Applebaum, Benny; Kachlon, Eliran; Patra, Arpita Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract). (English) Zbl 07726491 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 103-120 (2023). MSC: 94A60 68M14 68M25 PDF BibTeX XML Cite \textit{B. Applebaum} et al., Lect. Notes Comput. Sci. 13748, 103--120 (2023; Zbl 07726491) Full Text: DOI
Komargodski, Ilan; Moran, Tal; Naor, Moni; Pass, Rafael; Rosen, Alon; Yogev, Eylon One-way functions and (im)perfect obfuscation. (English) Zbl 1512.68084 SIAM J. Comput. 51, No. 6, 1769-1795 (2022). MSC: 68P25 68N30 68Q15 68Q17 94A60 PDF BibTeX XML Cite \textit{I. Komargodski} et al., SIAM J. Comput. 51, No. 6, 1769--1795 (2022; Zbl 1512.68084) Full Text: DOI
Chen, Hui-Min; Jia, Heng-Yue; Wu, Xia; Wang, Xiu-Li Transferable quantum cheque scheme based on quantum public-key cryptography. (English) Zbl 1502.81024 Int. J. Theor. Phys. 61, No. 8, Paper No. 210, 18 p. (2022). MSC: 81P94 81P70 81P47 94A62 PDF BibTeX XML Cite \textit{H.-M. Chen} et al., Int. J. Theor. Phys. 61, No. 8, Paper No. 210, 18 p. (2022; Zbl 1502.81024) Full Text: DOI
Oliveira, Igor C.; Santhanam, Rahul; Tell, Roei Expander-based cryptography meets natural proofs. (English) Zbl 07506816 Comput. Complexity 31, No. 1, Paper No. 4, 60 p. (2022). MSC: 68Q06 94A60 PDF BibTeX XML Cite \textit{I. C. Oliveira} et al., Comput. Complexity 31, No. 1, Paper No. 4, 60 p. (2022; Zbl 07506816) Full Text: DOI
Chia, Nai-Hui; Chung, Kai-Min; Yamakawa, Takashi A black-box approach to post-quantum zero-knowledge in constant rounds. (English) Zbl 1486.94089 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12825, 315-345 (2021). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 81P94 68P25 PDF BibTeX XML Cite \textit{N.-H. Chia} et al., Lect. Notes Comput. Sci. 12825, 315--345 (2021; Zbl 1486.94089) Full Text: DOI arXiv
Kuryazov, D. M. Development of electronic digital signature algorithms with compound modules and their cryptanalysis. (English) Zbl 1483.94061 J. Discrete Math. Sci. Cryptography 24, No. 4, 1085-1099 (2021). MSC: 94A62 94A60 11Y05 PDF BibTeX XML Cite \textit{D. M. Kuryazov}, J. Discrete Math. Sci. Cryptography 24, No. 4, 1085--1099 (2021; Zbl 1483.94061) Full Text: DOI
Grilo, Alex B.; Lin, Huijia; Song, Fang; Vaikuntanathan, Vinod Oblivious transfer is in MiniQCrypt. (English) Zbl 1479.94182 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 531-561 (2021). MSC: 94A60 81P45 81P94 PDF BibTeX XML Cite \textit{A. B. Grilo} et al., Lect. Notes Comput. Sci. 12697, 531--561 (2021; Zbl 1479.94182) Full Text: DOI arXiv
Dutta, Sabyasachi; Sakurai, Kouichi Theory and application of computationally-independent one-way functions: interactive proof of ability – revisited. (English) Zbl 07388839 Giri, Debasis (ed.) et al., Proceedings of the fifth international conference on mathematics and computing, ICMC 2019, Bhubaneswar, India, February 6–9, 2019. Singapore: Springer. Adv. Intell. Syst. Comput. 1170, 97-109 (2021). MSC: 65-XX PDF BibTeX XML Cite \textit{S. Dutta} and \textit{K. Sakurai}, Adv. Intell. Syst. Comput. 1170, 97--109 (2021; Zbl 07388839) Full Text: DOI
Burrage, Kevin; Burrage, Pamela; MacNamara, Shev The reflectionless properties of Toeplitz waves and Hankel waves: an analysis via Bessel functions. (English) Zbl 1474.65419 Appl. Math. Comput. 389, Article ID 125576, 17 p. (2021). MSC: 65N06 15A60 65F99 65F60 33C10 15B05 PDF BibTeX XML Cite \textit{K. Burrage} et al., Appl. Math. Comput. 389, Article ID 125576, 17 p. (2021; Zbl 1474.65419) Full Text: DOI arXiv
