First Page | Document Content | |
---|---|---|
![]() Date: 2012-12-05 15:32:23Applied mathematics Pseudorandom generator theorem Stream cipher Pseudorandom generator Block cipher Hard-core predicate Exponential distribution SWIFFT Cryptography Theoretical computer science Pseudorandomness | Source URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 816,63 KBShare Document on Facebook |
![]() | Microsoft Word - Psalm 22.docDocID: 1reJW - View Document |
![]() | HP Prime Technology Corner 10 The Practice of Statistics for the AP Exam, 5e Section 4-1, P. 215 TECHNOLOGY CORNER 10. Choosing an SRS on the HP PrimeDocID: 1r25i - View Document |
![]() | Hoti to Construct Random Functions ODED GOLDREICH, SHAFI AND SILVIO MICALI GOLDWASSER,DocID: 1r1z1 - View Document |
![]() | Network Working Group Request for Comments: 4086 BCP: 106 Obsoletes: 1750 Category: Best Current PracticeDocID: 1qWaS - View Document |
![]() | Lossless Condensers, Unbalanced Expanders, and Extractors Amnon Ta-Shma∗ Christopher Umans† David Zuckerman‡DocID: 1qPOU - View Document |