메뉴 건너뛰기




Volumn 17, Issue 1, 2004, Pages 27-42

Encryption against storage-bounded adversaries from on-line strong extractors

Author keywords

Bounded storage model; Everlasting security; Expander graphs; List decodable codes; Randomness extractors

Indexed keywords

BOUNDED STORAGE MODELS; EVERLASTING SECURITY; EXPANDER GRAPHS; LIST DECODABLE CODES; RANDOMNESS EXTRACTORS;

EID: 4344636292     PISSN: 09332790     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00145-003-0217-1     Document Type: Article
Times cited : (47)

References (20)
  • 1
    • 0026834814 scopus 로고
    • Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs
    • N. Alon, J. Bruck, J. Naor, M. Naor, and R. M. Roth. Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs. IEEE Transactions on Information Theory, vol. 38, pages 509-516, 1992.
    • (1992) IEEE Transactions on Information Theory , vol.38 , pp. 509-516
    • Alon, N.1    Bruck, J.2    Naor, J.3    Naor, M.4    Roth, R.M.5
  • 5
    • 0542423500 scopus 로고    scopus 로고
    • Free bits, PCPs and non-approximability - Towards tight results
    • M. Bellare, O. Goldreich, and M. Sudan. Free bits, PCPs and non-approximability - towards tight results. SIAM Journal on Computing, vol. 27, no. 3, pages 804-915, 1998.
    • (1998) SIAM Journal on Computing , vol.27 , Issue.3 , pp. 804-915
    • Bellare, M.1    Goldreich, O.2    Sudan, M.3
  • 6
    • 84958598231 scopus 로고    scopus 로고
    • Unconditional security against memory-bounded adversaries
    • Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • C. Cachin and U. Maurer. Unconditional security against memory-bounded adversaries. In Advances in Cryptology - CRYPTO '97, pages 292-306, Lecture Notes in Computer Science, vol. 1294, Springer-Verlag, Berlin, 1997.
    • (1997) Advances in Cryptology - CRYPTO '97 , vol.1294 , pp. 292-306
    • Cachin, C.1    Maurer, U.2
  • 7
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • B. Chor and O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing, vol. 17, no. 2, pages 230-261, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 10
    • 0000871697 scopus 로고
    • Explicit constructions of linear-sized superconcentrators
    • O. Gabber and Z. Galil. Explicit constructions of linear-sized superconcentrators. Journal of Computer and System Sciences, vol. 22, no. 3, pages 407-420, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , Issue.3 , pp. 407-420
    • Gabber, O.1    Galil, Z.2
  • 11
    • 0003205419 scopus 로고    scopus 로고
    • A Sample of Samplers: A Computational Perspective on Sampling
    • Technical Report TR97-020
    • O. Goldreich. A Sample of Samplers: A Computational Perspective on Sampling. Electronic Colloquium on Computational Complexity, Technical Report TR97-020, 1997.
    • (1997) Electronic Colloquium on Computational Complexity
    • Goldreich, O.1
  • 15
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • U. Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, vol. 5, no. 1, pages 53-66, 1992.
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.1
  • 19
    • 0005314594 scopus 로고    scopus 로고
    • Extractors and pseudorandom generators
    • L. Trevisan. Extractors and pseudorandom generators. Journal of ACM, vol. 48, no. 4, pages 860-879, 2001.
    • (2001) Journal of ACM , vol.48 , Issue.4 , pp. 860-879
    • Trevisan, L.1
  • 20
    • 0037972079 scopus 로고    scopus 로고
    • On constructing locally computable extractors and cryptosystems in the bounded storage model
    • S. P. Vadhan. On constructing locally computable extractors and cryptosystems in the bounded storage model. Cryptology ePrint Archive, Report 2002/162, 2002. http://eprint.iacr.org/.
    • (2002) Cryptology EPrint Archive, Report , vol.2002 , Issue.162
    • Vadhan, S.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.