Pseudorandomness

Results: 273



#Item
31Random NumbersUsing PRG .......

Random NumbersUsing PRG .......

Add to Reading List

Source URL: genome.sph.umich.edu

Language: English - Date: 2012-10-31 21:30:08
32COMPUTATIONAL INTRACTABILITY AND PSEUDORANDOMNESS    The areas of computational intractability and pseudorandomness (see article by Avi Wigderson, Herbert H. Maass Professor, page 1) have been among the most exciting sc

COMPUTATIONAL INTRACTABILITY AND PSEUDORANDOMNESS   The areas of computational intractability and pseudorandomness (see article by Avi Wigderson, Herbert H. Maass Professor, page 1) have been among the most exciting sc

Add to Reading List

Source URL: www.math.ias.edu

Language: English - Date: 2010-04-09 09:12:37
    33The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

    The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

    Add to Reading List

    Source URL: pub.ist.ac.at

    Language: English - Date: 2014-07-24 05:23:52
    34ITL Bulletin, Recommendation for Random Number Generation Using Deterministic Random Bit Generators (August 2015)

    ITL Bulletin, Recommendation for Random Number Generation Using Deterministic Random Bit Generators (August 2015)

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-08-13 08:03:11
    35

    PDF Document

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English - Date: 2013-07-31 04:39:02
    36Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

    Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-09-16 05:37:56
    37Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

    Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-09-16 05:37:56
    38Chapter 5  Random Numbers Contents 5.1

    Chapter 5 Random Numbers Contents 5.1

    Add to Reading List

    Source URL: www.ks.uiuc.edu

    Language: English - Date: 2000-03-28 14:32:45
    39Chapter 5  Random Numbers Contents 5.1

    Chapter 5 Random Numbers Contents 5.1

    Add to Reading List

    Source URL: www.ks.uiuc.edu

    Language: English - Date: 2005-01-14 15:57:51
    40Hardness Preserving Reductions via Cuckoo Hashing Itay Berman∗ Iftach Haitner∗  Ilan Komargodski†

    Hardness Preserving Reductions via Cuckoo Hashing Itay Berman∗ Iftach Haitner∗ Ilan Komargodski†

    Add to Reading List

    Source URL: www.cs.tau.ac.il

    Language: English - Date: 2013-06-11 04:11:57