메뉴 건너뛰기




Volumn 4052 LNCS, Issue , 2006, Pages 228-239

Efficient pseudorandom generators from exponentially hard one-way functions

Author keywords

[No Author keywords available]

Indexed keywords

POLYNOMIALS; RANDOM PROCESSES; SECURITY OF DATA;

EID: 33746342808     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11787006_20     Document Type: Conference Paper
Times cited : (18)

References (14)
  • 1
    • 0020248370 scopus 로고
    • How to generate cryptographically strong sequences of pseudo random bits
    • [BM82]
    • [BM82] M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo random bits. In 23th Annual FOCS, pages 112-117, 1982.
    • (1982) 23th Annual FOCS , pp. 112-117
    • Blum, M.1    Micali, S.2
  • 2
    • 84963650728 scopus 로고
    • Universal classes of hash functions
    • [CW77]
    • [CW77] I. Carter and M. Wegman. Universal classes of hash functions. In 9th ACM STOC, pages 106-112, 1977.
    • (1977) 9th ACM STOC , pp. 106-112
    • Carter, I.1    Wegman, M.2
  • 3
  • 4
    • 0027797493 scopus 로고
    • On the existence of pseudorandom generators
    • [GKL93]
    • [GKL93] O. Goldreich, H. Krawczyk, and M. Luby. On the existence of pseudorandom generators. SIAM Journal of Computing, 22(6):1163-1175, 1993.
    • (1993) SIAM Journal of Computing , vol.22 , Issue.6 , pp. 1163-1175
    • Goldreich, O.1    Krawczyk, H.2    Luby, M.3
  • 5
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions
    • [GL89]
    • [GL89] O. Goldreich and L.A. Levin. A hard-core predicate for all one-way functions. In 21st ACM STOC, pages 25-32, 1989.
    • (1989) 21st ACM STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.A.2
  • 7
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • [HILL99]
    • [HILL99] J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM Journal of Computing, 29(4): 1364-1396, 1999.
    • (1999) SIAM Journal of Computing , vol.29 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 8
    • 34848917325 scopus 로고    scopus 로고
    • Key agreement from weak bit agreement
    • [Hol05]
    • [Hol05] T. Holenstein. Key agreement from weak bit agreement. In Proceedings of the 37th ACM STOC, pages 664-673, 2005.
    • (2005) Proceedings of the 37th ACM STOC , pp. 664-673
    • Holenstein, T.1
  • 9
    • 77954710959 scopus 로고    scopus 로고
    • Pseudorandom generators from one-way functions: A simple construction for any hardness
    • [Hol06] LNCS. Springer-Verlag
    • [Hol06] Thomas Holenstein. Pseudorandom generators from one-way functions: A simple construction for any hardness. In 3rd Theory of Cryptography Conference - (TCC '06), LNCS. Springer-Verlag, 2006.
    • (2006) 3rd Theory of Cryptography Conference - (TCC '06)
    • Holenstein, T.1
  • 10
    • 0024866111 scopus 로고
    • Pseudo-random generation from one-way functions
    • [ILL89]
    • [ILL89] R. Impagliazzo, L. A. Levin, and M. Luby. Pseudo-random generation from one-way functions. In 21st ACM STOC, pages 12-24, 1989.
    • (1989) 21st ACM STOC , pp. 12-24
    • Impagliazzo, R.1    Levin, L.A.2    Luby, M.3
  • 11
    • 51249173191 scopus 로고
    • One-way functions and pseudorandom generators
    • [Lev87]
    • [Lev87] L. A. Levin. One-way functions and pseudorandom generators. Combinatorics 7:357-363, 1987.
    • (1987) Combinatorics , vol.7 , pp. 357-363
    • Levin, L.A.1
  • 12
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • [LR88]
    • [LR88] M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal of Computing, 17(2): 373-386, 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 13
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • [Nao91]
    • [Nao91] M. Naor. Bit commitment using pseudorandomness. Journal of Cryptology, 4(2):151-158, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 151-158
    • Naor, M.1
  • 14
    • 0002952549 scopus 로고
    • Theory and application of trapdoor functions
    • [Yao82]
    • [Yao82] A. C. Yao. Theory and application of trapdoor functions. In 23rd IEEE FOCS, pages 80-91, 1982.
    • (1982) 23rd IEEE FOCS , pp. 80-91
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.