Ball, Marshall; Boyle, Elette; Degwekar, Akshay; Deshpande, Apoorvaa; Rosen, Alon; Vaikuntanathan, Vinod; Vasudevan, Prashant Nalini Cryptography from information loss. (English) Zbl 07650429 Vidick, Thomas (ed.), 11th innovations in theoretical computer science conference, ITCS 2020, Seattle, Washington, USA, January 12–14, 2020. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 151, Article 81, 27 p. (2020). MSC: 68Qxx PDF BibTeX XML Cite \textit{M. Ball} et al., LIPIcs -- Leibniz Int. Proc. Inform. 151, Article 81, 27 p. (2020; Zbl 07650429) Full Text: DOI
Tutueva, Aleksandra V.; Karimov, Artur I.; Moysis, Lazaros; Volos, Christos; Butusov, Denis N. Construction of one-way hash functions with increased key space using adaptive chaotic maps. (English) Zbl 1496.94066 Chaos Solitons Fractals 141, Article ID 110344, 12 p. (2020). MSC: 94A60 37D45 PDF BibTeX XML Cite \textit{A. V. Tutueva} et al., Chaos Solitons Fractals 141, Article ID 110344, 12 p. (2020; Zbl 1496.94066) Full Text: DOI
Hubáček, Pavel; Kamath, Chethan; Král, Karel; Slívová, Veronika On average-case hardness in TFNP from one-way functions. (English) Zbl 1485.94092 Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12552, 614-638 (2020). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Hubáček} et al., Lect. Notes Comput. Sci. 12552, 614--638 (2020; Zbl 1485.94092) Full Text: DOI
Bitansky, Nir; Eizenstadt, Noa; Paneth, Omer Weakly extractable one-way functions. (English) Zbl 1479.94131 Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12550, 596-626 (2020). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Bitansky} et al., Lect. Notes Comput. Sci. 12550, 596--626 (2020; Zbl 1479.94131) Full Text: DOI
Hazay, Carmit; Pass, Rafael; Venkitasubramaniam, Muthuramakrishnan Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions? (English) Zbl 07436958 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12107, 599-619 (2020). MSC: 68P25 68Nxx 94A60 PDF BibTeX XML Cite \textit{C. Hazay} et al., Lect. Notes Comput. Sci. 12107, 599--619 (2020; Zbl 07436958) Full Text: DOI
Brier, Éric; Ferradi, Houda; Joye, Marc; Naccache, David New number-theoretic cryptographic primitives. (English) Zbl 1465.94059 J. Math. Cryptol. 14, 224-235 (2020). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 11T71 11A15 11R18 PDF BibTeX XML Cite \textit{É. Brier} et al., J. Math. Cryptol. 14, 224--235 (2020; Zbl 1465.94059) Full Text: DOI
Haitner, Iftach; Holenstein, Thomas; Reingold, Omer; Vadhan, Salil; Wee, Hoeteck Inaccessible entropy. II: IE functions and universal one-way hashing. (English) Zbl 1458.94177 Theory Comput. 16, Paper No. 8, 55 p. (2020). MSC: 94A17 94A60 PDF BibTeX XML Cite \textit{I. Haitner} et al., Theory Comput. 16, Paper No. 8, 55 p. (2020; Zbl 1458.94177) Full Text: DOI arXiv
Nobre, Juvêncio Santos; Singer, Julio M.; Batista, Maria J. Improved \(U\)-tests for variance components in one-way random effects models. (English) Zbl 1445.62120 Braz. J. Probab. Stat. 34, No. 3, 464-477 (2020). MSC: 62H15 62G30 62P10 PDF BibTeX XML Cite \textit{J. S. Nobre} et al., Braz. J. Probab. Stat. 34, No. 3, 464--477 (2020; Zbl 1445.62120) Full Text: DOI Euclid
Carboni, Oliveira Igor; Santhanam, Rahul; Tell, Roei Expander-based cryptography meets natural proofs. (English) Zbl 07559061 Blum, Avrim (ed.), 10th innovations in theoretical computer science conference, ITCS 2019, January 10–12, 2019, San Diego, CA, USA. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 124, Article 18, 14 p. (2019). MSC: 68Qxx PDF BibTeX XML Cite \textit{O. I. Carboni} et al., LIPIcs -- Leibniz Int. Proc. Inform. 124, Article 18, 14 p. (2019; Zbl 07559061) Full Text: DOI
