Pseudorandom function family

Results: 36



#Item
11On the Correlation Intractability of Obfuscated Pseudorandom Functions Ran Canetti∗ Yilei Chen†

On the Correlation Intractability of Obfuscated Pseudorandom Functions Ran Canetti∗ Yilei Chen†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 00:12:34
12Curriculum Vitae Silvio Micali Ford Professor of Engineering Electrical Engineering and Computer Science Department Stata Center, Room G644, 32 Vassar Street, Cambridge, MA5949

Curriculum Vitae Silvio Micali Ford Professor of Engineering Electrical Engineering and Computer Science Department Stata Center, Room G644, 32 Vassar Street, Cambridge, MA5949

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2015-04-22 20:29:48
13The Random Oracle Methodology, Revisited∗ Ran Canetti† Oded Goldreich‡  Shai Halevi§

The Random Oracle Methodology, Revisited∗ Ran Canetti† Oded Goldreich‡ Shai Halevi§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-08-01 15:32:21
14Chapter 3 Pseudorandom Functions Pseudorandom functions (PRFs) and their cousins, pseudorandom permutations (PRPs), figure as central tools in the design of protocols, especially those for shared-key cryptography. At one

Chapter 3 Pseudorandom Functions Pseudorandom functions (PRFs) and their cousins, pseudorandom permutations (PRPs), figure as central tools in the design of protocols, especially those for shared-key cryptography. At one

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:41:44
15An abridged version of this paper appears in Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE, 1996. Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security Mihir Be

An abridged version of this paper appears in Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE, 1996. Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security Mihir Be

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-10-31 17:44:37
16A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-02-28 15:02:35
17Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations? Dario Fiore1 and Dominique Schr¨oder2 1

Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations? Dario Fiore1 and Dominique Schr¨oder2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-09-15 13:18:51
18Hardness Preserving Reductions via Cuckoo Hashing Itay Berman∗ Iftach Haitner∗  Ilan Komargodski†

Hardness Preserving Reductions via Cuckoo Hashing Itay Berman∗ Iftach Haitner∗ Ilan Komargodski†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-24 16:10:17
19Appears in , Vol. 61, No. 3, Dec 2000, pp. 362{399. Preliminary version was in 94 , Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.

Appears in , Vol. 61, No. 3, Dec 2000, pp. 362{399. Preliminary version was in 94 , Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2001-09-12 12:24:34
20On the (Im)possibility of Obfuscating Programs∗ Boaz Barak† Oded Goldreich‡ Amit Sahaik

On the (Im)possibility of Obfuscating Programs∗ Boaz Barak† Oded Goldreich‡ Amit Sahaik

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2010-07-29 14:23:20