Wonder Club world wonders pyramid logo
×

Pseudorandomness and Cryptographic Applications Book

Pseudorandomness and Cryptographic Applications
Pseudorandomness and Cryptographic Applications, A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that looks just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construc, Pseudorandomness and Cryptographic Applications has a rating of 1.5 stars
   2 Ratings
X
Pseudorandomness and Cryptographic Applications, A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that looks just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construc, Pseudorandomness and Cryptographic Applications
1.5 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
0 %
2
50 %
1
50 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Pseudorandomness and Cryptographic Applications
  • Written by author Michael Luby
  • Published by Princeton University Press, January 1996
  • A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construc
  • A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construc
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Overview and Usage Guide ix Mini-Courses xiii Acknowledgments xv Preliminaries 3
Introduction of some basic notation that is used in all subsequent lectures.
Review of some computational complexity classes. Description of some useful probability facts.
Lecture 1 Introduction to private key cryptosystems, pseudorandom generators, one-way functions. Introduction of some specific conjectured one-way functions. 13
Lecture 2 Discussions of security issues associated with the computing environment of a party, including the security parameter of a protocol. Definition of an adversary, the achievement ratio of an adversary for a protocol, and the security of a protocol. Definitions of one-way functions and one-way permutations, and cryptographic reduction. 21
Lecture 3 Definition of a weak one-way function. Reduction from a weak oneway function to a one-way function. More efficient security preserving reductions from a weak one-way permutation to a one-way permutation. 35
Lecture 4 Proof that the discrete log problem is either a one-way permutation or not even weak one-way permutation via random self-reducibility. Definition of a pseudorandom generator, the next bit test, and the proof that the two definitions are equivalent. Construction of a pseudorandom generator that stretches by a polynomial amount from a pseudorandom generator that stretches by one bit. 49
Lecture 5 Introduction of a two part paradigm for derandornizing probabilistic algorithms. Two problems are used to exemplify this approach: witness sampling and vertex partitioning. 56
Lecture 6 Definition of inner product bit for a function and what it means to be a hidden bit. Description and proof of the Hidden Bit Theorem that shows the inner product bit is hidden for a one-way function.
Lecture 7 Definitions of statistical measures of distance between probability distributions and the analogous computational measures. Restatement of the, Hidden Bit Theorem in these terms and application of this theorem to construct a pseudorandom generator from a one-way permutation. Description and proof of the Many Hidden Bits Theorem that shows many inner product bit are hidden for a one-way function.
Lecture 8 Definitions of various notions of statistical entropy, computational entropy and pseudoentropy generators. Definition of universal hash Functions. Description and proof of the Smoothing Entropy Theorem. 79
Lecture 9 Reduction from a one-way one-to-one function to a pseudorandom generator using the Smoothing Entropy Theorem and the Hidden Bit Theorem. Reduction from a one-way regular function to a pseudorandom generator using the Smoothing Entropy Theorem and Many Hidden Bits Theorem. 88
Lecture 10 Definition of a false entropy generator. Construction and proof of a pseudorandom generator from a false entropy generator. Construction and proof of a false entropy generator from any one-way function in the non- uniform sense. 95
Lecture 11 Definition of a stream private key cryptosystem, definitions of several notions of security, including passive attack and chosen plaintext. attack, and design of a stream private key cryptosystern that is secure against these attacks based on a pseudorandom generator. 105
Lecture 12 Definitions and motivation for a block cryptosystern and security against chosen plaintext attack. Definition and construction of a pseudorandom function generator from a pseudorandom generator. Construction of a block private key cryptosystern secure against chosen plaintext attack based on a pseudorandom function generator. 117
Lecture 13 Discussion of the Data Encryption Standard. Definition of a pseudorandom invertible permutation generator and discussion of applications to the construction of a block private key cryptosystern secure against chosen plaintext attack. Construction of a perfect random permutation based on a perfect random function. 128
Lecture 14 Construction of a pseudorandom invertible permutation generator from a pseudorandom function generator. Definition and construction of a super pseudorandom invertible permutation generator. Applications to block private key cryptosystems. 138
Lecture 15 Definition of trapdoor one-way functions, specific examples, and construction of cryptosystems without initial communication using a private line. 146
Lecture 16 Definition and construction of a universal one-way hash function. 154
Lecture 17 Definition and construction of secure one bit and many bit signature schemes. 162
Lecture 18 Definition of interactive proofs IP and the zero knowledge restriction of this class ZKIP. Definition and construction of a hidden bit commitment scheme based on a one-way function. Construction of a ZKIP for all NP based on a hidden bit commitment scheme. 174
List of Exercises and Research Problems 185
List of Primary Results 195
Credits and History 199
References 211
Notation 221
Index 225


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Pseudorandomness and Cryptographic Applications, A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that looks just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construc, Pseudorandomness and Cryptographic Applications

X
WonderClub Home

This item is in your Collection

Pseudorandomness and Cryptographic Applications, A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that looks just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construc, Pseudorandomness and Cryptographic Applications

Pseudorandomness and Cryptographic Applications

X
WonderClub Home

This Item is in Your Inventory

Pseudorandomness and Cryptographic Applications, A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that looks just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construc, Pseudorandomness and Cryptographic Applications

Pseudorandomness and Cryptographic Applications

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: