How to Generate Cryptographically Strong Sequences of Pseudorandom Bits

From MaRDI portal
Revision as of 14:01, 4 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3339289

DOI10.1137/0213053zbMath0547.68046OpenAlexW2164284862WikidataQ55918694 ScholiaQ55918694MaRDI QIDQ3339289

Silvio Micali

Publication date: 1984

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/0213053




Related Items (only showing first 100 items - show all)

A New Pseudorandom Generator from Collision-Resistant Hash FunctionsPlaintext-Checkable EncryptionAn information-theoretic treatment of random-self-reducibilityRandomness Tests: Theory and PracticeThe self-power map and collecting all residue classesAll Bits in ax + b mod p are HardSub-computable Bounded PseudorandomnessQuantified Derandomization: How to Find Water in the OceanSparse pseudorandom distributionsPseudorandom sources for BPPReconstructive dispersers and hitting set generatorsEnhancements of trapdoor permutationsWorst-case hardness suffices for derandomization: A new method for hardness-randomness trade-offsUniform derandomization from pathetic lower boundsBalancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom FunctionsOn constructing one-way permutations from indistinguishability obfuscationAsymptotically efficient lattice-based digital signaturesThe Chain Rule for HILL Pseudoentropy, RevisitedRSA and Elliptic Curve Least Significant Bit SecuritySecure commitment against a powerful adversaryThe complexity of graph connectivityTwo Comments on Targeted Canonical DerandomizersPairs of \(r\)-primitive and \(k\)-normal elements in finite fieldsNon-adaptive universal one-way hash functions from arbitrary one-way functionsPFLM: privacy-preserving federated learning with membership proofBeyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscationCliptography: Clipping the Power of Kleptographic AttacksPrimitive normal values of rational functions over finite fieldsInverses of \(r\)-primitive \(k\)-normal elements over finite fieldsAn ultrafast cryptographically secure pseudorandom number generatorOne-way functions and the hardness of (probabilistic) time-bounded Kolmogorov complexity w.r.t. samplable distributionsWhen messages are keys: is HMAC a dual-PRF?Unnamed ItemUnnamed ItemUniversally composable symbolic security analysisUnnamed ItemSimple constructions from (almost) regular one-way functionsPrivacy-preserving and verifiable protocols for scientific computation outsourcing to the cloudRevisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter BoundsCryptography and cryptographic protocolsThe index calculus method using non-smooth polynomialsSecure and efficient off-line digital money (extended abstract)Ker-I Ko and the Study of Resource-Bounded Kolmogorov ComplexityOn pseudorandomness in families of sequences derived from the Legendre symbolON GENERIC COMPLEXITY OF THE QUADRATIC RESIDUOSITY PROBLEMThe reactive simulatability (RSIM) framework for asynchronous systemsПостроение генераторов случайных чисел с помощью вероятностных автоматов и “односторонних” функцийGauss periods: orders and cryptographical applicationsEfficient Error-Correcting Codes for Sliding WindowsNONDETERMINISTIC CIRCUIT MINIMIZATION PROBLEM AND DERANDOMIZING ARTHUR-MERLIN GAMESThe Monte Carlo Algorithm with a Pseudorandom GeneratorPractical construction and analysis of pseudo-randomness primitivesQuantum attacks on pseudorandom generatorsLogics for reasoning about cryptographic constructionsUnnamed ItemNatural proofsPseudorandom generators without the XOR lemmaQUAD: A Practical Stream Cipher with Provable SecurityDeterministic Encryption: Definitional Equivalences and Constructions without Random OraclesA New Attack on the LEX Stream CipherInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Unnamed ItemInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Asymptotically Efficient Lattice-Based Digital SignaturesCryptographic limitations on parallelizing membership and equivalence queries with applications to random-self-reductionsPseudo-random generators for all hardnessesOn Constructing One-Way Permutations from Indistinguishability ObfuscationContention in Cryptoland: Obfuscation, Leakage and UCEPseudorandom generators from regular one-way functions: new constructions with improved parametersComputational sample complexity and attribute-efficient learningOn the complexity of constructing pseudorandom functions (especially when they don't exist)A unified approach to deterministic encryption: new constructions and a connection to computational entropyFine-grained cryptography revisitedBit Security of the CDH Problems over Finite FieldsAn Average Case NP-complete Graph Colouring ProblemAn Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE TransformationsPractical Chosen Ciphertext Secure Encryption from FactoringMinicrypt primitives with algebraic structure and applicationsOn Constructing 1-1 One-Way FunctionsIn a World of P=BPPThree XOR-Lemmas — An ExpositionRandomness and ComputationOn Security Preserving Reductions – Revised TerminologyAnother Motivation for Reducing the Randomness Complexity of AlgorithmsGeneration of solved instances of Multiconstraint Knapsack problem and its applications to Private Key CipherTypically-correct derandomization for small time and spaceFine-Grained CryptographyMultiple encryption with minimum keyA Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal StretchOn Related-Secret PseudorandomnessFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsTargeted Pseudorandom Generators, Simulation Advice Generators, and Derandomizing LogspaceUniversal test for quantum one-way permutationsUnnamed ItemHow to Exchange Half a BitPseudorandom Functions: Three Decades LaterThe Many Entropies in One-Way FunctionsA Note on Perfect Correctness by DerandomizationWeak Zero-Knowledge beyond the Black-Box BarrierQuantum cryptography. II: How to re-use a one-time pad safely even if \(\mathrm P=\mathrm{NP}\)






This page was built for publication: How to Generate Cryptographically Strong Sequences of Pseudorandom Bits