-
1
-
-
0020248370
-
How to generate cryptographically strong sequences of pseudo random bits
-
[BM82]
-
[BM82] M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo random bits. In 23th Annual FOCS, pages 112-117, 1982.
-
(1982)
23th Annual FOCS
, pp. 112-117
-
-
Blum, M.1
Micali, S.2
-
2
-
-
84963650728
-
Universal classes of hash functions
-
[CW77]
-
[CW77] I. Carter and M. Wegman. Universal classes of hash functions. In 9th ACM STOC, pages 106-112, 1977.
-
(1977)
9th ACM STOC
, pp. 106-112
-
-
Carter, I.1
Wegman, M.2
-
3
-
-
0022793132
-
How to construct random functions
-
[GGM86]
-
[GGM86] O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, 33(2):792-807, 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.2
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
4
-
-
0027797493
-
On the existence of pseudorandom generators
-
[GKL93]
-
[GKL93] O. Goldreich, H. Krawczyk, and M. Luby. On the existence of pseudorandom generators. SIAM Journal of Computing, 22(6):1163-1175, 1993.
-
(1993)
SIAM Journal of Computing
, vol.22
, Issue.6
, pp. 1163-1175
-
-
Goldreich, O.1
Krawczyk, H.2
Luby, M.3
-
5
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
[GL89]
-
[GL89] O. Goldreich and L.A. Levin. A hard-core predicate for all one-way functions. In 21st ACM STOC, pages 25-32, 1989.
-
(1989)
21st ACM STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
7
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
[HILL99]
-
[HILL99] J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM Journal of Computing, 29(4): 1364-1396, 1999.
-
(1999)
SIAM Journal of Computing
, vol.29
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
8
-
-
34848917325
-
Key agreement from weak bit agreement
-
[Hol05]
-
[Hol05] T. Holenstein. Key agreement from weak bit agreement. In Proceedings of the 37th ACM STOC, pages 664-673, 2005.
-
(2005)
Proceedings of the 37th ACM STOC
, pp. 664-673
-
-
Holenstein, T.1
-
9
-
-
77954710959
-
Pseudorandom generators from one-way functions: A simple construction for any hardness
-
[Hol06] LNCS. Springer-Verlag
-
[Hol06] Thomas Holenstein. Pseudorandom generators from one-way functions: A simple construction for any hardness. In 3rd Theory of Cryptography Conference - (TCC '06), LNCS. Springer-Verlag, 2006.
-
(2006)
3rd Theory of Cryptography Conference - (TCC '06)
-
-
Holenstein, T.1
-
10
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
[ILL89]
-
[ILL89] R. Impagliazzo, L. A. Levin, and M. Luby. Pseudo-random generation from one-way functions. In 21st ACM STOC, pages 12-24, 1989.
-
(1989)
21st ACM STOC
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
11
-
-
51249173191
-
One-way functions and pseudorandom generators
-
[Lev87]
-
[Lev87] L. A. Levin. One-way functions and pseudorandom generators. Combinatorics 7:357-363, 1987.
-
(1987)
Combinatorics
, vol.7
, pp. 357-363
-
-
Levin, L.A.1
-
12
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
[LR88]
-
[LR88] M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal of Computing, 17(2): 373-386, 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
13
-
-
0001448484
-
Bit commitment using pseudorandomness
-
[Nao91]
-
[Nao91] M. Naor. Bit commitment using pseudorandomness. Journal of Cryptology, 4(2):151-158, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 151-158
-
-
Naor, M.1
-
14
-
-
0002952549
-
Theory and application of trapdoor functions
-
[Yao82]
-
[Yao82] A. C. Yao. Theory and application of trapdoor functions. In 23rd IEEE FOCS, pages 80-91, 1982.
-
(1982)
23rd IEEE FOCS
, pp. 80-91
-
-
Yao, A.C.1
|