Construction of a pseudo-random generator from any one-way function
暂无分享,去创建一个
[1] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[4] J. Boyar. Inferring a Sequence Generated by a Linear Congruence , 1982, FOCS.
[5] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[6] Stephen M. Rudich,et al. Limits on the provable consequences of one-way functions , 1983, STOC 1983.
[7] Michael Sipser,et al. A complexity theoretic approach to randomness , 1983, STOC.
[8] Manuel Blum,et al. Independent unbiased coin flips from a correlated biased source—A finite state markov chain , 1984, Comb..
[9] Miklos Santha,et al. Generating Quasi-Random Sequences from Slightly-Random Sources (Extended Abstract) , 1984, FOCS.
[10] Umesh V. Vazirani. Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly-random sources , 1985, STOC '85.
[11] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[12] Vijay V. Vazirani,et al. Random polynomial time is equal to slightly-random polynomial time , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[13] Leonid A. Levin,et al. One-way functions and pseudorandom generators , 1985, STOC '85.
[14] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[15] Silvio Micali,et al. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[16] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[17] Hugo Krawczyk,et al. On the existence of pseudorandom generators , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[18] Oded Goldreich,et al. RSA and Rabin Functions: Certain Parts are as Hard as the Whole , 1988, SIAM J. Comput..
[19] Oded Goldreich,et al. Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..
[20] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[21] Rafael Hirschfeld,et al. Pseudorandom Generators and Complexity Classes , 1989, Advances in Computational Research.
[22] John Rompel,et al. One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.
[23] Johan Håstad,et al. Pseudo-random generators under uniform assumptions , 1990, STOC '90.