메뉴 건너뛰기




Volumn 8874, Issue , 2014, Pages 102-121

Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 84916235975     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-45608-8_6     Document Type: Conference Paper
Times cited : (33)

References (59)
  • 1
    • 0344550526 scopus 로고    scopus 로고
    • Proving hard-core predicates using list decoding
    • IEEE Computer Society Press
    • Akavia, A., Goldwasser, S., Safra, S.: Proving hard-core predicates using list decoding. In: 44th FOCS, pp. 146–159. IEEE Computer Society Press (October 2003)
    • (2003) 44th FOCS , pp. 146-159
    • Akavia, A.1    Goldwasser, S.2    Safra, S.3
  • 2
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • In: Reingold, O. (ed.), Springer, Heidelberg
    • Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474–495. Springer, Heidelberg (2009)
    • (2009) TCC 2009. LNCS , vol.5444 , pp. 474-495
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 3
    • 0023985196 scopus 로고
    • RSA and Rabin functions: Certain parts are as hard as the whole
    • Alexi, W., Chor, B., Goldreich, O., Schnorr, C.P.: RSA and Rabin functions: Certain parts are as hard as the whole. SIAM Journal on Computing 17(2), 194–209 (1988)
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 194-209
    • Alexi, W.1    Chor, B.2    Goldreich, O.3    Schnorr, C.P.4
  • 6
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • In: Menezes, A. (ed.), Springer, Heidelberg
    • Bellare, M., Boldyreva, A., O’Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535–552. Springer, Heidelberg (2007)
    • (2007) CRYPTO 2007. LNCS , vol.4622 , pp. 535-552
    • Bellare, M.1    Boldyreva, A.2    O’neill, A.3
  • 7
    • 72449189555 scopus 로고    scopus 로고
    • Hedged public-key encryption: How to protect against bad randomness
    • In: Matsui, M. (ed.), Springer, Heidelberg
    • Bellare, M., Brakerski, Z., Naor, M., Ristenpart, T., Segev, G., Shacham, H., Yilek, S.: Hedged public-key encryption: How to protect against bad randomness. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 232–249. Springer, Heidelberg (2009)
    • (2009) ASIACRYPT 2009. LNCS , vol.5912 , pp. 232-249
    • Bellare, M.1    Brakerski, Z.2    Naor, M.3    Ristenpart, T.4    Segev, G.5    Shacham, H.6    Yilek, S.7
  • 8
    • 51849127804 scopus 로고    scopus 로고
    • Deterministic encryption: Definitional equivalences and constructions without random oracles
    • In: Wagner, D. (ed.), Springer, Heidelberg
    • Bellare, M., Fischlin, M., O’Neill, A., Ristenpart, T.: Deterministic encryption: Definitional equivalences and constructions without random oracles. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 360–378. Springer, Heidelberg (2008)
    • (2008) CRYPTO 2008. LNCS , vol.5157 , pp. 360-378
    • Bellare, M.1    Fischlin, M.2    O’neill, A.3    Ristenpart, T.4
  • 10
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • Ashby, V. (ed.), ACM Press (November
    • Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Ashby, V. (ed.) ACM CCS 1993, pp. 62–73. ACM Press (November 1993)
    • (1993) ACM CCS 1993 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 11
    • 33746041431 scopus 로고    scopus 로고
    • The security of triple encryption and a framework for code-based game-playing proofs
    • In: Vaudenay, S. (ed.), Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409–426. Springer, Heidelberg (2006)
    • (2006) EUROCRYPT 2006. LNCS , vol.4004 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2
  • 13
    • 84904361123 scopus 로고    scopus 로고
    • On the existence of extractable one-way functions
    • Shmoys, D.B. (ed.), ACM Press (May/June
    • Bitansky, N., Canetti, R., Paneth, O., Rosen, A.: On the existence of extractable one-way functions. In: Shmoys, D.B. (ed.) 46th ACM STOC, pp. 505–514. ACM Press (May/June 2014)
    • (2014) 46th ACM STOC , pp. 505-514
    • Bitansky, N.1    Canetti, R.2    Paneth, O.3    Rosen, A.4
  • 14
    • 84858320408 scopus 로고    scopus 로고
    • Point obfuscation and 3-round zero-knowledge
