Naor-Reingold Pseudorandom Function

Results: 12



#Item
1Lower Bounds on Black-Box Ring Extraction Tibor Jager and Andy Rupp ,  Horst G¨ ortz Institute for IT Security Ruhr-University Bochum, Germany

Lower Bounds on Black-Box Ring Extraction Tibor Jager and Andy Rupp , Horst G¨ ortz Institute for IT Security Ruhr-University Bochum, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-30 10:17:55
2An Improved Pseudorandom Generator Based on Hardness of Factoring Nenad Dedi´c Boston University

An Improved Pseudorandom Generator Based on Hardness of Factoring Nenad Dedi´c Boston University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-08-27 12:28:51
3CS255: Cryptography and Computer Security  Winter 2002 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-01-05 17:05:04
4CS255: Cryptography and Computer Security  Winter 2002 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-11 14:38:17
5CS255: Cryptography and Computer Security  Winter 2002 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-01-05 20:38:49
6Cryptographic protocols / Diffie–Hellman key exchange / Finite fields / RSA / Euclidean algorithm / Naor-Reingold Pseudorandom Function / Cryptography / Mathematics / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2002-03-21 01:47:16
7CS255: Cryptography and Computer Security  Winter 2002 Final Exam Instructions

CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-01-04 13:22:38
8Kleptography: Using Cryptography Against Cryptography Adam Young* and

Kleptography: Using Cryptography Against Cryptography Adam Young* and

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2013-09-12 07:28:33
9Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants Allison B. Lewko ∗ University of Texas at Austin

Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants Allison B. Lewko ∗ University of Texas at Austin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-16 13:57:22
10CS255: Cryptography and Computer Security  Winter 2002

CS255: Cryptography and Computer Security Winter 2002

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-01-06 01:59:49