메뉴 건너뛰기




Volumn 1294, Issue , 1997, Pages 1-15

The complexity of computing hard core predicates

Author keywords

One way function; Pseudo randomness; Small depth circuit

Indexed keywords

CRYPTOGRAPHY;

EID: 84937413823     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0052224     Document Type: Conference Paper
Times cited : (3)

References (14)
  • 1
    • 0023985196 scopus 로고
    • RSA andRabin Functions: Certain Parts Are as Hardas the Whole
    • W. Alexi, B. Chor, O. Goldreich, and C. P. Schnorr: RSA andRabin Functions: Certain Parts Are as Hardas the Whole. SIAM J. on Computing 17 (1988), no 2, pp. 194-209.
    • (1988) SIAM J. on Computing , vol.17 , Issue.2 , pp. 194-209
    • Alexi, W.1    Chor, B.2    Goldreich, O.3    Schnorr, C.P.4
  • 3
    • 0021522644 scopus 로고
    • How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
    • M. Blum and S. Micali: How to Generate Cryptographically Strong Sequences of Pseudorandom Bits. SIAM J. on Computing 13 (1986), no 4, pp. 850-864.
    • (1986) SIAM J. on Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 8
    • 0001143795 scopus 로고    scopus 로고
    • Effcient Cryptographic Schemes Provably as Secure as Subset Sum
    • R. Impagliazzo and M. Naor: Effcient Cryptographic Schemes Provably as Secure as Subset Sum. J. of Cryptology 9 (1996), no 4, pp. 199-216.
    • (1996) J. of Cryptology , vol.9 , Issue.4 , pp. 199-216
    • Impagliazzo, R.1    Naor, M.2
  • 9
    • 0027627287 scopus 로고
    • Constant Depth Circuits, Fourier Transform, and Learnability
    • N. Linial, Y. Mansour, and N. Nisan: Constant Depth Circuits, Fourier Transform, and Learnability. J. of the ACM 40 (1993), no 3, pp. 607-620.
    • (1993) J. of the ACM , vol.40 , Issue.3 , pp. 607-620
    • Linial, N.1    Mansour, Y.2    Nisan, N.3
  • 10
    • 38149074447 scopus 로고
    • The Computational Complexity of Universal Hashing
    • Y. Mansour, N. Nisan, and P. Tiwari: The Computational Complexity of Universal Hashing. Theoretical Computer Science 107 (1993), pp. 121-133.
    • (1993) Theoretical Computer Science , vol.107 , pp. 121-133
    • Mansour, Y.1    Nisan, N.2    Tiwari, P.3
  • 11
    • 84957368152 scopus 로고
    • Universal Hash Functions & Hard Core Bits
    • Springer Verlag
    • M. Näislund: Universal Hash Functions & Hard Core Bits. Proc. Eurocrypt 1995, LNCS 921, Springer Verlag, pp. 356-366.
    • (1995) Proc. Eurocrypt , vol.921 , pp. 356-366
    • Näislund, M.1
  • 12
    • 84955597936 scopus 로고    scopus 로고
    • All Bits in ax + b mod p are Hard
    • Springer Verlag
    • M. Nälund: All Bits in ax + b mod p are Hard. Proc. Crypto 1996, LNCS 1109, Springer Verlag, pp. 114-128.
    • (1996) Proc. Crypto , vol.1109 , pp. 114-128
    • Nälund, M.1
  • 13
    • 0020301290 scopus 로고
    • Proc. 23rd Symposium on Foundations of Computer Science, IEEE
    • A. C. Yao: Theory and Applications of Trapdoor Functions. Proc. 23rd Symposium on Foundations of Computer Science, IEEE, 1982, pp. 80-91.
    • (1982) Theory and Applications of Trapdoor Functions , pp. 80-91
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.