메뉴 건너뛰기




Volumn 1592, Issue , 1999, Pages 432-445

Pseudorandom function tribe ensembles based on one-way permutations: Improvements and applications

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL;

EID: 84957609649     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48910-X_30     Document Type: Conference Paper
Times cited : (28)

References (23)
  • 3
    • 84958626314 scopus 로고    scopus 로고
    • Towards Realizing Random Oracles: Hash Functions that Hide All Partial Information
    • Springer-Verlag
    • R. Canetti: Towards Realizing Random Oracles: Hash Functions that Hide All Partial Information, Crypto '97, Lecture Notes in Computer Science, Vol. 1294, Springer-Verlag, pp. 455-469, 1997.
    • (1997) Crypto '97, Lecture Notes in Computer Science , vol.1294 , pp. 455-469
    • Canetti, R.1
  • 15
    • 0023984964 scopus 로고
    • How to Construct Pseudorandom Permutations from Pseudorandom Functions
    • M. Luby, C. Rackoff: How to Construct Pseudorandom Permutations from Pseudorandom Functions, SIAM Journal on Computing, Vol. 17, pp. 373-386, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 17
    • 0001448484 scopus 로고
    • Bit Commitment Using Pseudo-Randomness
    • M. Naor: Bit Commitment Using Pseudo-Randomness, Journal of Cryptology, vol. 4, pp. 151-158, 1991.
    • (1991) Journal of Cryptology , vol.4 , pp. 151-158
    • Naor, M.1
  • 20
    • 0003064824 scopus 로고    scopus 로고
    • On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited
    • M. Naor, O. Reingold: On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited, Journal of Cryptology, vol. 12, no. 1, pp. 29-66, 1999.
    • (1999) Journal of Cryptology , vol.12 , Issue.1 , pp. 29-66
    • Naor, M.1    Reingold, O.2
  • 22
    • 84974554584 scopus 로고
    • Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attacks
    • Springer-Verlag
    • C. Rackoff, D. Simon: Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attacks, Crypto '91, Lecture Notes in Computer Science, Vol. 576, Springer-Verlag, pp. 433-444, 1991.
    • (1991) Crypto '91, Lecture Notes in Computer Science , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.