-
1
-
-
84990678058
-
Simple construction of almost k-wise independent random variables
-
Noga Alon, Oded Goldreich, Johan Hastad, and Reńe Peralta. Simple construction of almost k-wise independent random variables. Random Structures and Algorithms, 3(3): 289-304, 1992.
-
(1992)
Random Structures and Algorithms
, vol.3
, Issue.3
, pp. 289-304
-
-
Alon, N.1
Goldreich, O.2
Hastad, J.3
Peralta., R.4
-
2
-
-
34848820045
-
Simulating independence: New constructions of condensers, ramsey graphs, dispersers, and extractors
-
Boaz Barak, Guy Kindler, Ronen Shaltiel, Benny Sudakov, and Avi Wigderson. Simulating independence: New constructions of condensers, Ramsey graphs, dispersers, and extractors. In Proceedings of the 37th Annual ACM Symposium on Theory of Computing, pages 1-10, 2005.
-
(2005)
Proceedings of the 37th Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Barak, B.1
Kindler, G.2
Shaltiel, R.3
Sudakov, B.4
Wigderson, A.5
-
3
-
-
84958972496
-
High-bandwidth encryption with lowbandwidth smartcards
-
33-??
-
Matt Blaze. High-bandwidth encryption with lowbandwidth smartcards. Lecture Notes in Computer Science, 1039: 33-??, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1039
-
-
Blaze., M.1
-
4
-
-
34247619858
-
On the construction of affine-source extractors
-
Jean Bourgain. On the construction of affine-source extractors. Geometric and Functional Analysis, 1: 33- 57, 2007.
-
(2007)
Geometric and Functional Analysis
, vol.1
, pp. 33-57
-
-
Bourgain, J.1
-
5
-
-
84957063575
-
On the security properties of OAEP as an all-or-nothing transform
-
Victor Boyko. On the security properties of OAEP as an all-or-nothing transform. Lecture Notes in Computer Science, 1666: 503-518, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 503-518
-
-
Boyko, V.1
-
6
-
-
84948973494
-
Exposure-resilient functions and all-or-nothing transforms
-
Springer-Verlag, May
-
Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, and Amit Sahai. Exposure-resilient functions and all-or-nothing transforms. In Bart Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 453-469. Springer-Verlag, May 2000.
-
(2000)
Bart Preneel, Editor, Advances in Cryptology - EUROCRYPT 2000, Volume 1807 of Lecture Notes in Computer Science
, pp. 453-469
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
7
-
-
0022198802
-
The bit extraction problem or t-resilient functions
-
Benny Chor, Joel Friedman, Oded Goldreich, Johan Hastad, Steven Rudich, and Roman Smolensky. The bit extraction problem or t-resilient functions. In Proceedings of the 26th Annual IEEE Symposium on Foundations of Computer Science, pages 396-407, 1985.
-
(1985)
Proceedings of the 26th Annual IEEE Symposium on Foundations of Computer Science
, pp. 396-407
-
-
Chor, B.1
Friedman, J.2
Goldreich, O.3
Hastad, J.4
Rudich, S.5
Smolensky., R.6
-
8
-
-
0344839024
-
-
PhD thesis, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science
-
Yevgeniy Dodis. Exposure-resilient cryptography. PhD thesis, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.
-
(2000)
Exposure-resilient Cryptography
-
-
Dodis., Y.1
-
9
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
Serge Vaudenay, editor, Springer
-
Cynthia Dwork, Krishnaram Kenthapadi, Frank Mc- Sherry, Ilya Mironov, and Moni Naor. Our data, ourselves: Privacy via distributed noise generation. In Serge Vaudenay, editor, EUROCRYPT, volume 4004 of Lecture Notes in Computer Science, pages 486-503. Springer, 2006.
-
(2006)
EUROCRYPT, Volume 4004 of Lecture Notes in Computer Science
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
Sherry F.M.-3
Mironov, I.4
Naor, M.5
-
12
-
-
84957628646
-
Scramble all, encrypt small
-
Markus Jakobsson, Julien P. Stern, and Moti Yung. Scramble all, encrypt small. Lecture Notes in Computer Science, 1636: 95-111, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1636
, pp. 95-111
-
-
Jakobsson, M.1
Stern, J.P.2
Yung., M.3
-
13
-
-
70350694296
-
Deterministic extractors for affine sources from bent functions
-
Jesse Kamp and David Zuckerman. Deterministic extractors for affine sources from bent functions. Manuscript.
-
Manuscript
-
-
Kamp, J.1
Zuckerman., D.2
-
14
-
-
35448977790
-
Deterministic extractors for bit-fixing sources and exposureresilient cryptography
-
Jesse Kamp and David Zuckerman. Deterministic extractors for bit-fixing sources and exposureresilient cryptography. SIAM Journal on Computing, 36(5): 1231-1247, 2007.
-
(2007)
SIAM Journal on Computing
, vol.36
, Issue.5
, pp. 1231-1247
-
-
Kamp, J.1
Zuckerman., D.2
-
15
-
-
0027641832
-
Small-bias probability spaces: Efficient constructions and applications
-
August
-
Joseph Naor and Moni Naor. Small-bias probability spaces: Efficient constructions and applications. SIAM Journal on Computing, 22(4): 838-856, August 1993.
-
(1993)
SIAM Journal on Computing
, vol.22
, Issue.4
, pp. 838-856
-
-
Naor, J.1
Naor, M.2
-
17
-
-
0038309373
-
Extracting all the randomness and reducing the error in trevisan's extractors
-
Ran Raz, Omer Reingold, and Salil Vadhan. Extracting all the randomness and reducing the error in trevisan's extractors. jcss, 65(1): 97-128, 2002.
-
(2002)
Jcss
, vol.65
, Issue.1
, pp. 97-128
-
-
Raz, R.1
Reingold, O.2
Vadhan, S.3
-
18
-
-
84947912552
-
All-or-nothing encryption and the package transform
-
210-??
-
Ronald Rivest. All-or-nothing encryption and the package transform. Lecture Notes in Computer Science, 1267: 210-??, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1267
-
-
Rivest, R.1
-
19
-
-
0005314594
-
Extractors and pseudorandom generators
-
Luca Trevisan. Extractors and pseudorandom generators. Journal of the ACM, pages 860-879, 2001.
-
(2001)
Journal of the ACM
, pp. 860-879
-
-
Trevisan, L.1
|