Security preserving amplification of hardness
- 4 December 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 263, 318-326
- https://doi.org/10.1109/fscs.1990.89550
Abstract
No abstract availableThis publication has 20 references indexed in Scilit:
- One-way functions are necessary and sufficient for secure signaturesPublished by Association for Computing Machinery (ACM) ,1990
- How to recycle random bitsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1989
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- How to sign given any trapdoor functionPublished by Association for Computing Machinery (ACM) ,1988
- On the existence of pseudorandom generatorsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1988
- How to construct random functionsJournal of the ACM, 1986
- How to Generate Cryptographically Strong Sequences of Pseudorandom BitsSIAM Journal on Computing, 1984
- Strong signature schemesPublished by Association for Computing Machinery (ACM) ,1983
- Theory and application of trapdoor functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979