Pseudorandom function family

Results: 36



#Item
1Hoti to Construct Random Functions ODED GOLDREICH, SHAFI AND SILVIO MICALI  GOLDWASSER,

Hoti to Construct Random Functions ODED GOLDREICH, SHAFI AND SILVIO MICALI GOLDWASSER,

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2003-04-15 15:57:50
2An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:23:28
3Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Add to Reading List

Source URL: password-hashing.net

Language: English
4The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-07-24 05:23:52
5The Pythia PRF Service Adam Everspaugh? , Rahul Chatterjee? , Samuel Scott?? , Ari Juels† , and Thomas Ristenpart‡ ? University of Wisconsin–Madison, {ace,rchat}@cs.wisc.edu ?? Royal Holloway, University of London,

The Pythia PRF Service Adam Everspaugh? , Rahul Chatterjee? , Samuel Scott?? , Ari Juels† , and Thomas Ristenpart‡ ? University of Wisconsin–Madison, {ace,rchat}@cs.wisc.edu ?? Royal Holloway, University of London,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-17 14:36:44
6BRICS  Basic Research in Computer Science BRICS RSDamg˚ard & Nielsen: From Known-Plaintext Security to Chosen-Plaintext Security  From Known-Plaintext Security to

BRICS Basic Research in Computer Science BRICS RSDamg˚ard & Nielsen: From Known-Plaintext Security to Chosen-Plaintext Security From Known-Plaintext Security to

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2001-11-06 09:17:54
7Hardness Preserving Reductions via Cuckoo Hashing Itay Berman∗ Iftach Haitner∗  Ilan Komargodski†

Hardness Preserving Reductions via Cuckoo Hashing Itay Berman∗ Iftach Haitner∗ Ilan Komargodski†

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2013-06-11 04:11:57
8Programming Language Techniques for Cryptographic Proofs⋆ Gilles Barthe1 , Benjamin Gr´egoire2, and Santiago Zanella B´eguelin1 1  IMDEA Software, Madrid, Spain, {Gilles.Barthe,Santiago.Zanella}@imdea.org

Programming Language Techniques for Cryptographic Proofs⋆ Gilles Barthe1 , Benjamin Gr´egoire2, and Santiago Zanella B´eguelin1 1 IMDEA Software, Madrid, Spain, {Gilles.Barthe,Santiago.Zanella}@imdea.org

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
9Programming Language Techniques for Cryptographic Proofs⋆ Gilles Barthe1 , Benjamin Gr´egoire2, and Santiago Zanella B´eguelin1 1  IMDEA Software, Madrid, Spain, {Gilles.Barthe,Santiago.Zanella}@imdea.org

Programming Language Techniques for Cryptographic Proofs⋆ Gilles Barthe1 , Benjamin Gr´egoire2, and Santiago Zanella B´eguelin1 1 IMDEA Software, Madrid, Spain, {Gilles.Barthe,Santiago.Zanella}@imdea.org

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
10Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 07:03:25