메뉴 건너뛰기




Volumn 2332, Issue , 2002, Pages 133-148

How to fool an unbounded adversary with a short key

Author keywords

[No Author keywords available]

Indexed keywords

BOOLEAN FUNCTIONS; SECURITY OF DATA;

EID: 84947270656     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46035-7_9     Document Type: Conference Paper
Times cited : (39)

References (25)
  • 1
    • 0025535378 scopus 로고
    • Simple constructions of almost k-wise independent random variables
    • St. Louis, Missouri, 22–24 October, IEEE
    • Noga Alon, Oded Goldreich, Johan Hastad, and Rene Peralta. Simple constructions of almost k-wise independent random variables. In 31st Annual Symposium on Foundations of Computer Science, volume II, pages 544–553, St. Louis, Missouri, 22–24 October 1990. IEEE.
    • (1990) 31St Annual Symposium on Foundations of Computer Science , vol.2 , pp. 544-553
    • Alon, N.1    Goldreich, O.2    Hastad, J.3    Peralta, R.4
  • 3
    • 0003466442 scopus 로고    scopus 로고
    • MIT Press, Cambridge, MA, Efficient algorithms
    • Eric Bach and Jeffrey Shallit. Algorithmic number theory. Vol. 1. MIT Press, Cambridge, MA, 1996. Efficient algorithms.
    • (1996) Algorithmic Number Theory , vol.1
    • Bach, E.1    Shallit, J.2
  • 6
    • 84949995981 scopus 로고
    • An efficient probabilistic public-key encryption scheme which hides all partial information
    • G. R. Blakley and David Chaum, editors, Springer-Verlag, 1985, 19–22August
    • Manuel Blum and Shafi Goldwasser. An efficient probabilistic public-key encryption scheme which hides all partial information. In G. R. Blakley and David Chaum, editors, Advances in Cryptology: Proceedings of CRYPTO 84, volume 196 of Lecture Notes in Computer Science, pages 289–299. Springer-Verlag, 1985, 19–22 August 1984.
    • (1984) Advances in Cryptology: Proceedings of CRYPTO 84, Volume 196 of Lecture Notes in Computer Science , pp. 289-299
    • Blum, M.1    Goldwasser, S.2
  • 7
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • November
    • Manuel Blum and Silvio Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850–864, November 1984.
    • (1984) SIAM Journal on Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 10
    • 0027306732 scopus 로고
    • A uniform-complexity treatment of encryption and zeroknowledge
    • Oded Goldreich. A uniform-complexity treatment of encryption and zeroknowledge. Journal of Cryptology, 6(1):21–53, 1993.
    • (1993) Journal of Cryptology , vol.6 , Issue.1 , pp. 21-53
    • Goldreich, O.1
  • 12
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • April1
    • Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281–308, April1 988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 15
    • 0026698501 scopus 로고
    • Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher
    • Ueli M. Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53–66, 1992.
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Ueli, M.1
  • 16
    • 0027641832 scopus 로고
    • Small-bias probability spaces: Efficient constructions and applications
    • Joseph Naor and Moni Naor. Small-bias probability spaces: Efficient constructions and applications. SIAM Journal on Computing, 22(4):838–856, August 1993.
    • (1993) SIAM Journal on Computing , vol.22 , Issue.4 , pp. 838-856
    • Naor, J.1    Naor, M.2
  • 17
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • Baltimore, Maryland, 14–16 May
    • Moni Naor and Moti Yung. Public-key cryptosystems provably secure against chosen ciphertext attacks. In Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing, pages 427–437, Baltimore, Maryland, 14–16 May 1990.
    • (1990) Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 18
    • 84968503946 scopus 로고
    • On the distribution of quadratic residues and nonresidues modulo a prime number
    • Rene Peralta. On the distribution of quadratic residues and nonresidues modulo a prime number. Mathematics of Computation, 58(197):433–440, 1992.
    • (1992) Mathematics of Computation , vol.58 , Issue.197 , pp. 433-440
    • Peralta, R.1
  • 19
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • J. Feigenbaum, editor, Springer-Verlag, 1992, 11–15 August
    • Charles Rackoff and Daniel R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In J. Feigenbaum, editor, Advances in Cryptology – CRYPTO ’91, volume 576 of Lecture Notes in Computer Science, pages 433–444. Springer-Verlag, 1992, 11–15 August 1991.
    • (1991) Advances in Cryptology – CRYPTO ’91, Volume 576 of Lecture Notes in Computer Science , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 21
    • 0015197550 scopus 로고
    • Schnelle berechnung von kettenbruchentwicklungen
    • A. Schonhage. Schnelle berechnung von kettenbruchentwicklungen. Acta Informatica, 1:139–144, 1971.
    • (1971) Acta Informatica , vol.1 , pp. 139-144
    • Schonhage, A.1
  • 22
    • 0000256895 scopus 로고
    • Schnelle Multiplikation von Polynomen uber Korpern der Charakteristik 2
    • 77
    • A. Schonhage. Schnelle Multiplikation von Polynomen uber Korpern der Charakteristik 2. Acta Informat., 7(4):395–398, 1976/77.
    • (1976) Acta Informat , vol.7 , Issue.4 , pp. 395-398
    • Schonhage, A.1
  • 23
    • 34250459760 scopus 로고
    • Schnelle multiplikation großer zahlen
    • A. Schonhage and V. Strassen. Schnelle multiplikation großer zahlen. Computing, 7:281–292, 1971.
    • (1971) Computing , vol.7 , pp. 281-292
    • Schonhage, A.1    Strassen, V.2
  • 25
    • 0004024422 scopus 로고
    • The Clarendon Press Oxford University Press, New York
    • Dominic Welsh. Codes and cryptography. The Clarendon Press Oxford University Press, New York, 1988.
    • (1988) Codes and Cryptography
    • Welsh, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.