Sciweavers

247 search results - page 28 / 50
» On Pseudorandom Generators in NC
Sort
View
TCC
2009
Springer
117views Cryptology» more  TCC 2009»
14 years 8 months ago
Towards a Theory of Extractable Functions
Extractable functions are functions where any adversary that outputs a point in the range of the function is guaranteed to "know" a corresponding preimage. Here, knowledg...
Ran Canetti, Ronny Ramzi Dakdouk
LATINCRYPT
2010
13 years 6 months ago
Generic Attacks on Misty Schemes
Abstract. Misty schemes are classic cryptographic schemes used to construct pseudo-random permutations from 2n bits to 2n bits by using d pseudo-random permutations from n bits to ...
Valérie Nachef, Jacques Patarin, Joana Treg...
EUROCRYPT
2004
Springer
14 years 28 days ago
Black-Box Composition Does Not Imply Adaptive Security
In trying to provide formal evidence that composition has security increasing properties, we ask if the composition of non-adaptively secure permutation generators necessarily pro...
Steven Myers
FSKD
2005
Springer
91views Fuzzy Logic» more  FSKD 2005»
14 years 1 months ago
Visualization Process for Design and Manufacturing of End Mills
The development of CAM system for design and manufacturing of end mills becomes a key approach to save the time and reduce cost for end mills manufacturing. This paper presents the...
Sung-Lim Ko, Trung-Thanh Pham, Yong-Hyun Kim
APPROX
2005
Springer
106views Algorithms» more  APPROX 2005»
14 years 1 months ago
Derandomized Constructions of k-Wise (Almost) Independent Permutations
Constructions of k-wise almost independent permutations have been receiving a growing amount of attention in recent years. However, unlike the case of k-wise independent functions...
Eyal Kaplan, Moni Naor, Omer Reingold