Bitansky, Nir; Haitner, Iftach; Komargodski, Ilan; Yogev, Eylon Distributional collision resistance beyond one-way functions. (English) Zbl 1509.94066 Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11478, 667-695 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Bitansky} et al., Lect. Notes Comput. Sci. 11478, 667--695 (2019; Zbl 1509.94066) Full Text: DOI arXiv
Birget, J. C. Inverse monoids associated with the complexity class NP. (English) Zbl 1419.68053 Semigroup Forum 98, No. 2, 369-397 (2019). Reviewer: Jaak Henno (Tallinn) MSC: 68Q15 20M18 PDF BibTeX XML Cite \textit{J. C. Birget}, Semigroup Forum 98, No. 2, 369--397 (2019; Zbl 1419.68053) Full Text: DOI arXiv
Sakalauskas, Eligijus; Mihalkovich, Aleksejus MPF problem over modified medial semigroup is NP-complete. (English) Zbl 1423.94099 Symmetry 10, No. 11, Paper No. 571, 13 p. (2018). MSC: 94A60 68Q15 PDF BibTeX XML Cite \textit{E. Sakalauskas} and \textit{A. Mihalkovich}, Symmetry 10, No. 11, Paper No. 571, 13 p. (2018; Zbl 1423.94099) Full Text: DOI
Berman, Itay; Haitner, Iftach; Tentes, Aris Coin flipping of any constant bias implies one-way functions. (English) Zbl 1426.94083 J. ACM 65, No. 3, Article No. 14, 95 p. (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{I. Berman} et al., J. ACM 65, No. 3, Article No. 14, 95 p. (2018; Zbl 1426.94083) Full Text: DOI arXiv
Behera, Amit; Paul, Goutam Quantum to classical one-way function and its applications in quantum money authentication. (English) Zbl 1448.81279 Quantum Inf. Process. 17, No. 8, Paper No. 200, 24 p. (2018). MSC: 81P94 94A62 81P05 PDF BibTeX XML Cite \textit{A. Behera} and \textit{G. Paul}, Quantum Inf. Process. 17, No. 8, Paper No. 200, 24 p. (2018; Zbl 1448.81279) Full Text: DOI arXiv
Komargodski, Ilan Leakage resilient one-way functions: the auxiliary-input setting. (English) Zbl 1408.94942 Theor. Comput. Sci. 746, 6-18 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{I. Komargodski}, Theor. Comput. Sci. 746, 6--18 (2018; Zbl 1408.94942) Full Text: DOI
Fischlin, Marc; Harasser, Patrick Invisible sanitizable signatures and public-key encryption are equivalent. (English) Zbl 1440.94093 Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 202-220 (2018). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{M. Fischlin} and \textit{P. Harasser}, Lect. Notes Comput. Sci. 10892, 202--220 (2018; Zbl 1440.94093) Full Text: DOI
Yurischev, Mikhail A. Bimodal behavior of post-measured entropy and one-way quantum deficit for two-qubit X states. (English) Zbl 1395.81054 Quantum Inf. Process. 17, No. 1, Paper No. 6, 14 p. (2018). MSC: 81P40 81P16 81P15 94A17 PDF BibTeX XML Cite \textit{M. A. Yurischev}, Quantum Inf. Process. 17, No. 1, Paper No. 6, 14 p. (2018; Zbl 1395.81054) Full Text: DOI arXiv
Chen, Yu; Qin, Baodong; Xue, Haiyang Regular lossy functions and their applications in leakage-resilient cryptography. (English) Zbl 1408.94931 Theor. Comput. Sci. 739, 13-38 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Chen} et al., Theor. Comput. Sci. 739, 13--38 (2018; Zbl 1408.94931) Full Text: DOI
Hubáček, Pavel; Naor, Moni; Yogev, Eylon The journey from NP to TFNP hardness. (English) Zbl 1402.68067 Papadimitriou, Christos H. (ed.), 8th innovations in theoretical computer science conference, ITCS 2017, Berkeley, CA, USA, January 9–11, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-029-3). LIPIcs – Leibniz International Proceedings in Informatics 67, Article 60, 21 p. (2017). MSC: 68Q15 68Q17 68Q25 PDF BibTeX XML Cite \textit{P. Hubáček} et al., LIPIcs -- Leibniz Int. Proc. Inform. 67, Article 60, 21 p. (2017; Zbl 1402.68067) Full Text: DOI
