-
1
-
-
0344550526
-
Proving hard-core predicates using list decoding
-
IEEE Computer Society Press
-
Akavia, A., Goldwasser, S., Safra, S.: Proving hard-core predicates using list decoding. In: 44th FOCS, pp. 146–159. IEEE Computer Society Press (October 2003)
-
(2003)
44th FOCS
, pp. 146-159
-
-
Akavia, A.1
Goldwasser, S.2
Safra, S.3
-
2
-
-
70350627587
-
Simultaneous hardcore bits and cryptography against memory attacks
-
In: Reingold, O. (ed.), Springer, Heidelberg
-
Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474–495. Springer, Heidelberg (2009)
-
(2009)
TCC 2009. LNCS
, vol.5444
, pp. 474-495
-
-
Akavia, A.1
Goldwasser, S.2
Vaikuntanathan, V.3
-
3
-
-
0023985196
-
RSA and Rabin functions: Certain parts are as hard as the whole
-
Alexi, W., Chor, B., Goldreich, O., Schnorr, C.P.: RSA and Rabin functions: Certain parts are as hard as the whole. SIAM Journal on Computing 17(2), 194–209 (1988)
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 194-209
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.P.4
-
4
-
-
84894263255
-
-
Cryptology ePrint Archive, Report 2013/689, Version 20131031:060024 (October 31
-
Ananth, P., Boneh, D., Garg, S., Sahai, A., Zhandry, M.: Differing-inputs obfuscation and applications. Cryptology ePrint Archive, Report 2013/689, Version 20131031:060024 (October 31, 2013)
-
(2013)
Differing-inputs obfuscation and applications
-
-
Ananth, P.1
Boneh, D.2
Garg, S.3
Sahai, A.4
Zhandry, M.5
-
5
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
In: Kilian, J. (ed.), Springer, Heidelberg
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001)
-
(2001)
CRYPTO 2001. LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.P.6
Yang, K.7
-
6
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
In: Menezes, A. (ed.), Springer, Heidelberg
-
Bellare, M., Boldyreva, A., O’Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535–552. Springer, Heidelberg (2007)
-
(2007)
CRYPTO 2007. LNCS
, vol.4622
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O’neill, A.3
-
7
-
-
72449189555
-
Hedged public-key encryption: How to protect against bad randomness
-
In: Matsui, M. (ed.), Springer, Heidelberg
-
Bellare, M., Brakerski, Z., Naor, M., Ristenpart, T., Segev, G., Shacham, H., Yilek, S.: Hedged public-key encryption: How to protect against bad randomness. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 232–249. Springer, Heidelberg (2009)
-
(2009)
ASIACRYPT 2009. LNCS
, vol.5912
, pp. 232-249
-
-
Bellare, M.1
Brakerski, Z.2
Naor, M.3
Ristenpart, T.4
Segev, G.5
Shacham, H.6
Yilek, S.7
-
8
-
-
51849127804
-
Deterministic encryption: Definitional equivalences and constructions without random oracles
-
In: Wagner, D. (ed.), Springer, Heidelberg
-
Bellare, M., Fischlin, M., O’Neill, A., Ristenpart, T.: Deterministic encryption: Definitional equivalences and constructions without random oracles. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 360–378. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008. LNCS
, vol.5157
, pp. 360-378
-
-
Bellare, M.1
Fischlin, M.2
O’neill, A.3
Ristenpart, T.4
-
9
-
-
84884481103
-
-
Cryptology ePrint Archive, Report 2013/424. Preliminary version in CRYPTO
-
Bellare, M., Hoang, V.T., Keelveedhi, S.: Instantiating random oracles via UCEs. Cryptology ePrint Archive, Report 2013/424. Preliminary version in CRYPTO (2013)
-
(2013)
Instantiating random oracles via UCEs
-
-
Bellare, M.1
Hoang, V.T.2
Keelveedhi, S.3
-
10
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Ashby, V. (ed.), ACM Press (November
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Ashby, V. (ed.) ACM CCS 1993, pp. 62–73. ACM Press (November 1993)
-
(1993)
ACM CCS 1993
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
11
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
In: Vaudenay, S. (ed.), Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409–426. Springer, Heidelberg (2006)
-
(2006)
EUROCRYPT 2006. LNCS
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
12
-
-
84916215942
-
-
Cryptology ePrint Archive, Report 2013/873
-
