Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/100216.100270acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

Pseudo-random generators under uniform assumptions

Published: 01 April 1990 Publication History
First page of PDF

References

[1]
{BM} Blum, M. and Micali, S. "How to generate cryptographically strong sequences of pseudo-random bits", SIAM J. on Computing, 13 (1984), pp. 850- 864.
[2]
{G} Goldreich, O. "A Note on Computational Indistiguishability", technical report 89-051, International Computer Science Institute.
[3]
{GKL} Goldreich, O., Krawczyk, H. and Luby, M. "On the existence of pseudo-random generators", Proc. 29th Annual Conf. on Foundations of Computer Science, (1988), pp. 12-24.
[4]
{GL} Goldreich, O. and Levin, L. "A hard-core predicate for all one-way functions", Proc. 21st Symp. on Theory of Computing, (1989), pp. 25-32.
[5]
{ILL} Impagliazzo, R., Levin L. and Luby, M. "Pseudo-random number generation from one-way functions", Proc. 21st Symp. on Theory of Computing , (1989), pp. 12-24.
[6]
{K} Knuth D. "The are of computer programming, vol. 2; seminumerical algorithms", second edition, Addison-Wesley, Reading, Mass.
[7]
{L} Levin L. "One-way functions and pseudo-random generators", Proc. 17th Symp. on Theory of Computing, (1985), pp. 363-365.
[8]
{Y} Yao A. "Theory and application of trapdoor functions", Proc. 23rd Annual Conf. on Foundations of Computer Science, (1982), pp. 80-91.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '90: Proceedings of the twenty-second annual ACM symposium on Theory of Computing
April 1990
574 pages
ISBN:0897913612
DOI:10.1145/100216
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 1990

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

STOC90
Sponsor:
STOC90: 22nd Annual ACM Symposium on Theory of Computing
May 13 - 17, 1990
Maryland, Baltimore, USA

Acceptance Rates

Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Upcoming Conference

STOC '25
57th Annual ACM Symposium on Theory of Computing (STOC 2025)
June 23 - 27, 2025
Prague , Czech Republic

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)95
  • Downloads (Last 6 weeks)15
Reflects downloads up to 23 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024): Homomorphic Encryption of Rationals Using Laurent PolynomialsInformation Security and Privacy10.1007/978-981-97-5025-2_10(180-195)Online publication date: 15-Jul-2024
  • (2021)Computational Hardness of Optimal Fair Computation: Beyond MinicryptAdvances in Cryptology – CRYPTO 202110.1007/978-3-030-84245-1_2(33-63)Online publication date: 11-Aug-2021
  • (2020)Computational Hardness of Collective Coin-Tossing ProtocolsEntropy10.3390/e2301004423:1(44)Online publication date: 30-Dec-2020
  • (2020)Black-Box Use of One-Way Functions is Useless for Optimal Fair Coin-TossingAdvances in Cryptology – CRYPTO 202010.1007/978-3-030-56880-1_21(593-617)Online publication date: 10-Aug-2020
  • (2013)On the power of nonuniformity in proofs of securityProceedings of the 4th conference on Innovations in Theoretical Computer Science10.1145/2422436.2422480(389-400)Online publication date: 9-Jan-2013
  • (2012)A new pseudorandom generator from collision-resistant hash functionsProceedings of the 12th conference on Topics in Cryptology10.1007/978-3-642-27954-6_12(187-202)Online publication date: 27-Feb-2012
  • (2010)A new hardware-assisted PIR with O(n) shuffle costInternational Journal of Information Security10.1007/s10207-010-0105-29:4(237-252)Online publication date: 1-Aug-2010
  • (2009)Improvement of Execution Efficiency on the MX CoreProceedings of the 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies10.1109/PDCAT.2009.81(420-425)Online publication date: 8-Dec-2009
  • (2007)Provably secure authenticated group Diffie-Hellman key exchangeACM Transactions on Information and System Security10.1145/1266977.126697910:3(10-es)Online publication date: 1-Jul-2007
  • (2007)Oblivious-Transfer AmplificationProceedings of the 26th annual international conference on Advances in Cryptology10.1007/978-3-540-72540-4_32(555-572)Online publication date: 20-May-2007
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media