메뉴 건너뛰기




Volumn 6597 LNCS, Issue , 2011, Pages 37-54

Security amplification for the cascade of arbitrarily weak PRPs: Tight bounds via the interactive hardcore lemma

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; INVERSE PROBLEMS;

EID: 79953203911     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19571-6_3     Document Type: Conference Paper
Times cited : (22)

References (16)
  • 2
    • 70350281850 scopus 로고    scopus 로고
    • Security amplification for interactive cryptographic primitives
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Dodis, Y., Impagliazzo, R., Jaiswal, R., Kabanets, V.: Security amplification for interactive cryptographic primitives. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 128-145. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 128-145
    • Dodis, Y.1    Impagliazzo, R.2    Jaiswal, R.3    Kabanets, V.4
  • 4
    • 33745580685 scopus 로고    scopus 로고
    • Pseudorandom generators from one-way functions: A simple construction for any hardness
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
    • Holenstein, T.: Pseudorandom generators from one-way functions: A simple construction for any hardness. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 443-461. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 443-461
    • Holenstein, T.1
  • 7
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing 17(2), 373-386 (1988)
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 8
    • 84947240143 scopus 로고    scopus 로고
    • Indistinguishability of random systems
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Maurer, U.: Indistinguishability of random systems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 110-132. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 110-132
    • Maurer, U.1
  • 9
    • 38049173959 scopus 로고    scopus 로고
    • Indistinguishability amplification
    • Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
    • Maurer, U., Pietrzak, K., Renner, R.: Indistinguishability amplification. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 130-149. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 130-149
    • Maurer, U.1    Pietrzak, K.2    Renner, R.3
  • 10
    • 70350348921 scopus 로고    scopus 로고
    • Computational indistinguishability amplification: Tight product theorems for system composition
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Maurer, U., Tessaro, S.: Computational indistinguishability amplification: Tight product theorems for system composition. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 355-373. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 355-373
    • Maurer, U.1    Tessaro, S.2
  • 11
    • 77949588772 scopus 로고    scopus 로고
    • A hardcore lemma for computational indistinguishability: Security amplification for arbitrarily weak prgs with optimal stretch
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Maurer, U., Tessaro, S.: A hardcore lemma for computational indistinguishability: Security amplification for arbitrarily weak prgs with optimal stretch. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 237-254. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 237-254
    • Maurer, U.1    Tessaro, S.2
  • 13
    • 23944518373 scopus 로고    scopus 로고
    • Efficient amplification of the security of weak pseudo-random function generators
    • Myers, S.: Efficient amplification of the security of weak pseudo-random function generators. Journal of Cryptology 16, 1-24 (2003)
    • (2003) Journal of Cryptology , vol.16 , pp. 1-24
    • Myers, S.1
  • 14
    • 38049052188 scopus 로고    scopus 로고
    • Parallel repetition of computationally sound protocols revisited
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Pietrzak, K., Wikström, D.: Parallel repetition of computationally sound protocols revisited. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 86-102. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 86-102
    • Pietrzak, K.1    Wikström, D.2
  • 15
    • 38049165160 scopus 로고    scopus 로고
    • Random oracles and auxiliary input
    • Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
    • Unruh, D.: Random oracles and auxiliary input. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 205-223. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 205-223
    • Unruh, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.