Bellare, M., Stepanovs, I., Tessaro, S.: Poly-many hardcore bits for any oneway function and a framework for differing-inputs obfuscation. Cryptology ePrint Archive, Report 2013/873 (2013), http://eprint.iacr.org/2013/873
-
(2013)
Poly-many hardcore bits for any oneway function and a framework for differing-inputs obfuscation
-
-
Bellare, M.1
Stepanovs, I.2
Tessaro, S.3
-
13
-
-
84904361123
-
On the existence of extractable one-way functions
-
Shmoys, D.B. (ed.), ACM Press (May/June
-
Bitansky, N., Canetti, R., Paneth, O., Rosen, A.: On the existence of extractable one-way functions. In: Shmoys, D.B. (ed.) 46th ACM STOC, pp. 505–514. ACM Press (May/June 2014)
-
(2014)
46th ACM STOC
, pp. 505-514
-
-
Bitansky, N.1
Canetti, R.2
Paneth, O.3
Rosen, A.4
-
14
-
-
84858320408
-
Point obfuscation and 3-round zero-knowledge
-
In: Cramer, R. (ed.), Springer, Heidelberg
-
Bitansky, N., Paneth, O.: Point obfuscation and 3-round zero-knowledge. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 190–208. Springer, Heidelberg (2012)
-
(2012)
TCC 2012. LNCS
, vol.7194
, pp. 190-208
-
-
Bitansky, N.1
Paneth, O.2
-
15
-
-
0022716288
-
A simple unpredictable pseudo-random number generator
-
Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM Journal on Computing 15(2), 364–383 (1986)
-
(1986)
SIAM Journal on Computing
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
16
-
-
84949995981
-
An Efficient probabilistic public key encryption scheme which hides all partial information
-
In: Blakely, G.R., Chaum, D. (eds.), Springer, Heidelberg
-
Blum, M., Goldwasser, S.: An Efficient probabilistic public key encryption scheme which hides all partial information. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 289–299. Springer, Heidelberg (1985)
-
(1985)
CRYPTO 1984. LNCS
, vol.196
, pp. 289-299
-
-
Blum, M.1
Goldwasser, S.2
-
17
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudorandom bits
-
Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudorandom bits. SIAM Journal on Computing 13(4), 850–864 (1984)
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
18
-
-
51849114183
-
On notions of security for deterministic encryption, and efficient constructions without random oracles
-
In: Wagner, D. (ed.), Springer, Heidelberg
-
Boldyreva, A., Fehr, S., O’Neill, A.: On notions of security for deterministic encryption, and efficient constructions without random oracles. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 335–359. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008. LNCS
, vol.5157
, pp. 335-359
-
-
Boldyreva, A.1
Fehr, S.2
O’neill, A.3
-
19
-
-
84892392741
-
Constrained pseudorandom functions and their applications
-
In: Sako, K., Sarkar, P. (eds.), Springer, Heidelberg
-
Boneh, D., Waters, B.: Constrained pseudorandom functions and their applications. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 280–300. Springer, Heidelberg (2013)
-
(2013)
ASIACRYPT 2013, Part II. LNCS
, vol.8270
, pp. 280-300
-
-
Boneh, D.1
Waters, B.2
-
20
-
-
84958538748
-
On extractability obfuscation
-
In: Lindell, Y. (ed.), Springer, Heidelberg
-
Boyle, E., Chung, K.-M., Pass, R.: On extractability obfuscation. In: Lindell, Y. (ed.) TCC 2014. LNCS, vol. 8349, pp. 52–73. Springer, Heidelberg (2014)
-
(2014)
TCC 2014. LNCS
, vol.8349
, pp. 52-73
-
-
Boyle, E.1
Chung, K.-M.2
Pass, R.3
-
21
-
-
84958528095
-
Functional signatures and pseudorandom functions
-
In: Krawczyk, H. (ed.), Springer, Heidelberg
-
Boyle, E., Goldwasser, S., Ivan, I.: Functional signatures and pseudorandom functions. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 501–519. Springer, Heidelberg (2014)
-
(2014)
PKC 2014. LNCS
, vol.8383
, pp. 501-519
-
-
Boyle, E.1
Goldwasser, S.2
Ivan, I.3
-
24
-
-
84958626314
-
Towards realizing random oracles: Hash functions that hide all partial information
-
In: Kaliski Jr., B.S. (ed.), Springer, Heidelberg
-
Canetti, R.: Towards realizing random oracles: Hash functions that hide all partial information. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 455–469. Springer, Heidelberg (1997)
