메뉴 건너뛰기




Volumn , Issue , 2010, Pages 437-446

Efficiency improvements in constructing pseudorandom generators from one-way functions

Author keywords

one way function; pseudorandom generator; security preserving

Indexed keywords

EFFICIENCY IMPROVEMENT; NEW CONSTRUCTION; ONE-WAY FUNCTIONS; PSEUDORANDOM GENERATORS;

EID: 77954721007     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1806689.1806750     Document Type: Conference Paper
Times cited : (49)

References (28)
  • 2
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • Apr.
    • B. Chor and O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput., 17(2):230-261, Apr. 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 3
  • 6
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
    • Preliminary version in FOCS'86
    • O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM, 38(1):691-729, 1991. Preliminary version in FOCS'86.
    • (1991) Journal of the ACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 7
  • 11
    • 77954636265 scopus 로고    scopus 로고
    • Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function
    • I. Haitner, M. Nguyen, S. J. Ong, O. Reingold, and S. Vadhan. Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function. SIAM Journal on Computing, 39(3):1153-1218, 2009.
    • (2009) SIAM Journal on Computing , vol.39 , Issue.3 , pp. 1153-1218
    • Haitner, I.1    Nguyen, M.2    Ong, S.J.3    Reingold, O.4    Vadhan, S.5
  • 13
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • Preliminary versions in STOC'89 and STOC'90
    • J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM Journal on Computing, 28(4):1364-1396, 1999. Preliminary versions in STOC'89 and STOC'90.
    • (1999) SIAM Journal on Computing , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 20
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373-386, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 21
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • Preliminary version in CRYPTO'89
    • M. Naor. Bit commitment using pseudorandomness. Journal of Cryptology, 4(2):151-158, 1991. Preliminary version in CRYPTO'89.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 151-158
    • Naor, M.1
  • 23
    • 0031097176 scopus 로고    scopus 로고
    • Decoding of Reed Solomon codes beyond the error-correction bound
    • DOI 10.1006/jcom.1997.0439, PII S0885064X97904398
    • M. Sudan. Decoding of Reed-Solomon codes beyond the error correction bound. J. of Complexity, 13:180-193, 1997. (Pubitemid 127172728)
    • (1997) Journal of Complexity , vol.13 , Issue.1 , pp. 180-193
    • Sudan, M.1
  • 25
    • 4344628859 scopus 로고    scopus 로고
    • Constructing locally computable extractors and cryptosystems in the bounded-storage model
    • January
    • S. P. Vadhan. Constructing locally computable extractors and cryptosystems in the bounded-storage model. Journal of Cryptology, 17(1):43-77, January 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 43-77
    • Vadhan, S.P.1
  • 26
    • 0021518106 scopus 로고
    • A theory of the learnable
    • L. G. Valiant. A theory of the learnable. Communications of the ACM, 27(11):1134-1142, 1984.
    • (1984) Communications of the ACM , vol.27 , Issue.11 , pp. 1134-1142
    • Valiant, L.G.1
  • 28
    • 0001023343 scopus 로고    scopus 로고
    • Simulating BPP using a general weak random source
    • Oct./Nov.
    • D. Zuckerman. Simulating BPP using a general weak random source. Algorithmica, 16(4/5):367-391, Oct./Nov. 1996.
    • (1996) Algorithmica , vol.16 , Issue.4-5 , pp. 367-391
    • Zuckerman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.