Proving hard-core predicates using list decoding
暂无分享,去创建一个
[1] Vijay V. Vazirani,et al. Efficient and Secure Pseudo-Random Number Generation , 1984, CRYPTO.
[2] Oded Goldreich,et al. RSA and Rabin Functions: Certain Parts are as Hard as the Whole , 1988, SIAM J. Comput..
[3] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[4] Eyal Kushilevitz,et al. Learning decision trees using the Fourier spectrum , 1991, STOC '91.
[5] Mats Näslund,et al. All Bits ax+b mod p are Hard (Extended Abstract) , 1996, CRYPTO.
[6] Silvio Micali,et al. Why and how to establish a private code on a public network , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[7] Adi Shamir,et al. On the cryptographic security of single RSA bits , 1983, STOC '83.
[8] Claus-Peter Schnorr,et al. Stronger Security Proofs for RSA and Rabin Bits , 1997, EUROCRYPT.
[9] Avi Wigderson,et al. The Discrete Logarithm Hides O(log n) Bits , 1988, SIAM J. Comput..
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] Burton S. Kaliski,et al. A Pseudo-Random Bit Generator Based on Elliptic Logarithms , 1986, CRYPTO.
[12] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[13] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[14] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[15] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[16] Alexander Russell,et al. Spectral Bounds on General Hard Core Predicates , 2000, STACS.
[17] Manuel Blum,et al. A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..
[18] Madhu Sudan. List decoding: algorithms and applications , 2000, SIGA.
[19] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[20] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[21] Yishay Mansour,et al. Randomized Interpolation and Approximation of Sparse Polynomials , 1992, SIAM J. Comput..
[22] Johan Håstad,et al. The security of individual RSA bits , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).