Pseudorandom function family

Results: 36



#Item
11Pseudorandomness / Cryptography / Computational complexity theory / Algorithmic information theory / Pseudorandom generator / Pseudorandom function family / Obfuscated code / Advantage / Obfuscation / Mathematics / Theoretical computer science / Applied mathematics

On the Correlation Intractability of Obfuscated Pseudorandom Functions Ran Canetti∗ Yilei Chen†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 00:12:34
12Verifiable secret sharing / Gödel Prize / Interactive proof system / Claude Crépeau / Pseudorandom function family / Probabilistic encryption / Oblivious transfer / Zero-knowledge proof / Provable security / Cryptography / Cryptographic protocols / Silvio Micali

Curriculum Vitae Silvio Micali Ford Professor of Engineering Electrical Engineering and Computer Science Department Stata Center, Room G644, 32 Vassar Street, Cambridge, MA5949

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2015-04-22 20:29:48
13Probability theory / Advantage / Oracle machine / Standard model / Oracle Corporation / Pseudorandom function family / Random function / Computational complexity theory / Pseudorandomness / Cryptography / Cryptographic hash functions / Random oracle

The Random Oracle Methodology, Revisited∗ Ran Canetti† Oded Goldreich‡ Shai Halevi§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-08-01 15:32:21
14Advantage / Pseudorandom function family / Pseudorandom permutation / Function / Permutation / Randomized algorithm / Unpredictable permutation / Cryptography / Mathematics / Pseudorandomness

Chapter 3 Pseudorandom Functions Pseudorandom functions (PRFs) and their cousins, pseudorandom permutations (PRPs), figure as central tools in the design of protocols, especially those for shared-key cryptography. At one

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:41:44
15Applied mathematics / Algorithmic information theory / Pseudorandom generator / Computational complexity theory / Pseudorandom function family / One-way function / Advantage / Negligible function / Function / Cryptography / Theoretical computer science / Pseudorandomness

An abridged version of this paper appears in Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE, 1996. Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security Mihir Be

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-10-31 17:44:37
16MD5 / Pseudorandom function family / Pseudorandomness / Cryptographic hash function / Initialization vector / Integrated Encryption Scheme / Cryptography / Block cipher / Advantage

A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-02-28 15:02:35
17One-way function / Pseudorandom generator theorem / Hard-core predicate / Random oracle / Verifiable random function / Trapdoor function / Pseudorandom function family / Pseudorandom generator / Pseudorandom permutation / Cryptography / Pseudorandomness / Cryptographic hash functions

Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations? Dario Fiore1 and Dominique Schr¨oder2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-09-15 13:18:51
18Pseudorandomness / Search algorithms / Hashing / Computational complexity theory / Pseudorandom function family / Pseudorandom generator / Hash function / Cuckoo hashing / One-way function / Cryptography / Theoretical computer science / Mathematics

Hardness Preserving Reductions via Cuckoo Hashing Itay Berman∗ Iftach Haitner∗ Ilan Komargodski†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-24 16:10:17
19CBC-MAC / CMAC / Block cipher / Pseudorandom function family / Feistel cipher / Pseudorandomness / Unpredictable permutation / Index of cryptography articles / Cryptography / Message authentication codes / Advantage

Appears in , Vol. 61, No. 3, Dec 2000, pp. 362{399. Preliminary version was in 94 , Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2001-09-12 12:24:34
20Computability theory / Complexity classes / Models of computation / Theory of computation / Obfuscated code / Algorithm / Oracle machine / Pseudorandom function family / Computability / Theoretical computer science / Applied mathematics / Computational complexity theory

On the (Im)possibility of Obfuscating Programs∗ Boaz Barak† Oded Goldreich‡ Amit Sahaik

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2010-07-29 14:23:20
UPDATE