-
1
-
-
33745861377
-
True random number generators secure in achanging environment
-
Workshop in Cryptography Hardware and Embedded SystemsCHES, number in, Springer Verlag
-
B. Barak, R. Shaltiel, and E. Tromer. True random number generators secure in achanging environment. In Workshop in Cryptography Hardware and Embedded Systems(CHES), number 2779 in LNCS, pages 166-180. Springer Verlag, 2003.
-
(2003)
LNCS
, vol.2779
, pp. 166-180
-
-
Barak, B.1
Shaltiel, R.2
Tromer, E.3
-
2
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
Nov
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850-864, Nov. 1984.
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
6
-
-
34247488433
-
Learning polynomials with queries - the highly noisy case
-
Technical Report TR98-060, Electronic Colloquium on Computational Complexity
-
O. Goldreich, R. Rubinfeld, and M. Sudan. Learning polynomials with queries - the highly noisy case. Technical Report TR98-060, Electronic Colloquium on Computational Complexity, 1998. http://www.eccc.uni-trier.de/eccc.
-
(1998)
-
-
Goldreich, O.1
Rubinfeld, R.2
Sudan, M.3
-
7
-
-
0345253860
-
Construction of a pseudo-random generator from any one-way function
-
J. Håstad, R. Impagliazzo, L. Levin, and M. Luby. Construction of a pseudo-random generator from any one-way function. SIAM Journal on Computing, 28(4), 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
8
-
-
0039247627
-
Very strong one-way functions and pseudo-random generators exist relative to a random oracle
-
manuscript, January
-
R. Impagliazzo. Very strong one-way functions and pseudo-random generators exist relative to a random oracle, (manuscript), January 1996.
-
(1996)
-
-
Impagliazzo, R.1
-
10
-
-
4344636292
-
Encryption against storage-bounded adversaries from on-line strong extractors
-
January
-
C. Lu. Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology, 17(1):27-42, January 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 27-42
-
-
Lu, C.1
-
13
-
-
0012579059
-
Recent developments in explicit constructions of extractors
-
June
-
R. Shaltiel. Recent developments in explicit constructions of extractors. Bulletin EATCS, 77:67-95, June 2002.
-
(2002)
Bulletin EATCS
, vol.77
, pp. 67-95
-
-
Shaltiel, R.1
-
14
-
-
0005314594
-
Extractors and pseudorandom generators
-
L. Trevisan. Extractors and pseudorandom generators. Journal of the ACM, 48(4):860-879, 2001.
-
(2001)
Journal of the ACM
, vol.48
, Issue.4
, pp. 860-879
-
-
Trevisan, L.1
-
15
-
-
34247547538
-
Randomess extractors and their cryptographic applications
-
Seminar, January 21, Available at
-
S. Vadhan. Randomess extractors and their cryptographic applications. Netherlands RISC Seminar and Intercity Number Theory Seminar, January 21, 2005. Available at http://eecs.harvard.edu/~salil/survey-talks.html.
-
(2005)
Netherlands RISC Seminar and Intercity Number Theory
-
-
Vadhan, S.1
-
16
-
-
4344628859
-
On constructing locally computable extractors and cryptosystems in the bounded-storage model
-
January
-
S. Vadhan. On constructing locally computable extractors and cryptosystems in the bounded-storage model. J. of Cryptology, 17(1):43-77, January 2004.
-
(2004)
J. of Cryptology
, vol.17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.1
-
19
-
-
26444474834
-
Simple extractors via constructions of cryptographic pseudo-random generators
-
Proceedings of the 32nd International Colloquium on Automata, Languages, and Programming, Springer-Verlag
-
M. Zimand. Simple extractors via constructions of cryptographic pseudo-random generators. In Proceedings of the 32nd International Colloquium on Automata, Languages, and Programming, Lecture Notes in Computer Science 3580, pages 115-127. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3580
, pp. 115-127
-
-
Zimand, M.1
|