Hard-core predicate

Results: 13



#Item
1Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedi´c∗ ‡ § Danny Harnik† §

Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedi´c∗ ‡ § Danny Harnik† §

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-10 11:39:44
2An Improved Pseudorandom Generator Based on Hardness of Factoring Nenad Dedi´c Boston University

An Improved Pseudorandom Generator Based on Hardness of Factoring Nenad Dedi´c Boston University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-08-27 12:28:51
3Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations? Dario Fiore1 and Dominique Schr¨oder2 1

Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations? Dario Fiore1 and Dominique Schr¨oder2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-09-15 13:18:51
4BMGL: Synchronous Key-stream Generator with Provable Security (Revision 1) Johan H˚ astad∗ NADA, Royal Inst. of Technology SE[removed]Stockholm, Sweden

BMGL: Synchronous Key-stream Generator with Provable Security (Revision 1) Johan H˚ astad∗ NADA, Royal Inst. of Technology SE[removed]Stockholm, Sweden

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2001-03-16 15:30:07
5Nearly One-Sided Tests and the Goldreich-Levin Predicate Gustav Hast Department of Numerical Analysis and Computer Science Royal Institute of Technology, [removed]Stockholm, Sweden [removed]

Nearly One-Sided Tests and the Goldreich-Levin Predicate Gustav Hast Department of Numerical Analysis and Computer Science Royal Institute of Technology, [removed]Stockholm, Sweden [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:52
6Bits Security of the CDH Problems over Finite Fields Mingqiang Wang1 , Tao Zhan1 , and Haibin Zhang2 1 School of Mathematics, Shandong University [removed],[removed]

Bits Security of the CDH Problems over Finite Fields Mingqiang Wang1 , Tao Zhan1 , and Haibin Zhang2 1 School of Mathematics, Shandong University [removed],[removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-02 01:27:01
7First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:35:35
8Simultaneous Hardcore Bits and Cryptography Against Memory Attacks Adi Akavia1? , Shafi Goldwasser2?? , and Vinod Vaikuntanathan3? ? ? 1  2

Simultaneous Hardcore Bits and Cryptography Against Memory Attacks Adi Akavia1? , Shafi Goldwasser2?? , and Vinod Vaikuntanathan3? ? ? 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:05:49
9ICM 2002 • Vol. I • 245^272  Mathematical Foundations of

ICM 2002 • Vol. I • 245^272 Mathematical Foundations of

Add to Reading List

Source URL: www.mathunion.org

Language: English - Date: 2012-04-18 10:56:38
10

PDF Document

Add to Reading List

Source URL: www.csc.kth.se

Language: English