Sciweavers

247 search results - page 7 / 50
» On Pseudorandom Generators in NC
Sort
View
EUROCRYPT
2006
Springer
13 years 11 months ago
How to Strengthen Pseudo-random Generators by Using Compression
Sequence compression is one of the most promising tools for strengthening pseudo-random generators used in stream ciphers. Indeed, adding compression components can thwart algebrai...
Aline Gouget, Hervé Sibert
ECCC
2010
82views more  ECCC 2010»
13 years 7 months ago
Pseudorandom Generators for Combinatorial Checkerboards
We define a combinatorial checkerboard to be a function f : {1, . . . , m}d {1, -1} of the form f(u1, . . . , ud) = d i=1 fi(ui) for some functions fi : {1, . . . , m} {1, -1}. T...
Thomas Watson
ICALP
2005
Springer
14 years 1 months ago
Simple Extractors via Constructions of Cryptographic Pseudo-random Generators
Trevisan has shown that constructions of pseudo-random generators from hard functions (the Nisan-Wigderson approach) also produce extractors. We show that constructions of pseudo-r...
Marius Zimand
CORR
2010
Springer
185views Education» more  CORR 2010»
13 years 7 months ago
Pseudorandom generators and the BQP vs. PH problem
It is a longstanding open problem to devise an oracle relative to which BQP does not lie in the Polynomial-Time Hierarchy (PH). We advance a natural conjecture about the capacity ...
Bill Fefferman, Christopher Umans
CTRSA
2003
Springer
105views Cryptology» more  CTRSA 2003»
14 years 21 days ago
Forward-Security in Private-Key Cryptography
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by...
Mihir Bellare, Bennet S. Yee