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Goldwasser, Shafi; Lin, Huijia; Rubinstein, Aviad; Tromer, Eran The hunting of the SNARK. (English) Zbl 1386.94066 J. Cryptology 30, No. 4, 989-1066 (2017). MSC: 94A60 68Q05 68Q10 PDF BibTeX XML Cite \textit{N. Bitansky} et al., J. Cryptology 30, No. 4, 989--1066 (2017; Zbl 1386.94066) Full Text: DOI
Lu, Steve; Ostrovsky, Rafail Black-box parallel garbled RAM. (English) Zbl 1409.94893 Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10402, 66-92 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Lu} and \textit{R. Ostrovsky}, Lect. Notes Comput. Sci. 10402, 66--92 (2017; Zbl 1409.94893) Full Text: DOI
Applebaum, Benny; Moses, Yoni Locally computable UOWHF with linear shrinkage. (English) Zbl 1377.94028 J. Cryptology 30, No. 3, 672-698 (2017); correction ibid. 36, No. 2, Paper No. 5, 2 p. (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{B. Applebaum} and \textit{Y. Moses}, J. Cryptology 30, No. 3, 672--698 (2017; Zbl 1377.94028) Full Text: DOI
Anokhin, Mikhail Pseudo-free families of finite computational elementary abelian \(p\)-groups. (English) Zbl 1392.20045 Groups Complex. Cryptol. 9, No. 1, 1-18 (2017). MSC: 20K01 20D15 94A60 PDF BibTeX XML Cite \textit{M. Anokhin}, Groups Complex. Cryptol. 9, No. 1, 1--18 (2017; Zbl 1392.20045) Full Text: DOI
Holden, Joshua The mathematics of secrets. Cryptography from Caesar ciphers to digital encryption. (English) Zbl 1364.94002 Princeton, NJ: Princeton University Press (ISBN 978-0-691-14175-6/hbk; 978-1-4008-8562-6/ebook). xiv, 373 p. (2017). Reviewer: Jaak Henno (Tallinn) MSC: 94-01 94A60 PDF BibTeX XML Cite \textit{J. Holden}, The mathematics of secrets. Cryptography from Caesar ciphers to digital encryption. Princeton, NJ: Princeton University Press (2017; Zbl 1364.94002) Full Text: DOI
Berndt, Sebastian; Liśkiewicz, Maciej Hard communication channels for steganography. (English) Zbl 1398.94192 Seok-Hee Hong (ed.), 27th international symposium on algorithms and computation, ISAAC 2016, Sydney, Australia, December 12–14, 2016. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-026-2). LIPIcs – Leibniz International Proceedings in Informatics 64, Article 16, 13 p. (2016). MSC: 94A62 94A40 94A60 PDF BibTeX XML Cite \textit{S. Berndt} and \textit{M. Liśkiewicz}, LIPIcs -- Leibniz Int. Proc. Inform. 64, Article 16, 13 p. (2016; Zbl 1398.94192) Full Text: DOI
Hubáček, Pavel; Naor, Moni; Ullman, Jonathan When can limited randomness be used in repeated games? (English) Zbl 1356.91010 Theory Comput. Syst. 59, No. 4, 722-746 (2016). MSC: 91A20 91A28 65C10 PDF BibTeX XML Cite \textit{P. Hubáček} et al., Theory Comput. Syst. 59, No. 4, 722--746 (2016; Zbl 1356.91010) Full Text: DOI arXiv
Baldimtsi, Foteini; Kiayias, Aggelos; Zacharias, Thomas; Zhang, Bingsheng Indistinguishable proofs of work or knowledge. (English) Zbl 1407.94079 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 902-933 (2016). MSC: 94A60 68M11 PDF BibTeX XML Cite \textit{F. Baldimtsi} et al., Lect. Notes Comput. Sci. 10032, 902--933 (2016; Zbl 1407.94079) Full Text: DOI Link
Miller, Douglas; Scrivener, Adam; Stern, Jesse; Venkitasubramaniam, Muthuramakrishnan On negation complexity of injections, surjections and collision-resistance in cryptography. (English) Zbl 1411.94077 Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 345-363 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Miller} et al., Lect. Notes Comput. Sci. 10095, 345--363 (2016; Zbl 1411.94077) Full Text: DOI
