Hardness Preserving Constructions of Pseudorandom Functions
暂无分享,去创建一个
[1] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .
[2] Dan Boneh,et al. Algebraic pseudorandom functions with improved efficiency from the augmented cascade , 2010, CCS '10.
[3] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[4] Moni Naor,et al. Pseudorandom Functions and Factoring , 2002, SIAM J. Comput..
[5] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[6] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[7] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[8] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[9] Mihir Bellare,et al. New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs , 1989, CRYPTO.
[10] Andrew Odlyzko,et al. Advances in Cryptology — CRYPTO’ 86 , 2000, Lecture Notes in Computer Science.
[11] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[12] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[13] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[14] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[15] Allison Bishop,et al. Efficient pseudorandom functions from the decisional linear assumption and weaker variants , 2009, CCS.
[16] Moni Naor,et al. Pseudo-random functions and factoring (extended abstract) , 2000, STOC '00.
[17] Ueli Maurer,et al. Indistinguishability of Random Systems , 2002, EUROCRYPT.
[18] Oded Goldreich,et al. Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme , 1986, CRYPTO.
[19] Carl Pomerance,et al. Advances in Cryptology — CRYPTO ’87 , 2000, Lecture Notes in Computer Science.
[20] Abhishek Banerjee,et al. Pseudorandom Functions and Lattices , 2012, EUROCRYPT.
[21] Silvio Micali,et al. On the Cryptographic Applications of Random Functions , 1984, CRYPTO.
[22] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.
[23] Michael Luby,et al. A study of password security , 1987, Journal of Cryptology.
[24] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[25] Mihir Bellare,et al. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs , 2006, EUROCRYPT.
[26] Moni Naor,et al. Synthesizers and Their Application to the Parallel Construction of Pseudo-Random Functions , 1999, J. Comput. Syst. Sci..
[27] Michael Luby,et al. Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.
[28] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[29] Leonid A. Levin,et al. One-way functions and pseudorandom generators , 1985, STOC '85.
[30] Serge Vaudenay,et al. Advances in Cryptology - EUROCRYPT 2006 , 2006, Lecture Notes in Computer Science.