Pseudorandomness And Cryptographic Applications


Download Pseudorandomness And Cryptographic Applications PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Pseudorandomness And Cryptographic Applications book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Pseudorandomness and Cryptographic Applications


Pseudorandomness and Cryptographic Applications

Author: Michael Luby

language: en

Publisher: Princeton University Press

Release Date: 2019-12-31


DOWNLOAD





A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack. There do not seem to be natural examples of functions that are pseudorandom generators. On the other hand, there do seem to be a variety of natural examples of another basic primitive: the one-way function. A function is one-way if it is easy to compute but hard for any efficient adversary to invert on average. The first half of the book shows how to construct a pseudorandom generator from any one-way function. Building on this, the second half of the book shows how to construct other useful cryptographic primitives, such as private key cryptosystems, pseudorandom function generators, pseudorandom permutation generators, digital signature schemes, bit commitment protocols, and zero-knowledge interactive proof systems. The book stresses rigorous definitions and proofs.

Cryptographic Applications of Analytic Number Theory


Cryptographic Applications of Analytic Number Theory

Author: Igor Shparlinski

language: en

Publisher: Birkhäuser

Release Date: 2013-03-07


DOWNLOAD





The book introduces new techniques that imply rigorous lower bounds on the com plexity of some number-theoretic and cryptographic problems. It also establishes certain attractive pseudorandom properties of various cryptographic primitives. These methods and techniques are based on bounds of character sums and num bers of solutions of some polynomial equations over finite fields and residue rings. Other number theoretic techniques such as sieve methods and lattice reduction algorithms are used as well. The book also contains a number of open problems and proposals for further research. The emphasis is on obtaining unconditional rigorously proved statements. The bright side of this approach is that the results do not depend on any assumptions or conjectures. On the downside, the results are much weaker than those which are widely believed to be true. We obtain several lower bounds, exponential in terms of logp, on the degrees and orders of o polynomials; o algebraic functions; o Boolean functions; o linear recurrence sequences; coinciding with values of the discrete logarithm modulo a prime p at sufficiently many points (the number of points can be as small as pI/2+O:). These functions are considered over the residue ring modulo p and over the residue ring modulo an arbitrary divisor d of p - 1. The case of d = 2 is of special interest since it corresponds to the representation of the rightmost bit of the discrete logarithm and defines whether the argument is a quadratic residue.

Pseudorandomness


Pseudorandomness

Author: Salil P. Vadhan

language: en

Publisher: Foundations and Trends(r) in T

Release Date: 2012


DOWNLOAD





A survey of pseudorandomness, the theory of efficiently generating objects that look random despite being constructed using little or no randomness. This theory has significance for areas in computer science and mathematics, including computational complexity, algorithms, cryptography, combinatorics, communications, and additive number theory.