-
(1997)
CRYPTO 1997. LNCS
, vol.1294
, pp. 455-469
-
-
Canetti, R.1
-
25
-
-
84945139265
-
The bit security of paillier’s encryption scheme and its applications
-
In: Pfitzmann, B. (ed.), Springer, Heidelberg
-
Catalano, D., Gennaro, R., Howgrave-Graham, N.: The bit security of paillier’s encryption scheme and its applications. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 229–243. Springer, Heidelberg (2001)
-
(2001)
EUROCRYPT 2001. LNCS
, vol.2045
, pp. 229-243
-
-
Catalano, D.1
Gennaro, R.2
Howgrave-Graham, N.3
-
26
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
In: Krawczyk, H. (ed.), Springer, Heidelberg
-
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13–25. Springer, Heidelberg (1998)
-
(1998)
CRYPTO 1998. LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
27
-
-
77949580684
-
Public-key encryption schemes with auxiliary inputs
-
In: Micciancio, D. (ed.), Springer, Heidelberg
-
Dodis, Y., Goldwasser, S., Tauman Kalai, Y., Peikert, C., Vaikuntanathan, V.: Public-key encryption schemes with auxiliary inputs. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 361–381. Springer, Heidelberg (2010)
-
(2010)
TCC 2010. LNCS
, vol.5978
, pp. 361-381
-
-
Dodis, Y.1
Goldwasser, S.2
Tauman Kalai, Y.3
Peikert, C.4
Vaikuntanathan, V.5
-
28
-
-
0011189534
-
Stronger security proofs for RSA and Rabin bits
-
Fischlin, R., Schnorr, C.-P.: Stronger security proofs for RSA and Rabin bits. Journal of Cryptology 13(2), 221–244 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.2
, pp. 221-244
-
-
Fischlin, R.1
Schnorr, C.-P.2
-
29
-
-
84878511341
-
More constructions of lossy and correlation-secure trapdoor functions
-
Freeman, D.M., Goldreich, O., Kiltz, E., Rosen, A., Segev, G.: More constructions of lossy and correlation-secure trapdoor functions. Journal of Cryptology 26(1), 39–74 (2013)
-
(2013)
Journal of Cryptology
, vol.26
, Issue.1
, pp. 39-74
-
-
Freeman, D.M.1
Goldreich, O.2
Kiltz, E.3
Rosen, A.4
Segev, G.5
-
30
-
-
84858326015
-
A unified approach to deterministic encryption: New constructions and a connection to computational entropy
-
In: Cramer, R. (ed.), Springer, Heidelberg
-
Fuller, B., O’Neill, A., Reyzin, L.: A unified approach to deterministic encryption: New constructions and a connection to computational entropy. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 582–599. Springer, Heidelberg (2012)
-
(2012)
TCC 2012. LNCS
, vol.7194
, pp. 582-599
-
-
Fuller, B.1
O’neill, A.2
Reyzin, L.3
-
31
-
-
84893494300
-
Candidate indistinguishability obfuscation and functional encryption for all circuits
-
IEEE Computer Society Press (October
-
Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B.: Candidate indistinguishability obfuscation and functional encryption for all circuits. In: 54th FOCS, pp. 40–49. IEEE Computer Society Press (October 2013)
-
(2013)
54th FOCS
, pp. 40-49
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
Raykova, M.4
Sahai, A.5
Waters, B.6
-
32
-
-
84905378383
-
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
-
In: Garay, J.A., Gennaro, R. (eds.), Springer, Heidelberg
-
Garg, S., Gentry, C., Halevi, S., Wichs, D.: On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. LNCS, vol. 8616, pp. 518–535. Springer, Heidelberg (2014)
-
(2014)
CRYPTO 2014, Part I. LNCS
, vol.8616
, pp. 518-535
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
Wichs, D.4
-
33
-
-
17444407353
-
An improved pseudo-random generator based on the discrete logarithm problem
-
Gennaro, R.: An improved pseudo-random generator based on the discrete logarithm problem. Journal of Cryptology 18(2), 91–110 (2005)
-
(2005)
Journal of Cryptology
, vol.18
, Issue.2
, pp. 91-110
-
-
Gennaro, R.1
-
34
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. Journal of the ACM 33, 792–807 (1986)
-
(1986)
Journal of the ACM
, vol.33
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
35
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
ACM Press (May
-
Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: 21st ACM STOC, pp. 25–32. ACM Press (May 1989)
