One-way function

Results: 187



#Item
41Dual EC DRBG / National Institute of Standards and Technology / National Security Agency / Factorial / Blum Blum Shub / RBG / One-way function / Mathematics / Pseudorandom number generators / Cryptography

. The Dual Elliptic Curve Deterministic RBG . Background, Specification, Security and Notes

Add to Reading List

Source URL: www.untruth.org

Language: English - Date: 2013-06-22 03:51:50
42Cryptography / One-way function / Injective function / Integration by substitution / Function / Continuous mapping theorem / Mathematics / Mathematical analysis / Functions and mappings

Simple composition theorems of one-way functions – proofs and presentations Jaime Gaspar∗ Eerke Boiten†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 09:03:22
43Hashing / Hash function / SHA-2 / Key stretching / Crypt / Password / One-way compression function / Tabulation hashing / Hash table / Cryptography / Cryptographic hash functions / Search algorithms

STRICT MEMORY HARD HASHING FUNCTIONS (PRELIMINARY V0.3, SERGIO DEMIAN LERNER Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are an extension of memory hard func

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2014-02-01 12:00:10
44Merkle–Damgård construction / SHA-1 / Collision resistance / MD5 / Collision attack / MDC-2 / Preimage attack / Hash function / Fast Syndrome Based Hash / Cryptographic hash functions / Cryptography / One-way compression function

More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-15 23:12:24
45Pseudorandomness / Computational complexity theory / Randomness / Hashing / Pseudorandom generator theorem / Pseudorandom generator / One-way function / Hard-core predicate / Cryptographic hash function / Cryptography / Theoretical computer science / Applied mathematics

Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedi´c∗ ‡ § Danny Harnik† §

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-10 11:39:44
46Mathematics / Learning with errors / Lattice-based cryptography / Lattice problem / Lattice / Ideal lattice cryptography / Quantum algorithm / Quantum computer / One-way function / Cryptography / Applied mathematics / Theoretical computer science

The Learning with Errors Problem Oded Regev∗ Abstract In this survey we describe the Learning with Errors (LWE) problem, discuss its properties, its hardness, and its cryptographic applications.

Add to Reading List

Source URL: www.cims.nyu.edu

Language: English - Date: 2010-06-01 03:43:39
47Lattice problem / Lattice / Normal distribution / One-way function / Ideal lattice cryptography / Lattice-based cryptography / Cryptography / Mathematics / Abstract algebra

Representing Hard Lattices with O(n log n) Bits ∗ Mikl´ os Ajtai

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2008-05-13 00:45:28
48Random oracle / Preimage attack / Hash function / MDC-2 / Merkle–Damgård construction / SHA-1 / Oracle machine / SHA-2 / Advantage / Cryptography / Cryptographic hash functions / One-way compression function

A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions∗ Zheng Gong, Xuejia Lai and Kefei Chen Department of Computer Science and Engineering Shanghai Jiaotong University, China neoyan@sjtu.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-08-12 04:16:52
49Pseudorandomness / Pseudorandom number generators / Computational complexity theory / Algorithmic information theory / Pseudorandom generator / Hard-core predicate / XTR / One-way function / Naor-Reingold Pseudorandom Function / Theoretical computer science / Cryptography / Applied mathematics

An Improved Pseudorandom Generator Based on Hardness of Factoring Nenad Dedi´c Boston University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-08-27 12:28:51
50Applied mathematics / Algorithmic information theory / Pseudorandom generator / Computational complexity theory / Pseudorandom function family / One-way function / Advantage / Negligible function / Function / Cryptography / Theoretical computer science / Pseudorandomness

An abridged version of this paper appears in Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE, 1996. Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security Mihir Be

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-10-31 17:44:37
UPDATE