    • In: Cramer, R. (ed.), Springer, Heidelberg
    • Bitansky, N., Paneth, O.: Point obfuscation and 3-round zero-knowledge. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 190–208. Springer, Heidelberg (2012)
    • (2012) TCC 2012. LNCS , vol.7194 , pp. 190-208
    • Bitansky, N.1    Paneth, O.2
  • 15
    • 0022716288 scopus 로고
    • A simple unpredictable pseudo-random number generator
    • Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM Journal on Computing 15(2), 364–383 (1986)
    • (1986) SIAM Journal on Computing , vol.15 , Issue.2 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 16
    • 84949995981 scopus 로고
    • An Efficient probabilistic public key encryption scheme which hides all partial information
    • In: Blakely, G.R., Chaum, D. (eds.), Springer, Heidelberg
    • Blum, M., Goldwasser, S.: An Efficient probabilistic public key encryption scheme which hides all partial information. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 289–299. Springer, Heidelberg (1985)
    • (1985) CRYPTO 1984. LNCS , vol.196 , pp. 289-299
    • Blum, M.1    Goldwasser, S.2
  • 17
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudorandom bits
    • Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudorandom bits. SIAM Journal on Computing 13(4), 850–864 (1984)
    • (1984) SIAM Journal on Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 18
    • 51849114183 scopus 로고    scopus 로고
    • On notions of security for deterministic encryption, and efficient constructions without random oracles
    • In: Wagner, D. (ed.), Springer, Heidelberg
    • Boldyreva, A., Fehr, S., O’Neill, A.: On notions of security for deterministic encryption, and efficient constructions without random oracles. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 335–359. Springer, Heidelberg (2008)
    • (2008) CRYPTO 2008. LNCS , vol.5157 , pp. 335-359
    • Boldyreva, A.1    Fehr, S.2    O’neill, A.3
  • 19
    • 84892392741 scopus 로고    scopus 로고
    • Constrained pseudorandom functions and their applications
    • In: Sako, K., Sarkar, P. (eds.), Springer, Heidelberg
    • Boneh, D., Waters, B.: Constrained pseudorandom functions and their applications. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 280–300. Springer, Heidelberg (2013)
    • (2013) ASIACRYPT 2013, Part II. LNCS , vol.8270 , pp. 280-300
    • Boneh, D.1    Waters, B.2
  • 20
    • 84958538748 scopus 로고    scopus 로고
    • On extractability obfuscation
    • In: Lindell, Y. (ed.), Springer, Heidelberg
    • Boyle, E., Chung, K.-M., Pass, R.: On extractability obfuscation. In: Lindell, Y. (ed.) TCC 2014. LNCS, vol. 8349, pp. 52–73. Springer, Heidelberg (2014)
    • (2014) TCC 2014. LNCS , vol.8349 , pp. 52-73
    • Boyle, E.1    Chung, K.-M.2    Pass, R.3
  • 21
    • 84958528095 scopus 로고    scopus 로고
    • Functional signatures and pseudorandom functions
    • In: Krawczyk, H. (ed.), Springer, Heidelberg
    • Boyle, E., Goldwasser, S., Ivan, I.: Functional signatures and pseudorandom functions. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 501–519. Springer, Heidelberg (2014)
    • (2014) PKC 2014. LNCS , vol.8383 , pp. 501-519
    • Boyle, E.1    Goldwasser, S.2    Ivan, I.3
  • 24
    • 84958626314 scopus 로고    scopus 로고
    • Towards realizing random oracles: Hash functions that hide all partial information
    • In: Kaliski Jr., B.S. (ed.), Springer, Heidelberg
    • Canetti, R.: Towards realizing random oracles: Hash functions that hide all partial information. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 455–469. Springer, Heidelberg (1997)
    • (1997) CRYPTO 1997. LNCS , vol.1294 , pp. 455-469
    • Canetti, R.1
  • 25
    • 84945139265 scopus 로고    scopus 로고
    • The bit security of paillier’s encryption scheme and its applications
    • In: Pfitzmann, B. (ed.), Springer, Heidelberg
    • Catalano, D., Gennaro, R., Howgrave-Graham, N.: The bit security of paillier’s encryption scheme and its applications. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 229–243. Springer, Heidelberg (2001)
