Pseudorandom generator theorem

Results: 28



#Item
1Microsoft Word - Psalm 22.doc

Microsoft Word - Psalm 22.doc

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
2On the Role of Definitions in and Beyond Cryptography Phillip Rogaway Dept. of Computer Science, University of California, Davis, California 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai Universi

On the Role of Definitions in and Beyond Cryptography Phillip Rogaway Dept. of Computer Science, University of California, Davis, California 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai Universi

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2005-06-19 20:47:33
3Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedi´c∗ ‡ § Danny Harnik† §

Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedi´c∗ ‡ § Danny Harnik† §

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-10 11:39:44
4CHENNAI MATHEMATICAL INSTITUTE M.Sc. / Ph.D. Programme in Computer Science Entrance Examination, 25 May 2012 This question paper has 5 printed sides. Part A has 10 questions of 3 marks each. Part B has 7 questions of 10

CHENNAI MATHEMATICAL INSTITUTE M.Sc. / Ph.D. Programme in Computer Science Entrance Examination, 25 May 2012 This question paper has 5 printed sides. Part A has 10 questions of 3 marks each. Part B has 7 questions of 10

Add to Reading List

Source URL: www.cmi.ac.in

Language: English - Date: 2013-02-28 10:49:50
5Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting Sandra Guasch Paz Morillo

Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting Sandra Guasch Paz Morillo

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-30 09:35:02
6Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations? Dario Fiore1 and Dominique Schr¨oder2 1

Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations? Dario Fiore1 and Dominique Schr¨oder2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-09-15 13:18:51
73 Countermeasures Against Information Leakage 3-1 Subgroup Membership Problem and Its Applications to Information Security YAMAMURA Akihiro and SAITO Taiichi The widely used algorithmic problems, the quadratic residue pr

3 Countermeasures Against Information Leakage 3-1 Subgroup Membership Problem and Its Applications to Information Security YAMAMURA Akihiro and SAITO Taiichi The widely used algorithmic problems, the quadratic residue pr

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:57:32
8The Uniform Distribution of Sequen
es Generated by Iteration of Polynomials Emil Lerner ∗

The Uniform Distribution of Sequen es Generated by Iteration of Polynomials Emil Lerner ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-29 20:00:01
9BMGL: Synchronous Key-stream Generator with Provable Security (Revision 1) Johan H˚ astad∗ NADA, Royal Inst. of Technology SE[removed]Stockholm, Sweden

BMGL: Synchronous Key-stream Generator with Provable Security (Revision 1) Johan H˚ astad∗ NADA, Royal Inst. of Technology SE[removed]Stockholm, Sweden

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2001-03-16 15:30:07
10Nearly One-Sided Tests and the Goldreich-Levin Predicate Gustav Hast Department of Numerical Analysis and Computer Science Royal Institute of Technology, [removed]Stockholm, Sweden [removed]

Nearly One-Sided Tests and the Goldreich-Levin Predicate Gustav Hast Department of Numerical Analysis and Computer Science Royal Institute of Technology, [removed]Stockholm, Sweden [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:52