-
1
-
-
84937413657
-
A Quantum Goldreich-Levin Theorem with Cryptographic Applications
-
Proceedings, STACS 2002, Springer-Verlag
-
M. Adcock and R. Cleve: A Quantum Goldreich-Levin Theorem with Cryptographic Applications. Proceedings, STACS 2002, LNCS 2285, 2002, pp. 323-334, Springer-Verlag.
-
(2002)
LNCS
, vol.2285
, pp. 323-334
-
-
Adcock, M.1
Cleve, R.2
-
2
-
-
84947928286
-
Practice-oriented provable-security
-
Proceedings, ISW '97, Springer-Verlag
-
M. Bellare: Practice-oriented provable-security. Proceedings, ISW '97, LNCS 1396, 1997, pp. 221-231, Springer-Verlag.
-
(1997)
LNCS
, vol.1396
, pp. 221-231
-
-
Bellare, M.1
-
3
-
-
0000090958
-
The exact security of digital signatures: How to sign with RSA and Rabin
-
Proceedings, EUROCRYPT '96, Springer-Verlag
-
M. Bellare and P. Rogaway: The exact security of digital signatures: How to sign with RSA and Rabin. Proceedings, EUROCRYPT '96, LNCS 1070, 1996, pp. 399-416, Springer-Verlag.
-
(1996)
LNCS
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0022716288
-
A Simple Unpredictable Pseudo-Random Generator
-
L. Blum, M. Blum and M. Shub: A Simple Unpredictable Pseudo-Random Generator. SIAM Journal on Computing, 15, no. 2, 1986, pp. 364-383.
-
(1986)
SIAM Journal on Computing
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
5
-
-
84950927293
-
Towards a Computational Theory of Statistical Tests
-
M. Blum and O. Goldreich: Towards a Computational Theory of Statistical Tests. Proceedings, 33rd IEEE FOCS, 1992, pp. 406-416.
-
(1992)
Proceedings, 33rd IEEE FOCS
, pp. 406-416
-
-
Blum, M.1
Goldreich, O.2
-
6
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences of Pseudo-random Bits
-
M. Blum and S. Micali: How to Generate Cryptographically Strong Sequences of Pseudo-random Bits. SIAM Journal on Computing, 13, no. 4, 1984, pp. 850-864.
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
7
-
-
0011189534
-
Stronger Security Proofs for RSA and Rabin Bits
-
R. Fischlin and C. P. Schnorr: Stronger Security Proofs for RSA and Rabin Bits. Journal of Cryptology, 13, no. 2, 2000, pp. 221-244.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.2
, pp. 221-244
-
-
Fischlin, R.1
Schnorr, C.P.2
-
9
-
-
0022793132
-
How to Construct Random Functions
-
O. Goldreich, S. Goldwasser and S. Micali: How to Construct Random Functions. JACM, 33. no. 4, 1986, pp. 792-807.
-
(1986)
JACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
10
-
-
0025742358
-
Security Preserving Amplification of Hardness
-
O. Goldreich, R. Impagliazzo, L. A. Levin, R. Venkatesan and D. Zuckerman: Security Preserving Amplification of Hardness. Proceedings, 31st IEEE FOCS, 1990, pp. 318-326.
-
(1990)
Proceedings, 31st IEEE FOCS
, pp. 318-326
-
-
Goldreich, O.1
Impagliazzo, R.2
Levin, L.A.3
Venkatesan, R.4
Zuckerman, D.5
-
12
-
-
0006238804
-
Learning polynomials with queries: The highly noisy case
-
O. Goldreich, R. Rubinfeld, and M. Sudan: Learning polynomials with queries: The highly noisy case. SIAM Journal on Discrete Mathematics, 13, no. 4, 2000, pp. 535-570.
-
(2000)
SIAM Journal on Discrete Mathematics
, vol.13
, Issue.4
, pp. 535-570
-
-
Goldreich, O.1
Rubinfeld, R.2
Sudan, M.3
-
13
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
S. Goldwasser, S. Micali and R. Rivest: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM Journal on Computing, 17, no. 2, 1988, pp. 281-308.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
14
-
-
84949265226
-
Nearly One-Sided Tests and the Goldreich-Levin Predicate
-
to appear
-
G. Hast: Nearly One-Sided Tests and the Goldreich-Levin Predicate. Journal of Cryptology, to appear.
-
Journal of Cryptology
-
-
Hast, G.1
-
15
-
-
84864174640
-
Practical Construction and Analysis of Pseudo-Randomness Primitives
-
Proceedings, ASIACRYPT 2001, Springer-Verlag
-
J. Håstad and M. Näslund: Practical Construction and Analysis of Pseudo-Randomness Primitives. Proceedings, ASIACRYPT 2001, LNCS 2248, 2001, pp. 442-459, Springer-Verlag.
-
(2001)
LNCS
, vol.2248
, pp. 442-459
-
-
Håstad, J.1
Näslund, M.2
-
16
-
-
0345352219
-
Public Randomness in Cryptography
-
Proceedings, CRYPTO '92, Springer-Verlag
-
A. Herzberg and M. Luby: Public Randomness in Cryptography. Proceedings, CRYPTO '92, LNCS 0740, 1992, pp. 421-432, Springer-Verlag.
-
(1992)
LNCS
, vol.740
, pp. 421-432
-
-
Herzberg, A.1
Luby, M.2
-
17
-
-
0042496106
-
Randomness and Non-determinism
-
L. A. Levin: Randomness and Non-determinism. Journal of Symbolic Logic, 58, no. 3, 1993, pp. 1102-1103.
-
(1993)
Journal of Symbolic Logic
, vol.58
, Issue.3
, pp. 1102-1103
-
-
Levin, L.A.1
-
18
-
-
0035276434
-
Pseudorandom generators without the XOR Lemma
-
M. Sudan, L. Trevisan and S. Vadhan: Pseudorandom generators without the XOR Lemma. Journal of Computer and System Sciences, 62, no. 2, 2001, pp. 236-266.
-
(2001)
Journal of Computer and System Sciences
, vol.62
, Issue.2
, pp. 236-266
-
-
Sudan, M.1
Trevisan, L.2
Vadhan, S.3
-
19
-
-
0020301290
-
Theory and application of trapdoor functions
-
A. C. Yao: Theory and application of trapdoor functions. Proceedings, 23rd IEEE FOCS, 1982, pp. 80-91.
-
(1982)
Proceedings, 23rd IEEE FOCS
, pp. 80-91
-
-
Yao, A.C.1
|