Applebaum, Benny Cryptographic hardness of random local functions. Survey. (English) Zbl 1360.94293 Comput. Complexity 25, No. 3, 667-722 (2016). MSC: 94A60 68Q17 68P25 PDF BibTeX XML Cite \textit{B. Applebaum}, Comput. Complexity 25, No. 3, 667--722 (2016; Zbl 1360.94293) Full Text: DOI
Bitansky, Nir; Canetti, Ran; Paneth, Omer; Rosen, Alon On the existence of extractable one-way functions. (English) Zbl 1353.94039 SIAM J. Comput. 45, No. 5, 1910-1952 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Bitansky} et al., SIAM J. Comput. 45, No. 5, 1910--1952 (2016; Zbl 1353.94039) Full Text: DOI Link
Haitner, Iftach; Omri, Eran; Zarosim, Hila Limits on the usefulness of random oracles. (English) Zbl 1355.94060 J. Cryptology 29, No. 2, 283-335 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{I. Haitner} et al., J. Cryptology 29, No. 2, 283--335 (2016; Zbl 1355.94060) Full Text: DOI
Chung, Kai-Min; Pass, Rafael; Seth, Karn Non-black-box simulation from one-way functions and applications to resettable security. (English) Zbl 1384.94045 SIAM J. Comput. 45, No. 2, 415-458 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{K.-M. Chung} et al., SIAM J. Comput. 45, No. 2, 415--458 (2016; Zbl 1384.94045) Full Text: DOI
Chen, Yu; Qin, Baodong; Zhang, Jiang; Deng, Yi; Chow, Sherman S. M. Non-malleable functions and their applications. (English) Zbl 1395.94273 Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49386-1/pbk; 978-3-662-49387-8/ebook). Lecture Notes in Computer Science 9615, 386-416 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Chen} et al., Lect. Notes Comput. Sci. 9615, 386--416 (2016; Zbl 1395.94273) Full Text: DOI
Aggarwal, Divesh; Agrawal, Shashank; Gupta, Divya; Maji, Hemanta K.; Pandey, Omkant; Prabhakaran, Manoj Optimal computational split-state non-malleable codes. (English) Zbl 1382.94038 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 393-417 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Aggarwal} et al., Lect. Notes Comput. Sci. 9563, 393--417 (2016; Zbl 1382.94038) Full Text: DOI
Catalano, Dario; Fiore, Dario; Gennaro, Rosario; Vamvourellis, Konstantinos Algebraic (trapdoor) one-way functions: constructions and applications. (English) Zbl 1397.94053 Theor. Comput. Sci. 592, 143-165 (2015). MSC: 94A60 68M12 PDF BibTeX XML Cite \textit{D. Catalano} et al., Theor. Comput. Sci. 592, 143--165 (2015; Zbl 1397.94053) Full Text: DOI
Haitner, Iftach; Hoch, Jonathan J.; Reingold, Omer; Segev, Gil Finding collisions in interactive protocols – tight lower bounds on the round and communication complexities of statistically hiding commitments. (English) Zbl 1397.94068 SIAM J. Comput. 44, No. 1, 193-242 (2015). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{I. Haitner} et al., SIAM J. Comput. 44, No. 1, 193--242 (2015; Zbl 1397.94068) Full Text: DOI arXiv Link
Yu, Yu; Li, Xiangxue; Weng, Jian Pseudorandom generators from regular one-way functions: new constructions with improved parameters. (English) Zbl 1338.94088 Theor. Comput. Sci. 569, 58-69 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Yu} et al., Theor. Comput. Sci. 569, 58--69 (2015; Zbl 1338.94088) Full Text: DOI
