
-
Alon, N.1
-
5
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
-
M. Blum, S. Micali, “How to Generate Cryptographically Strong Sequences of Pseudorandom Bits,” Proceedings of FOCS (1982); SIAM J. Computing, 13 (1984) 850-864.
-
(1984)
Proceedings of FOCS (1982); SIAM J. Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
7
-
-
0001849866
-
The Status of MD5 After a Recent Attack
-
Summer
-
H. Dobbertin, “The Status of MD5 After a Recent Attack,” CryptoBytes v2 No.2 (Summer 1996).
-
(1996)
Cryptobytes
, vol.2
, Issue.2
-
-
Dobbertin, H.1
-
8
-
-
84947905764
-
An efficient pseudorandom generator provably as secure as syndrome decoding
-
J.-B. Fischer, J. Stern, “An efficient pseudorandom generator provably as secure as syndrome decoding,” in Proceedings of EUROCRYPT96 (1996) 245-255.
-
(1996)
Proceedings of EUROCRYPT96
, pp. 245-255
-
-
Fischer, J.-B.1
Stern, J.2
-
9
-
-
0000871697
-
Explicit constructions of linear-sized superconcentrators
-
O. Gabber, Z. Galil, “Explicit constructions of linear-sized superconcentrators,” J. Comput. Sys. Sci. 22 (1981).
-
(1981)
J. Comput. Sys. Sci
, pp. 22
-
-
Gabber, O.1
Galil, Z.2
-
10
-
-
84957709468
-
A Chernoff bound for random walks in expander graphs
-
D. Gillman, “A Chernoff bound for random walks in expander graphs,” Proceedings of FOCS (1993).
-
(1993)
Proceedings of FOCS
-
-
Gillman, D.1
-
13
-
-
0024866111
-
Pseudorandom Generation From One-Way Functions
-
Pseudorandom Generators under Uniform assumptions,” Proceedings of STOC (1990) 395-404
-
J. Hastad, R. Impagliazzo, L.A. Levin, M. Luby, “Pseudorandom Generation From One-Way Functions, Proceedings of STOC (1989) 12-24; “Pseudorandom Generators under Uniform assumptions,” Proceedings of STOC (1990) 395-404.
-
(1989)
Proceedings of STOC
, pp. 12-24
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
15
-
-
0029510686
-
Synthesizers and their application to the parallel construction of Pseudorandom Functions
-
M. Naor, O. Reingold, “Synthesizers and their application to the parallel construction of Pseudorandom Functions,” Proceedings of FOCS, (1995) 170-181.
-
(1995)
Proceedings of FOCS
, pp. 170-181
-
-
Naor, M.1
Reingold, O.2
-
16
-
-
0031332843
-
Number-Theoretic Constructions of Efficient Pseudorandom Functions
-
M. Naor, O. Reingold, “Number-Theoretic Constructions of Efficient Pseudorandom Functions,” Proceedings of FOCS, (1997) 458-467.
-
(1997)
Proceedings of FOCS
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
17
-
-
84957617971
-
From Unpredictability to Indistinguishability: A simple construction of Pseudorandom Functions from MACs
-
M. Naor, O. Reingold, “From Unpredictability to Indistinguishability: A simple construction of Pseudorandom Functions from MACs,” Proceedings of Crypto'98, 267-282.
-
Proceedings of Crypto'98
, pp. 267-282
-
-
Naor, M.1
Reingold, O.2
-
19
-
-
0012023707
-
New Results on Pseudorandom Permutation Generators Based on the DES Scheme
-
J. Patarin, “New Results on Pseudorandom Permutation Generators Based on the DES Scheme,” Proceedings of Crypto’91, (1991) 301-312.
-
(1991)
Proceedings of Crypto’91
, pp. 301-312
-
-
Patarin, J.1
-
20
-
-
0041482946
-
On Recent Results for MD2, MD4 and MD5
-
November 12
-
M. J. B. Robshaw, “On Recent Results for MD2, MD4 and MD5,” RSA Laboratories Bulletin No. 4 (November 12, 1996).
-
(1996)
RSA Laboratories Bulletin
, vol.4
-
-
Robshaw, M.J.B.1
-
21
-
-
84947902207
-
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor
-
B. Schneier, D. Whiting, “Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor,” Fast Software Encryption Workshop (1997) 242-259.
-
(1997)
Fast Software Encryption Workshop
, pp. 242-259
-
-
Schneier, B.1
Whiting, D.2
-
22
-
-
0020301290
-
Theory and Applications of Trapdoor Functions
-
A.C. Yao, “Theory and Applications of Trapdoor Functions,” Proceedings of FOCS (1982) 80-91.
-
(1982)
Proceedings of FOCS
, pp. 80-91
-
-
Yao, A.C.1
|