We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and Universal One-Way Hash Functions (UOWHFs) based on black-box access to one-way permutations. Our lower bounds are tight as they match the efficiency of known constructions. A PRG (resp. UOWHF) construction based on black-box access is a machine that is given oracle access to a permutation. Whenever the permutation is hard to invert, the construction is hard to break. In this paper we give lower bounds on the number of invocations to the oracle by the construction. If $S$ is the assumed security of the oracle permutation $\pi$ (i.e. no adversary of size $S$ can invert $\pi$ on a fraction larger than $1/S$ of its inputs) then a PRG (resp. UOW...
Abstract We study the parallel time-complexity of basic crypto-graphic primitives such as one-way fu...
We consider two of the most fundamental theorems in Cryptography. The first, due to H˚astad et. al. ...
We introduce new and general complexity theoretic hardness assumptions. These assumptions abstract o...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
A central result in the theory of Cryptography, by Hastad, Imagliazzo, Luby and Levin [SICOMP’99], d...
We revisit hardness-preserving constructions of a pseudo-random function (PRF) from any length doubl...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
and Luby show that a pseudorandom generator can be constructed from any one-way function. This plaus...
Since the seminal work of Garg et. al (FOCS\u2713) in which they proposed the first candidate constr...
Abstract. In the last years, much research work has been invested into the security analysis of key ...
Fine-grained cryptographic primitives are ones that are secure against adversaries with an a-priori ...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
Abstract. Since the seminal work of Garg et al. (FOCS’13) in which they proposed the first candidate...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
Abstract We study the parallel time-complexity of basic crypto-graphic primitives such as one-way fu...
We consider two of the most fundamental theorems in Cryptography. The first, due to H˚astad et. al. ...
We introduce new and general complexity theoretic hardness assumptions. These assumptions abstract o...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
A central result in the theory of Cryptography, by Hastad, Imagliazzo, Luby and Levin [SICOMP’99], d...
We revisit hardness-preserving constructions of a pseudo-random function (PRF) from any length doubl...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
and Luby show that a pseudorandom generator can be constructed from any one-way function. This plaus...
Since the seminal work of Garg et. al (FOCS\u2713) in which they proposed the first candidate constr...
Abstract. In the last years, much research work has been invested into the security analysis of key ...
Fine-grained cryptographic primitives are ones that are secure against adversaries with an a-priori ...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
Abstract. Since the seminal work of Garg et al. (FOCS’13) in which they proposed the first candidate...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
Abstract We study the parallel time-complexity of basic crypto-graphic primitives such as one-way fu...
We consider two of the most fundamental theorems in Cryptography. The first, due to H˚astad et. al. ...
We introduce new and general complexity theoretic hardness assumptions. These assumptions abstract o...