Pseudorandom function family

Results: 36



#Item
1Cryptography / Computational complexity theory / Pseudorandomness / Analysis of algorithms / Probabilistic complexity theory / Pseudorandom function family / Randomized algorithm / Random number generation / Pseudorandom number generator / One-way function / Advantage / IP

Hoti to Construct Random Functions ODED GOLDREICH, SHAFI AND SILVIO MICALI GOLDWASSER,

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2003-04-15 15:57:50
2Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:23:28
3Cryptography / Cryptographic hash functions / Key management / Pseudorandomness / Search algorithms / PBKDF2 / Password / Scrypt / Crypt / Key derivation function / Pseudorandom function family / Salt

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Add to Reading List

Source URL: password-hashing.net

Language: English
4Cryptography / Message authentication codes / Pseudorandom function family / Pseudorandomness / Error detection and correction / Hash-based message authentication code / Advantage / Randomness extractor

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-07-24 05:23:52
5Cryptography / Computer access control / PBKDF2 / Pseudorandom function family / Password / Challengeresponse authentication / Security token

The Pythia PRF Service Adam Everspaugh? , Rahul Chatterjee? , Samuel Scott?? , Ari Juels† , and Thomas Ristenpart‡ ? University of Wisconsin–Madison, {ace,rchat}@cs.wisc.edu ?? Royal Holloway, University of London,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-17 14:36:44
6Pseudorandom function family / Ciphertext indistinguishability / Cipher / Differential cryptanalysis / Stream cipher / Cryptography / Advantage / Block cipher

BRICS Basic Research in Computer Science BRICS RSDamg˚ard & Nielsen: From Known-Plaintext Security to Chosen-Plaintext Security From Known-Plaintext Security to

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2001-11-06 09:17:54
7Applied mathematics / Search algorithms / Hashing / Computational complexity theory / Pseudorandom function family / Pseudorandom generator / Hash function / Cuckoo hashing / One-way function / Theoretical computer science / Mathematics / Pseudorandomness

Hardness Preserving Reductions via Cuckoo Hashing Itay Berman∗ Iftach Haitner∗ Ilan Komargodski†

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2013-06-11 04:11:57
8Advantage / Pseudorandom function family / Expected value / Function / Lemmas / Probability theory / Pseudorandom generator / Cryptography / Mathematics / Pseudorandomness

Programming Language Techniques for Cryptographic Proofs⋆ Gilles Barthe1 , Benjamin Gr´egoire2, and Santiago Zanella B´eguelin1 1 IMDEA Software, Madrid, Spain, {Gilles.Barthe,Santiago.Zanella}@imdea.org

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
9Advantage / Pseudorandom function family / Expected value / Function / Lemmas / Probability theory / Pseudorandom generator / Cryptography / Mathematics / Pseudorandomness

Programming Language Techniques for Cryptographic Proofs⋆ Gilles Barthe1 , Benjamin Gr´egoire2, and Santiago Zanella B´eguelin1 1 IMDEA Software, Madrid, Spain, {Gilles.Barthe,Santiago.Zanella}@imdea.org

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
10Random oracle / Pseudorandom generator / One-way function / Pseudorandom function family / Zero-knowledge proof / Oracle machine / Feistel cipher / Cryptography / Pseudorandomness / Ciphertext indistinguishability

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 07:03:25
UPDATE