We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and Universal One-Way Hash Functions (UOWHFs) based on black-box access to one-way permutations. Our lower bounds are tight astheymatch the efficiency of known constructions. APRG (resp. UOWHF) construction based on black-box access is a machine that is given oracle access to a permutation. Whenever the permutation is hard to invert, the construction is hard to break. In this paper we give lower bounds on the number of invocations to the oracle by the construction. If S is the assumed security of the oracle permutation (i.e. no adversary of size S can invert on a fraction larger than 1=S of its inputs) then a PRG (resp. UOWHF) construction that st...
Abstract. We describe efficient constructions for various cryptographic primitives in private-key as...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
We present a simple new construction of a pseudorandom bit generator, based on the constant depth ge...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
and Luby show that a pseudorandom generator can be constructed from any one-way function. This plaus...
We show very efficient constructions for a pseudo-random generator and for a universal one-way hash ...
Abstract. In the last years, much research work has been invested into the security analysis of key ...
Abstract. Since the seminal work of Garg et al. (FOCS’13) in which they proposed the first candidate...
Abstract. We continue the study of the efficiency of black-box reductions in cryptography. We focus ...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
We revisit hardness-preserving constructions of a pseudo-random function (PRF) from any length doubl...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
Abstract. We describe efficient constructions for various cryptographic primitives in private-key as...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
We present a simple new construction of a pseudorandom bit generator, based on the constant depth ge...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
and Luby show that a pseudorandom generator can be constructed from any one-way function. This plaus...
We show very efficient constructions for a pseudo-random generator and for a universal one-way hash ...
Abstract. In the last years, much research work has been invested into the security analysis of key ...
Abstract. Since the seminal work of Garg et al. (FOCS’13) in which they proposed the first candidate...
Abstract. We continue the study of the efficiency of black-box reductions in cryptography. We focus ...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
We revisit hardness-preserving constructions of a pseudo-random function (PRF) from any length doubl...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
Abstract. We describe efficient constructions for various cryptographic primitives in private-key as...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
We present a simple new construction of a pseudorandom bit generator, based on the constant depth ge...