Range Extension for Weak PRFs; The Good, the Bad, and the Ugly
暂无分享,去创建一个
[1] Ueli Maurer,et al. Indistinguishability Amplification , 2007, CRYPTO.
[2] Johan Sjödin,et al. Weak Pseudorandom Functions in Minicrypt , 2008, ICALP.
[3] Mihir Bellare,et al. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs , 2006, EUROCRYPT.
[4] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.
[5] Ivan Damgård,et al. Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security , 2002, CRYPTO.
[6] Michael Luby,et al. Pseudo-random permutation generators and cryptographic composition , 1986, STOC '86.
[7] Ueli Maurer,et al. Indistinguishability of Random Systems , 2002, EUROCRYPT.
[8] Kazuhiko Minematsu,et al. Expanding Weak PRF with Small Key Size , 2005, ICISC.
[9] Ueli Maurer,et al. Composition of Random Systems: When Two Weak Make One Strong , 2004, TCC.
[10] Serge Vaudenay,et al. Advances in Cryptology - EUROCRYPT 2006 , 2006, Lecture Notes in Computer Science.
[11] Ueli Maurer,et al. A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security , 2007, EUROCRYPT.
[12] Seungjoo Kim,et al. Information Security and Cryptology - ICISC 2005 , 2005, Lecture Notes in Computer Science.
[13] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[14] Russell Impagliazzo,et al. Limits on the Provable Consequences of One-way Permutations , 1988, CRYPTO.
[15] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[16] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[17] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[18] Moni Naor,et al. From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract) , 1998, CRYPTO.