-
(1989)
21st ACM STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
36
-
-
17444362761
-
On the security of modular exponentiation with application to the construction of pseudorandom generators
-
Goldreich, O., Rosen, V.: On the security of modular exponentiation with application to the construction of pseudorandom generators. Journal of Cryptology 16(2), 71–93 (2003)
-
(2003)
Journal of Cryptology
, vol.16
, Issue.2
, pp. 71-93
-
-
Goldreich, O.1
Rosen, V.2
-
38
-
-
79953218346
-
Correlated-input secure hash functions
-
In: Ishai, Y. (ed.), Springer, Heidelberg
-
Goyal, V., O’Neill, A., Rao, V.: Correlated-input secure hash functions. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 182–200. Springer, Heidelberg (2011)
-
(2011)
TCC 2011. LNCS
, vol.6597
, pp. 182-200
-
-
Goyal, V.1
O’neill, A.2
Rao, V.3
-
39
-
-
0032305852
-
The security of individual RSA bits
-
IEEE Computer Society Press (November
-
Hastad, J., Naslund, M.: The security of individual RSA bits. In: 39th FOCS, pp. 510–521. IEEE Computer Society Press (November 1998)
-
(1998)
39th FOCS
, pp. 510-521
-
-
Hastad, J.1
Naslund, M.2
-
40
-
-
0344056457
-
The discrete logarithm modulo a composite hides O(n) bits
-
Hastad, J., Schrift, A., Shamir, A.: The discrete logarithm modulo a composite hides O(n) bits. Journal of Computer and System Sciences 47(3), 376–404 (1993)
-
(1993)
Journal of Computer and System Sciences
, vol.47
, Issue.3
, pp. 376-404
-
-
Hastad, J.1
Schrift, A.2
Shamir, A.3
-
41
-
-
84901669583
-
Replacing a random oracle: Full domain hash from indistinguishability obfuscation
-
In: Nguyen, P.Q., Oswald, E. (eds.), Springer, Heidelberg
-
Hohenberger, S., Sahai, A., Waters, B.: Replacing a random oracle: Full domain hash from indistinguishability obfuscation. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 201–220. Springer, Heidelberg (2014)
-
(2014)
EUROCRYPT 2014. LNCS
, vol.8441
, pp. 201-220
-
-
Hohenberger, S.1
Sahai, A.2
Waters, B.3
-
42
-
-
85034862443
-
A pseudo-random bit generator based on elliptic logarithms
-
In: Odlyzko, A.M. (ed.), Springer, Heidelberg
-
Kaliski Jr., B.S.: A pseudo-random bit generator based on elliptic logarithms. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 84–103. Springer, Heidelberg (1987)
-
(1987)
CRYPTO 1986. LNCS
, vol.263
, pp. 84-103
-
-
Kaliski, B.S.1
-
43
-
-
84889072826
-
Delegatable pseudorandom functions and applications
-
Sadeghi, A.-R., Gligor, V.D., Yung, M. (eds.), ACM Press (November
-
Kiayias, A., Papadopoulos, S., Triandopoulos, N., Zacharias, T.: Delegatable pseudorandom functions and applications. In: Sadeghi, A.-R., Gligor, V.D., Yung, M. (eds.) ACM CCS 2013, pp. 669–684. ACM Press (November 2013)
-
(2013)
ACM CCS 2013
, pp. 669-684
-
-
Kiayias, A.1
Papadopoulos, S.2
Triandopoulos, N.3
Zacharias, T.4
-
44
-
-
77957001343
-
Instantiability of RSA-OAEP under chosenplaintext attack
-
In: Rabin, T. (ed.), Springer, Heidelberg
-
Kiltz, E., O’Neill, A., Smith, A.: Instantiability of RSA-OAEP under chosenplaintext attack. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 295–313. Springer, Heidelberg (2010)
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 295-313
-
-
Kiltz, E.1
O’neill, A.2
Smith, A.3
-
45
-
-
84883330159
-
Regularity of lossy RSA on subdomains and its applications
-
In: Johansson, T., Nguyen, P.Q. (eds.), Springer, Heidelberg
-
Lewko, M., O’Neill, A., Smith, A.: Regularity of lossy RSA on subdomains and its applications. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 55–75. Springer, Heidelberg (2013)
-
(2013)
EUROCRYPT 2013. LNCS
, vol.7881
, pp. 55-75
-
-
Lewko, M.1
O’neill, A.2
Smith, A.3
-
46
-
-
0023985034
-
The discrete logarithm hides O(log n) bits
-
Long, D.L., Wigderson, A.: The discrete logarithm hides O(log n) bits. SIAM Journal on Computing 17(2), 363–372 (1988)
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 363-372
-
-
Long, D.L.1
Wigderson, A.2
-
47
-
-
24144444653
-
Hard bits of the discrete log with applications to password authentication
-