    • (2001) EUROCRYPT 2001. LNCS , vol.2045 , pp. 229-243
    • Catalano, D.1    Gennaro, R.2    Howgrave-Graham, N.3
  • 26
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • In: Krawczyk, H. (ed.), Springer, Heidelberg
    • Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13–25. Springer, Heidelberg (1998)
    • (1998) CRYPTO 1998. LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 27
    • 77949580684 scopus 로고    scopus 로고
    • Public-key encryption schemes with auxiliary inputs
    • In: Micciancio, D. (ed.), Springer, Heidelberg
    • Dodis, Y., Goldwasser, S., Tauman Kalai, Y., Peikert, C., Vaikuntanathan, V.: Public-key encryption schemes with auxiliary inputs. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 361–381. Springer, Heidelberg (2010)
    • (2010) TCC 2010. LNCS , vol.5978 , pp. 361-381
    • Dodis, Y.1    Goldwasser, S.2    Tauman Kalai, Y.3    Peikert, C.4    Vaikuntanathan, V.5
  • 28
    • 0011189534 scopus 로고    scopus 로고
    • Stronger security proofs for RSA and Rabin bits
    • Fischlin, R., Schnorr, C.-P.: Stronger security proofs for RSA and Rabin bits. Journal of Cryptology 13(2), 221–244 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.2 , pp. 221-244
    • Fischlin, R.1    Schnorr, C.-P.2
  • 29
    • 84878511341 scopus 로고    scopus 로고
    • More constructions of lossy and correlation-secure trapdoor functions
    • Freeman, D.M., Goldreich, O., Kiltz, E., Rosen, A., Segev, G.: More constructions of lossy and correlation-secure trapdoor functions. Journal of Cryptology 26(1), 39–74 (2013)
    • (2013) Journal of Cryptology , vol.26 , Issue.1 , pp. 39-74
    • Freeman, D.M.1    Goldreich, O.2    Kiltz, E.3    Rosen, A.4    Segev, G.5
  • 30
    • 84858326015 scopus 로고    scopus 로고
    • A unified approach to deterministic encryption: New constructions and a connection to computational entropy
    • In: Cramer, R. (ed.), Springer, Heidelberg
    • Fuller, B., O’Neill, A., Reyzin, L.: A unified approach to deterministic encryption: New constructions and a connection to computational entropy. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 582–599. Springer, Heidelberg (2012)
    • (2012) TCC 2012. LNCS , vol.7194 , pp. 582-599
    • Fuller, B.1    O’neill, A.2    Reyzin, L.3
  • 31
    • 84893494300 scopus 로고    scopus 로고
    • Candidate indistinguishability obfuscation and functional encryption for all circuits
    • IEEE Computer Society Press (October
    • Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B.: Candidate indistinguishability obfuscation and functional encryption for all circuits. In: 54th FOCS, pp. 40–49. IEEE Computer Society Press (October 2013)
    • (2013) 54th FOCS , pp. 40-49
    • Garg, S.1    Gentry, C.2    Halevi, S.3    Raykova, M.4    Sahai, A.5    Waters, B.6
  • 32
    • 84905378383 scopus 로고    scopus 로고
    • On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
    • In: Garay, J.A., Gennaro, R. (eds.), Springer, Heidelberg
    • Garg, S., Gentry, C., Halevi, S., Wichs, D.: On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. LNCS, vol. 8616, pp. 518–535. Springer, Heidelberg (2014)
    • (2014) CRYPTO 2014, Part I. LNCS , vol.8616 , pp. 518-535
    • Garg, S.1    Gentry, C.2    Halevi, S.3    Wichs, D.4
  • 33
    • 17444407353 scopus 로고    scopus 로고
    • An improved pseudo-random generator based on the discrete logarithm problem
    • Gennaro, R.: An improved pseudo-random generator based on the discrete logarithm problem. Journal of Cryptology 18(2), 91–110 (2005)
    • (2005) Journal of Cryptology , vol.18 , Issue.2 , pp. 91-110
    • Gennaro, R.1
  • 35
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions
    • ACM Press (May
    • Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: 21st ACM STOC, pp. 25–32. ACM Press (May 1989)
    • (1989) 21st ACM STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.A.2
  • 36
    • 17444362761 scopus 로고    scopus 로고
    • On the security of modular exponentiation with application to the construction of pseudorandom generators
