<--- Back to Details
First PageDocument Content
Pseudorandomness / Feistel cipher / ICE / Block cipher / Pseudorandom function family / Commitment scheme / Advantage / Exclusive or / Optimal asymmetric encryption padding / Cryptography / Permutations / Unpredictable permutation
Date: 2006-11-27 11:45:50
Pseudorandomness
Feistel cipher
ICE
Block cipher
Pseudorandom function family
Commitment scheme
Advantage
Exclusive or
Optimal asymmetric encryption padding
Cryptography
Permutations
Unpredictable permutation

Add to Reading List

Source URL: cs.nyu.edu

Download Document from Source Website

File Size: 264,36 KB

Share Document on Facebook

Similar Documents

Lecture Notes on Pseudorandomness { Part I Oded Goldreich Department of Computer Science Weizmann Institute of Science Rehovot, Israel. email:

DocID: 1v2G7 - View Document

Pseudorandomness for Network Algorithms Russell Impagliazzo ∗ Noam Nisan

DocID: 1unPp - View Document

Contents Pseudorandomness { Part II Introduction Lecture 1. Deterministic Simulation of Randomized Algorithms 1. Probabilistic Algorithms versus Deterministic Algorithms 2. De-randomization Under Complexity Assumptions

DocID: 1ukkf - View Document

Pseudorandomness Oded Goldreich Department of Computer Science and Applied Mathematics Weizmann Institute of Science, Rehovot, Israel. March 27, 2000

DocID: 1udL1 - View Document

Pseudorandomness  Thursday, September 21, :11 PM 2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824

DocID: 1tDzT - View Document