In: Menezes, A. (ed.), Springer, Heidelberg
-
MacKenzie, P.D., Patel, S.: Hard bits of the discrete log with applications to password authentication. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 209–226. Springer, Heidelberg (2005)
-
(2005)
CT-RSA 2005. LNCS
, vol.3376
, pp. 209-226
-
-
Mackenzie, P.D.1
Patel, S.2
-
48
-
-
0345701848
-
All bits in ax + b mod p are hard
-
N¨aslund, M., In: Koblitz, N. (ed.), Springer, Heidelberg
-
N¨aslund, M.: All bits in ax + b mod p are hard. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 114–128. Springer, Heidelberg (1996)
-
(1996)
CRYPTO 1996. LNCS
, vol.1109
, pp. 114-128
-
-
-
49
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
In: Stern, J. (ed.), Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
50
-
-
84957638120
-
An efficient discrete log pseudo random generator
-
In: Krawczyk, H. (ed.), Springer, Heidelberg
-
Patel, S., Sundaram, G.S.: An efficient discrete log pseudo random generator. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 304–317. Springer, Heidelberg (1998)
-
(1998)
CRYPTO 1998. LNCS
, vol.1462
, pp. 304-317
-
-
Patel, S.1
Sundaram, G.S.2
-
51
-
-
51849152661
-
Lossy trapdoor functions and their applications
-
Ladner, R.E., Dwork, C. (eds.), ACM Press (May
-
Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: Ladner, R.E., Dwork, C. (eds.) 40th ACM STOC, pp. 187–196. ACM Press (May 2008)
-
(2008)
40th ACM STOC
, pp. 187-196
-
-
Peikert, C.1
Waters, B.2
-
52
-
-
0017930809
-
A method for obtaining digital signature and public-key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signature and public-key cryptosystems. Communications of the Association for Computing Machinery 21(2), 120–126 (1978)
-
(1978)
Communications of the Association for Computing Machinery
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
53
-
-
84904361647
-
How to use indistinguishability obfuscation: Deniable encryption, and more
-
Shmoys, D.B. (ed.), ACM Press (May/June
-
Sahai, A., Waters, B.: How to use indistinguishability obfuscation: Deniable encryption, and more. In: Shmoys, D.B. (ed.) 46th ACM STOC, pp. 475–484. ACM Press (May/June 2014)
-
(2014)
46th ACM STOC
, pp. 475-484
-
-
Sahai, A.1
Waters, B.2
-
54
-
-
84916207209
-
RSA-bits are 0.5 + _ secure
-
In: Beth, T., Cot, N., Ingemarsson, I. (eds.), Springer, Heidelberg
-
Alexi, W., Schnorr, C.-P.: RSA-bits are 0.5 + _ secure. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 113–126. Springer, Heidelberg (1985)
-
(1985)
EUROCRYPT 1984. LNCS
, vol.209
, pp. 113-126
-
-
Alexi, W.1
Schnorr, C.-P.2
-
55
-
-
56749098583
-
On the provable security of an efficient RSAbased pseudorandom generator
-
In: Lai, X., Chen, K. (eds.), Springer, Heidelberg
-
Steinfeld, R., Pieprzyk, J., Wang, H.: On the provable security of an efficient RSAbased pseudorandom generator. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 194–209. Springer, Heidelberg (2006)
-
(2006)
ASIACRYPT 2006. LNCS
, vol.4284
, pp. 194-209
-
-
Steinfeld, R.1
Pieprzyk, J.2
Wang, H.3
-
56
-
-
85034622087
-
Efficient and secure pseudo-random number generation
-
In: Blakely, G.R., Chaum, D. (eds.), Springer, Heidelberg
-
Vazirani, U.V., Vazirani, V.V.: Efficient and secure pseudo-random number generation. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 193–202. Springer, Heidelberg (1985)
-
(1985)
CRYPTO 1984. LNCS
, vol.196
, pp. 193-202
-
-
Vazirani, U.V.1
Vazirani, V.V.2
-
57
-
-
84873398049
-
Barriers in cryptography with weak, correlated and leaky sources
-
Kleinberg, R.D. (ed.), ACM (January
-
Wichs, D.: Barriers in cryptography with weak, correlated and leaky sources. In: Kleinberg, R.D. (ed.) ITCS 2013, pp. 111–126. ACM (January 2013)
-
(2013)
ITCS 2013
, pp. 111-126
-
-
Wichs, D.1
-
58
-
-
0020301290
-
Theory and applications of trapdoor functions (extended abstract)
-
IEEE Computer Society Press (November
-
Yao, A.C.-C.: Theory and applications of trapdoor functions (extended abstract). In: 23rd FOCS, pp. 80–91. IEEE Computer Society Press (November 1982)
-
(1982)
23rd FOCS
, pp. 80-91
-
-
Yao, A.C.-C.1
|