Pseudorandom generators with long stretch and low locality from random local one-way functions
暂无分享,去创建一个
[1] Benny Applebaum,et al. A Dichotomy for Local Small-Bias Generators , 2012, TCC.
[2] Seyed Omid Etesami. Pseudorandomness against Depth-2 Circuits and Analysis of Goldreich's Candidate One-Way Function , 2010 .
[3] Yuval Ishai,et al. Cryptography with Constant Input Locality , 2007, Journal of Cryptology.
[4] Benny Applebaum,et al. Cryptography in Constant Parallel Time , 2013, Information Security and Cryptography.
[5] Bert den Boer. Diffie-Hellman is as Strong as Discrete Log for Certain Primes , 1988, CRYPTO.
[6] Rafail Ostrovsky,et al. Cryptography with constant computational overhead , 2008, STOC.
[7] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[8] Dmitry Itsykson. Lower Bound on Average-Case Complexity of Inversion of Goldreich's Function by Drunken Backtracking Algorithms , 2010, CSR.
[9] Amir Herzberg,et al. Pubic Randomness in Cryptography , 1992, CRYPTO.
[10] Kumar Panjwani. An Experimental Evaluation of Goldreich ' s One-Way FunctionSaurabh , 2001 .
[11] Uriel Feige,et al. The Dense k -Subgraph Problem , 2001, Algorithmica.
[12] Michael Alekhnovich,et al. Exponential Lower Bounds for the Running Time of DPLL Algorithms on Satisfiable Formulas , 2004, SODA '04.
[13] B. Applebaum. Cryptography in NC0 , 2014 .
[14] Noam Nisan,et al. Hardness vs Randomness , 1994, J. Comput. Syst. Sci..
[15] Moti Yung,et al. Space lower-bounds for pseudorandom-generators , 1994, Proceedings of IEEE 9th Annual Conference on Structure in Complexity Theory.
[16] Alon Rosen,et al. Input Locality and Hardness Amplification , 2011, Journal of Cryptology.
[17] Peter Bro Miltersen,et al. On Pseudorandom Generators in NC , 2001, MFCS.
[18] Noam Nisan,et al. Constant depth circuits, Fourier transform, and learnability , 1989, 30th Annual Symposium on Foundations of Computer Science.
[19] Luca Trevisan,et al. Pseudorandom generators without the XOR lemma , 1999, Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317).
[20] Luca Trevisan,et al. On e-Biased Generators in NC0 , 2003, FOCS.
[21] Aditya Bhaskara,et al. Detecting high log-densities: an O(n¼) approximation for densest k-subgraph , 2010, STOC '10.
[22] Moni Naor,et al. Efficient cryptographic schemes provably as secure as subset sum , 2004, Journal of Cryptology.
[23] Emanuele Viola,et al. On constructing parallel pseudorandom generators from one-way functions , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).
[24] Amir Shpilka,et al. On ε-Biased Generators in NC , 2003 .
[25] A Omitted Proofs , .
[26] Stefan Lucks,et al. On the Minimal Hardware Complexity of Pseudorandom Function Generators , 2001, STACS.
[27] Benny Applebaum. Pseudorandom Generators with Long Stretch and Low Locality from Random Local One-Way Functions , 2013, SIAM J. Comput..
[28] Michael Alekhnovich. More on Average Case vs Approximation Complexity , 2011, computational complexity.
[29] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[30] Yuval Ishai,et al. On Pseudorandom Generators with Linear Stretch in NC0 , 2006, computational complexity.
[31] Sanjeev Arora,et al. Computational complexity and information asymmetry in financial products , 2011, Commun. ACM.
[32] Yuval Ishai,et al. Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature? , 2010, ICS.
[33] Johan Håstad. One-Way Permutations in NC0 , 1987, Inf. Process. Lett..
[34] Luca Trevisan,et al. Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms , 2009, TCC.
[35] Dimitris Achlioptas,et al. Random Satisfiability , 2009, Handbook of Satisfiability.
[36] Moni Naor,et al. Small-bias probability spaces: efficient constructions and applications , 1990, STOC '90.
[37] Uriel Feige,et al. Resolution lower bounds for the weak pigeon hole principle , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.
[38] Abraham D. Flaxman. Random Planted 3-SAT , 2008, Encyclopedia of Algorithms.
[39] Noam Nisan,et al. On Yao's XOR-Lemma , 1995, Electron. Colloquium Comput. Complex..
[40] Youming Qiao,et al. On the security of Goldreich’s one-way function , 2011, computational complexity.
[41] Yuval Ishai,et al. Cryptography in NC0 , 2004, SIAM J. Comput..
[42] Rachel Miller,et al. Goldreich ’ s One-Way Function Candidate and Drunken Backtracking Algorithms , 2010 .
[43] Ueli Maurer,et al. The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms , 1999, SIAM J. Comput..
[44] Amin Coja-Oghlan,et al. Random Constraint Satisfaction Problems , 2009, DCM.
[45] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[46] Oded Goldreich,et al. Candidate One-Way Functions Based on Expander Graphs , 2011, Studies in Complexity and Cryptography.
[47] Peter Bro Miltersen,et al. On pseudorandom generators in NC 0 ⋆ , 2001 .
[48] ApplebaumBenny,et al. Cryptography in $NC^0$ , 2006 .
[49] Nathan Linial,et al. The influence of variables on Boolean functions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[50] Avi Wigderson,et al. Public-key cryptography from different assumptions , 2010, STOC '10.
[51] Oded Goldreich,et al. On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators , 2003, Journal of Cryptology.
[52] Leonid A. Levin,et al. One-way functions and pseudorandom generators , 1985, STOC '85.
[53] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[54] Leonid Reyzin,et al. An Improved Pseudorandom Generator Based on Hardness of Factoring , 2002, IACR Cryptol. ePrint Arch..
[55] Elchanan Mossel,et al. On ε‐biased generators in NC0 , 2006, Random Struct. Algorithms.
[56] Yuval Ishai,et al. COMPUTATIONALLY PRIVATE RANDOMIZING POLYNOMIALS AND THEIR APPLICATIONS , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).
[57] Toby Walsh,et al. Handbook of satisfiability , 2009 .
[58] Subhash Khot. Ruling Out PTAS for Graph Min-Bisection, Densest Subgraph and Bipartite Clique , 2004, FOCS.
[59] Cesare Tinelli,et al. Handbook of Satisfiability , 2021, Handbook of Satisfiability.
[60] Omer Reingold,et al. Efficiency improvements in constructing pseudorandom generators from one-way functions , 2010, STOC '10.
[61] Hugo Krawczyk,et al. On the Existence of Pseudorandom Generators , 1988, CRYPTO.