-
1
-
-
0036612020
-
Everlasting security in the bounded storage model
-
Aumann, Y., Ding, Y.Z., Rabin, M.O.: Everlasting security in the bounded storage model. IEEE Transactions on Information Theory 48(6), 1668-1680 (2002)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.6
, pp. 1668-1680
-
-
Aumann, Y.1
Ding, Y.Z.2
Rabin, M.O.3
-
2
-
-
0036292773
-
Streaming computation of combinatorial objects
-
Bar-Yossef, Z., Reingold, O., Shaltiel, R., Trevisan, L.: Streaming computation of combinatorial objects. In: Proceedings of the 17th IEEE Conference on Computational Complexity, pp. 165-174 (2002)
-
(2002)
Proceedings of the 17th IEEE Conference on Computational Complexity
, pp. 165-174
-
-
Bar-Yossef, Z.1
Reingold, O.2
Shaltiel, R.3
Trevisan, L.4
-
3
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudorandom bits. SIAM Journal on Computing 13(4), 850-864 (1984)
-
Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudorandom bits. SIAM Journal on Computing 13(4), 850-864 (1984); Preliminary version in Proc. of FOCS 1982
-
(1982)
Preliminary version in Proc. of FOCS
-
-
Blum, M.1
Micali, S.2
-
4
-
-
4344699394
-
Optimal randomizer efficiency in the boundedstorage model. Journal of Cryptology 17(1), 5-26 (2004)
-
Dziembowski, S., Maurer, U.: Optimal randomizer efficiency in the boundedstorage model. Journal of Cryptology 17(1), 5-26 (2004); Preliminary version in Proc. of STOC 2002
-
(2002)
Preliminary version in Proc. of STOC
-
-
Dziembowski, S.1
Maurer, U.2
-
5
-
-
17744387205
-
On Yao's XOR lemma
-
Technical Report TR95-50, Electronic Colloquium on Computational Complexity
-
Goldreich, O., Nisan, N., Wigderson, A.: On Yao's XOR lemma. Technical Report TR95-50, Electronic Colloquium on Computational Complexity (1995)
-
(1995)
-
-
Goldreich, O.1
Nisan, N.2
Wigderson, A.3
-
6
-
-
51849156726
-
Direct product theorems: Simplified, Optimized and Derandomized
-
Impagliazzo, R., Jaiswal, R., Kabanets, V., Wigderson, A.: Direct product theorems: Simplified, Optimized and Derandomized. In: Proceedings of the 40th ACM Symposium on Theory of Computing, pp. 579-588 (2008)
-
(2008)
Proceedings of the 40th ACM Symposium on Theory of Computing
, pp. 579-588
-
-
Impagliazzo, R.1
Jaiswal, R.2
Kabanets, V.3
Wigderson, A.4
-
8
-
-
51249173191
-
One-way functions and pseudorandom generators
-
Levin, L.: One-way functions and pseudorandom generators. Combinatorica 7(4), 357-363 (1987)
-
(1987)
Combinatorica
, vol.7
, Issue.4
, pp. 357-363
-
-
Levin, L.1
-
9
-
-
4344636292
-
Encryption against storage-bounded adversaries from on-line strong extractors
-
Lu, C.-J.: Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology 17(1), 27-42 (2004)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 27-42
-
-
Lu, C.-J.1
-
10
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
Maurer, U.M.: Conditionally-perfect secrecy and a provably-secure randomized cipher. J. Cryptology 5(1), 53-66 (1992)
-
(1992)
J. Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.M.1
-
12
-
-
70350599158
-
-
Nisan, N., Ta-Shma, A.: Extrating randomness: A survey and new constructions. Journal of Computer and System Sciences (1998) (to appear); Preliminary versions in [11, 18]
-
Nisan, N., Ta-Shma, A.: Extrating randomness: A survey and new constructions. Journal of Computer and System Sciences (1998) (to appear); Preliminary versions in [11, 18]
-
-
-
-
14
-
-
0028516244
-
Hardness vs randomness. Journal of Computer and System Sciences 49, 149-167 (1994)
-
Nisan, N., Wigderson, A.: Hardness vs randomness. Journal of Computer and System Sciences 49, 149-167 (1994); Preliminary version in Proc. of FOCS 1988
-
(1988)
Preliminary version in Proc. of FOCS
-
-
Nisan, N.1
Wigderson, A.2
-
15
-
-
0030086632
-
Randomness is linear in space. Journal of Computer and System Sciences 52(1), 43-52 (1996)
-
Nisan, N., Zuckerman, D.: Randomness is linear in space. Journal of Computer and System Sciences 52(1), 43-52 (1996); Preliminary version in Proc. of STOC 1993
-
(1993)
Preliminary version in Proc. of STOC
-
-
Nisan, N.1
Zuckerman, D.2
-
17
-
-
27844593208
-
Simple extractors for all min-entropies and a new pseudorandom generator
-
Shaltiel, R., Umans, C.: Simple extractors for all min-entropies and a new pseudorandom generator. Journal of the ACM 52(2), 172-216 (2005)
-
(2005)
Journal of the ACM
, vol.52
, Issue.2
, pp. 172-216
-
-
Shaltiel, R.1
Umans, C.2
-
19
-
-
0006697740
-
Extractors from Reed-Muller codes
-
Technical Report TR01-036, Electronic Colloquium on Computational Complexity
-
Ta-Shma, A., Zuckerman, D., Safra, S.: Extractors from Reed-Muller codes. Technical Report TR01-036, Electronic Colloquium on Computational Complexity (2001)
-
(2001)
-
-
Ta-Shma, A.1
Zuckerman, D.2
Safra, S.3
-
20
-
-
0005314594
-
Extractors and pseudorandom generators
-
Trevisan, L.: Extractors and pseudorandom generators. Journal of the ACM 48(4), 860-879 (2001)
-
(2001)
Journal of the ACM
, vol.48
, Issue.4
, pp. 860-879
-
-
Trevisan, L.1
-
21
-
-
4344628859
-
Constructing locally computable extractors and cryptosystems in the bounded-storage model
-
Vadhan, S.P.: Constructing locally computable extractors and cryptosystems in the bounded-storage model. Journal of Cryptology 17(1), 43-77 (2004)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.P.1
-
22
-
-
15244355932
-
The complexity of constructing pseudorandom generators from hard functions
-
Viola, E.: The complexity of constructing pseudorandom generators from hard functions. Computational Complexity 13(3-4), 147-188 (2004)
-
(2004)
Computational Complexity
, vol.13
, Issue.3-4
, pp. 147-188
-
-
Viola, E.1
-
24
-
-
26444474834
-
Simple Extractors via Constructions of Cryptographic Pseudo-random Generators
-
Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Zimand, M.: Simple Extractors via Constructions of Cryptographic Pseudo-random Generators. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 115-127. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 115-127
-
-
Zimand, M.1
-
26
-
-
0001023343
-
Simulating BPP using a general weak random source
-
Zuckerman, D.: Simulating BPP using a general weak random source. Algorithmica 16(4/5), 367-391 (1996)
-
(1996)
Algorithmica
, vol.16
, Issue.4-5
, pp. 367-391
-
-
Zuckerman, D.1
|