In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which replaces the required perfect randomness with output distribution of a computationally secure pseudorandom generator (PRG). We propose novel ideas and techniques for evaluating the indistinguishability between the random and pseudorandom cases, even against an adversary with computationally unbounded attack algorithm. Hence the PRG-based randomness reduction can be effective even for information-theoretically secure cryptographic schemes, especially when the amount of information received by the adversary is small. In comparison to a preceding result of Dubrov and Ishai (STOC 2006), our result removes the requirement of generalized notion ...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
In cryptography, randomness plays an important role in multiple applications. It is required in fund...
International audienceGuaranteeing the security of information transmitted through the Internet, aga...
A recent work by Nuida and Hanaoka (in ICITS 2009) provided a proof technique for security of inform...
In the classical approach to pseudo-random number generators, a generator is considered to perform w...
In the classical approach to pseudo-random number generators, a generator is considered to perform w...
Part 3: Network Security/ CryptographyInternational audienceBarak and Halevi (BH) have proposed an e...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Randomness plays an important role in multiple applications in cryptography. It is required in funda...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
Abstract. A pseudo-random number generator (PRNG) is a deterministic algorithm that produces numbers...
The most effective cryptographic algorithm has more randomness in the numbers a generator generates,...
The ability to produce random numbers is an important aspect of many cryptographic applications. Thi...
AbstractThe concept of pseudorandomness plays an important role in cryptography. In this note, we co...
AbstractRandomness is a useful computation resource due to its ability to enhance the capabilities o...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
In cryptography, randomness plays an important role in multiple applications. It is required in fund...
International audienceGuaranteeing the security of information transmitted through the Internet, aga...
A recent work by Nuida and Hanaoka (in ICITS 2009) provided a proof technique for security of inform...
In the classical approach to pseudo-random number generators, a generator is considered to perform w...
In the classical approach to pseudo-random number generators, a generator is considered to perform w...
Part 3: Network Security/ CryptographyInternational audienceBarak and Halevi (BH) have proposed an e...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Randomness plays an important role in multiple applications in cryptography. It is required in funda...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
Abstract. A pseudo-random number generator (PRNG) is a deterministic algorithm that produces numbers...
The most effective cryptographic algorithm has more randomness in the numbers a generator generates,...
The ability to produce random numbers is an important aspect of many cryptographic applications. Thi...
AbstractThe concept of pseudorandomness plays an important role in cryptography. In this note, we co...
AbstractRandomness is a useful computation resource due to its ability to enhance the capabilities o...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
In cryptography, randomness plays an important role in multiple applications. It is required in fund...
International audienceGuaranteeing the security of information transmitted through the Internet, aga...