1![Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedi´c∗ ‡ § Danny Harnik† § Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedi´c∗ ‡ § Danny Harnik† §](https://www.pdfsearch.io/img/2e0e6cd17782b38c584d2fde82d33ec1.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2007-12-10 11:39:44
|
---|
2![An Improved Pseudorandom Generator Based on Hardness of Factoring Nenad Dedi´c Boston University An Improved Pseudorandom Generator Based on Hardness of Factoring Nenad Dedi´c Boston University](https://www.pdfsearch.io/img/da2e9461f48359066f0148a526dd0d9c.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2002-08-27 12:28:51
|
---|
3![Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations? Dario Fiore1 and Dominique Schr¨oder2 1 Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations? Dario Fiore1 and Dominique Schr¨oder2 1](https://www.pdfsearch.io/img/eb64488524a5b93aa9d9b0a586081ae8.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2011-09-15 13:18:51
|
---|
4![BMGL: Synchronous Key-stream Generator with Provable Security (Revision 1) Johan H˚ astad∗ NADA, Royal Inst. of Technology SE[removed]Stockholm, Sweden BMGL: Synchronous Key-stream Generator with Provable Security (Revision 1) Johan H˚ astad∗ NADA, Royal Inst. of Technology SE[removed]Stockholm, Sweden](https://www.pdfsearch.io/img/b497437919a4857a6f34ccf371859aa5.jpg) | Add to Reading ListSource URL: www.cosic.esat.kuleuven.beLanguage: English - Date: 2001-03-16 15:30:07
|
---|
5![Nearly One-Sided Tests and the Goldreich-Levin Predicate Gustav Hast Department of Numerical Analysis and Computer Science Royal Institute of Technology, [removed]Stockholm, Sweden [removed] Nearly One-Sided Tests and the Goldreich-Levin Predicate Gustav Hast Department of Numerical Analysis and Computer Science Royal Institute of Technology, [removed]Stockholm, Sweden [removed]](https://www.pdfsearch.io/img/b744ecae05bd7434b216b26e300815f4.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2008-09-15 00:54:52
|
---|
6![Bits Security of the CDH Problems over Finite Fields Mingqiang Wang1 , Tao Zhan1 , and Haibin Zhang2 1 School of Mathematics, Shandong University [removed],[removed] Bits Security of the CDH Problems over Finite Fields Mingqiang Wang1 , Tao Zhan1 , and Haibin Zhang2 1 School of Mathematics, Shandong University [removed],[removed]](https://www.pdfsearch.io/img/7c111534532f6fc7418abc669692b94f.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-09-02 01:27:01
|
---|
7![First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security](https://www.pdfsearch.io/img/aaffbc9961b082dd7594034ee30abbeb.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-12-07 12:35:35
|
---|
8![Simultaneous Hardcore Bits and Cryptography Against Memory Attacks Adi Akavia1? , Shafi Goldwasser2?? , and Vinod Vaikuntanathan3? ? ? 1 2 Simultaneous Hardcore Bits and Cryptography Against Memory Attacks Adi Akavia1? , Shafi Goldwasser2?? , and Vinod Vaikuntanathan3? ? ? 1 2](https://www.pdfsearch.io/img/3d4f706c41abd86ec3f6e0c11bf2bfb1.jpg) | Add to Reading ListSource URL: people.csail.mit.eduLanguage: English - Date: 2010-02-04 10:05:49
|
---|
9![ICM 2002 • Vol. I • 245^272 Mathematical Foundations of ICM 2002 • Vol. I • 245^272 Mathematical Foundations of](https://www.pdfsearch.io/img/d62286758261eb58e62314ed7f0e3634.jpg) | Add to Reading ListSource URL: www.mathunion.orgLanguage: English - Date: 2012-04-18 10:56:38
|
---|
10![](https://www.pdfsearch.io/img/b8474532c1253dbd9cb8cc5cee49c5e9.jpg) | Add to Reading ListSource URL: www.csc.kth.seLanguage: English |
---|