One way functions and pseudorandom generators

From MaRDI portal
Publication:1100894

DOI10.1007/BF02579323zbMath0641.68061MaRDI QIDQ1100894

Leonid A. Levin

Publication date: 1987

Published in: Combinatorica (Search for Journal in Brave)




Related Items

One-way permutations and self-witnessing languagesA New Pseudorandom Generator from Collision-Resistant Hash FunctionsOn universal learning algorithmsMagnifying computing gaps. Establishing encrypted communication over unidirectional channelsQuantum algorithms for the \(k\)-XOR problemMPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applicationsTime hierarchies for cryptographic function inversion with adviceOne-way functions and circuit complexitySimultaneous Secrecy and Reliability Amplification for a General Channel ModelEfficient Pseudorandom Functions via On-the-Fly AdaptationProofs of proximity for context-free languages and read-once branching programsSparse pseudorandom distributionsPseudorandom sources for BPPOne-way permutations in NC 0Mathematical problems in cryptologyOn-line/off-line digital signaturesStrong Average-Case Circuit Lower Bounds from Nontrivial DerandomizationOn building fine-grained one-way functions from strong average-case hardnessProofs of Work from worst-case assumptionsA complete one-way function based on a finite rank free \(\mathbb{Z}\times\mathbb{Z}\)-moduleFrom FE combiners to secure MPC and backThe function-inversion problem: barriers and opportunitiesBalancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom FunctionsON THE CIRCUIT-SIZE OF INVERSESHardness-preserving reductions via cuckoo hashingA tight computational indistinguishability bound for product distributionsUniversal amplification of KDM security: from 1-key circular to multi-key KDMParadigms for Unconditional Pseudorandom GeneratorsQuery complexity in errorless hardness amplificationFeebly secure cryptographic primitivesCircuit complexity of linear functions: gate elimination and feeble securityThe complexity of inverting explicit Goldreich's function by DPLL algorithmsSimple and more efficient PRFs with tight security from LWE and matrix-DDHOn the theory of average case complexityAlmost everywhere high nonuniform complexityOn the Security of the Winternitz One-Time Signature SchemeNon-interactive proofs of proximityThe communication complexity of additionOn optimal heuristic randomized semidecision procedures, with applications to proof complexity and cryptographyPractical construction and analysis of pseudo-randomness primitivesOn the complexity of compressing obfuscationEasiness assumptions and hardness tests: Trading time for zero errorBasing Weak Public-Key Cryptography on Strong One-Way FunctionsDegradation and Amplification of Computational HardnessSimulation theorems via pseudo-random propertiesThe complexity of ODDnATraceable ring signatures: general framework and post-quantum securityPseudorandom generators from regular one-way functions: new constructions with improved parametersOn complete one-way functionsSymmetry of information and one-way functionsAlgebraic cryptography: new constructions and their security against provable breakLower bounds on the query complexity of non-uniform and adaptive reductions showing hardness amplificationLower Bounds on the Query Complexity of Non-uniform and Adaptive Reductions Showing Hardness AmplificationQuery Complexity in Errorless Hardness AmplificationThree XOR-Lemmas — An ExpositionOn Yao’s XOR-LemmaOn Security Preserving Reductions – Revised TerminologyPrediction-preserving reducibilityA Feebly Secure Trapdoor FunctionAdvice Lower Bounds for the Dense Model TheoremUniversal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness EncryptionSome consequences of the existnce of pseudorandom generatorsShared generation of pseudo-random functionsQuantum lower bounds for the Goldreich-Levin problemSemigroups and one-way functionsUnnamed ItemUnnamed ItemPseudorandom Functions: Three Decades LaterRandomness vs time: Derandomization under a uniform assumption\(BPP\) has subexponential time simulations unless \(EXPTIME\) has publishable proofs



Cites Work


This page was built for publication: One way functions and pseudorandom generators