    • Goldreich, O., Rosen, V.: On the security of modular exponentiation with application to the construction of pseudorandom generators. Journal of Cryptology 16(2), 71–93 (2003)
    • (2003) Journal of Cryptology , vol.16 , Issue.2 , pp. 71-93
    • Goldreich, O.1    Rosen, V.2
  • 38
    • 79953218346 scopus 로고    scopus 로고
    • Correlated-input secure hash functions
    • In: Ishai, Y. (ed.), Springer, Heidelberg
    • Goyal, V., O’Neill, A., Rao, V.: Correlated-input secure hash functions. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 182–200. Springer, Heidelberg (2011)
    • (2011) TCC 2011. LNCS , vol.6597 , pp. 182-200
    • Goyal, V.1    O’neill, A.2    Rao, V.3
  • 39
    • 0032305852 scopus 로고    scopus 로고
    • The security of individual RSA bits
    • IEEE Computer Society Press (November
    • Hastad, J., Naslund, M.: The security of individual RSA bits. In: 39th FOCS, pp. 510–521. IEEE Computer Society Press (November 1998)
    • (1998) 39th FOCS , pp. 510-521
    • Hastad, J.1    Naslund, M.2
  • 41
    • 84901669583 scopus 로고    scopus 로고
    • Replacing a random oracle: Full domain hash from indistinguishability obfuscation
    • In: Nguyen, P.Q., Oswald, E. (eds.), Springer, Heidelberg
    • Hohenberger, S., Sahai, A., Waters, B.: Replacing a random oracle: Full domain hash from indistinguishability obfuscation. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 201–220. Springer, Heidelberg (2014)
    • (2014) EUROCRYPT 2014. LNCS , vol.8441 , pp. 201-220
    • Hohenberger, S.1    Sahai, A.2    Waters, B.3
  • 42
    • 85034862443 scopus 로고
    • A pseudo-random bit generator based on elliptic logarithms
    • In: Odlyzko, A.M. (ed.), Springer, Heidelberg
    • Kaliski Jr., B.S.: A pseudo-random bit generator based on elliptic logarithms. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 84–103. Springer, Heidelberg (1987)
    • (1987) CRYPTO 1986. LNCS , vol.263 , pp. 84-103
    • Kaliski, B.S.1
  • 43
    • 84889072826 scopus 로고    scopus 로고
    • Delegatable pseudorandom functions and applications
    • Sadeghi, A.-R., Gligor, V.D., Yung, M. (eds.), ACM Press (November
    • Kiayias, A., Papadopoulos, S., Triandopoulos, N., Zacharias, T.: Delegatable pseudorandom functions and applications. In: Sadeghi, A.-R., Gligor, V.D., Yung, M. (eds.) ACM CCS 2013, pp. 669–684. ACM Press (November 2013)
    • (2013) ACM CCS 2013 , pp. 669-684
    • Kiayias, A.1    Papadopoulos, S.2    Triandopoulos, N.3    Zacharias, T.4
  • 44
    • 77957001343 scopus 로고    scopus 로고
    • Instantiability of RSA-OAEP under chosenplaintext attack
    • In: Rabin, T. (ed.), Springer, Heidelberg
    • Kiltz, E., O’Neill, A., Smith, A.: Instantiability of RSA-OAEP under chosenplaintext attack. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 295–313. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 295-313
    • Kiltz, E.1    O’neill, A.2    Smith, A.3
  • 45
    • 84883330159 scopus 로고    scopus 로고
    • Regularity of lossy RSA on subdomains and its applications
    • In: Johansson, T., Nguyen, P.Q. (eds.), Springer, Heidelberg
    • Lewko, M., O’Neill, A., Smith, A.: Regularity of lossy RSA on subdomains and its applications. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 55–75. Springer, Heidelberg (2013)
    • (2013) EUROCRYPT 2013. LNCS , vol.7881 , pp. 55-75
    • Lewko, M.1    O’neill, A.2    Smith, A.3
  • 46
    • 0023985034 scopus 로고
    • The discrete logarithm hides O(log n) bits
    • Long, D.L., Wigderson, A.: The discrete logarithm hides O(log n) bits. SIAM Journal on Computing 17(2), 363–372 (1988)
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 363-372
    • Long, D.L.1    Wigderson, A.2
  • 47
    • 24144444653 scopus 로고    scopus 로고
    • Hard bits of the discrete log with applications to password authentication
    • In: Menezes, A. (ed.), Springer, Heidelberg
    • MacKenzie, P.D., Patel, S.: Hard bits of the discrete log with applications to password authentication. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 209–226. Springer, Heidelberg (2005)
    • (2005) CT-RSA 2005. LNCS , vol.3376 , pp. 209-226
    • Mackenzie, P.D.1    Patel, S.2
  • 48
    • 0345701848 scopus 로고    scopus 로고
    • All bits in ax + b mod p are hard
    • N¨aslund, M., In: Koblitz, N. (ed.), Springer, Heidelberg
    • N¨aslund, M.: All bits in ax + b mod p are hard. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 114–128. Springer, Heidelberg (1996)
    • (1996) CRYPTO 1996. LNCS , vol.1109 , pp. 114-128
  • 49
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • In: Stern, J. (ed.), Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
    • (1999) EUROCRYPT 1999. LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 50
    • 84957638120 scopus 로고    scopus 로고
    • An efficient discrete log pseudo random generator
    • In: Krawczyk, H. (ed.), Springer, Heidelberg
    • Patel, S., Sundaram, G.S.: An efficient discrete log pseudo random generator. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 304–317. Springer, Heidelberg (1998)
    • (1998) CRYPTO 1998. LNCS , vol.1462 , pp. 304-317
    • Patel, S.1    Sundaram, G.S.2
  • 51
    • 51849152661 scopus 로고    scopus 로고
    • Lossy trapdoor functions and their applications
    • Ladner, R.E., Dwork, C. (eds.), ACM Press (May
    • Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: Ladner, R.E., Dwork, C. (eds.) 40th ACM STOC, pp. 187–196. ACM Press (May 2008)
    • (2008) 40th ACM STOC , pp. 187-196
    • Peikert, C.1    Waters, B.2
  • 53
    • 84904361647 scopus 로고    scopus 로고
    • How to use indistinguishability obfuscation: Deniable encryption, and more
    • Shmoys, D.B. (ed.), ACM Press (May/June
    • Sahai, A., Waters, B.: How to use indistinguishability obfuscation: Deniable encryption, and more. In: Shmoys, D.B. (ed.) 46th ACM STOC, pp. 475–484. ACM Press (May/June 2014)
    • (2014) 46th ACM STOC , pp. 475-484
    • Sahai, A.1    Waters, B.2
  • 54
    • 84916207209 scopus 로고
    • RSA-bits are 0.5 + _ secure
    • In: Beth, T., Cot, N., Ingemarsson, I. (eds.), Springer, Heidelberg
    • Alexi, W., Schnorr, C.-P.: RSA-bits are 0.5 + _ secure. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 113–126. Springer, Heidelberg (1985)
    • (1985) EUROCRYPT 1984. LNCS , vol.209 , pp. 113-126
    • Alexi, W.1    Schnorr, C.-P.2
  • 55
    • 56749098583 scopus 로고    scopus 로고
    • On the provable security of an efficient RSAbased pseudorandom generator
    • In: Lai, X., Chen, K. (eds.), Springer, Heidelberg
    • Steinfeld, R., Pieprzyk, J., Wang, H.: On the provable security of an efficient RSAbased pseudorandom generator. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 194–209. Springer, Heidelberg (2006)
    • (2006) ASIACRYPT 2006. LNCS , vol.4284 , pp. 194-209
    • Steinfeld, R.1    Pieprzyk, J.2    Wang, H.3
  • 56
    • 85034622087 scopus 로고
    • Efficient and secure pseudo-random number generation
    • In: Blakely, G.R., Chaum, D. (eds.), Springer, Heidelberg
    • Vazirani, U.V., Vazirani, V.V.: Efficient and secure pseudo-random number generation. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 193–202. Springer, Heidelberg (1985)
    • (1985) CRYPTO 1984. LNCS , vol.196 , pp. 193-202
    • Vazirani, U.V.1    Vazirani, V.V.2
  • 57
    • 84873398049 scopus 로고    scopus 로고
    • Barriers in cryptography with weak, correlated and leaky sources
    • Kleinberg, R.D. (ed.), ACM (January
    • Wichs, D.: Barriers in cryptography with weak, correlated and leaky sources. In: Kleinberg, R.D. (ed.) ITCS 2013, pp. 111–126. ACM (January 2013)
    • (2013) ITCS 2013 , pp. 111-126
    • Wichs, D.1
  • 58
    • 0020301290 scopus 로고
    • Theory and applications of trapdoor functions (extended abstract)
    • IEEE Computer Society Press (November
    • Yao, A.C.-C.: Theory and applications of trapdoor functions (extended abstract). In: 23rd FOCS, pp. 80–91. IEEE Computer Society Press (November 1982)
    • (1982) 23rd FOCS , pp. 80-91
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.