Mahmoody, Mohammad; Maji, Hemanta K.; Prabhakaran, Manoj Limits of random oracles in secure computation (extended abstract). (English) Zbl 1364.68206 Proceedings of the 5th conference on innovations in theoretical computer science, ITCS’14, Princeton, NJ, USA, January 11–14, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2243-0). 23-33 (2014). MSC: 68Q05 68Q10 94A60 PDF BibTeX XML Cite \textit{M. Mahmoody} et al., in: Proceedings of the 5th conference on innovations in theoretical computer science, ITCS'14, Princeton, NJ, USA, January 11--14, 2014. New York, NY: Association for Computing Machinery (ACM). 23--33 (2014; Zbl 1364.68206) Full Text: DOI
Berman, Itay; Haitner, Iftach; Tentes, Aris Coin flipping of any constant bias implies one-way functions. (English) Zbl 1315.94055 Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 – June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 398-407 (2014). MSC: 94A60 68Q17 PDF BibTeX XML Cite \textit{I. Berman} et al., in: Proceedings of the 46th annual ACM symposium on theory of computing, STOC '14, New York, NY, USA, May 31 -- June 3, 2014. New York, NY: Association for Computing Machinery (ACM). 398--407 (2014; Zbl 1315.94055) Full Text: DOI
Grigoriev, Dima; Shpilrain, Vladimir Yao’s millionaires’ problem and decoy-based public key encryption by classical physics. (English) Zbl 1302.94049 Int. J. Found. Comput. Sci. 25, No. 4, 409-417 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Grigoriev} and \textit{V. Shpilrain}, Int. J. Found. Comput. Sci. 25, No. 4, 409--417 (2014; Zbl 1302.94049) Full Text: DOI arXiv
Baron, Joshua; Ishai, Yuval; Ostrovsky, Rafail On linear-size pseudorandom generators and hardcore functions. (English) Zbl 1384.94032 Theor. Comput. Sci. 554, 50-63 (2014). MSC: 94A60 11K45 68Q17 PDF BibTeX XML Cite \textit{J. Baron} et al., Theor. Comput. Sci. 554, 50--63 (2014; Zbl 1384.94032) Full Text: DOI
Haitner, Iftach; Omri, Eran Coin flipping with constant bias implies one-way functions. (English) Zbl 1302.94051 SIAM J. Comput. 43, No. 2, 389-409 (2014). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{I. Haitner} and \textit{E. Omri}, SIAM J. Comput. 43, No. 2, 389--409 (2014; Zbl 1302.94051) Full Text: DOI
Hong, Yicheng; Lee, Sungchul Kruskal-Wallis one-way analysis of variance based on linear placements. (English) Zbl 1308.60026 Bull. Korean Math. Soc. 51, No. 3, 701-716 (2014). Reviewer: Pavel Stoynov (Sofia) MSC: 60F05 62E20 62G20 60E05 60E10 PDF BibTeX XML Cite \textit{Y. Hong} and \textit{S. Lee}, Bull. Korean Math. Soc. 51, No. 3, 701--716 (2014; Zbl 1308.60026) Full Text: DOI Link
Dachman-Soled, Dana; Mahmoody, Mohammad; Malkin, Tal Can optimally-fair coin tossing be based on one-way functions? (English) Zbl 1323.94108 Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 217-239 (2014). MSC: 94A60 68Q15 PDF BibTeX XML Cite \textit{D. Dachman-Soled} et al., Lect. Notes Comput. Sci. 8349, 217--239 (2014; Zbl 1323.94108) Full Text: DOI
Chung, Kai-Min; Pass, Rafael; Seth, Karn Non-black-box simulation from one-way functions and applications to resettable security. (English) Zbl 1293.94059 Proceedings of the 45th annual ACM symposium on theory of computing, STOC ’13. Palo Alto, CA, USA, June 1–4, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2029-0). 231-240 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{K.-M. Chung} et al., in: Proceedings of the 45th annual ACM symposium on theory of computing, STOC '13. Palo Alto, CA, USA, June 1--4, 2013. New York, NY: Association for Computing Machinery (ACM). 231--240 (2013; Zbl 1293.94059) Full Text: DOI
Haitner, Iftach; Reingold, Omer; Vadhan, Salil Efficiency improvements in constructing pseudorandom generators from one-way functions. (English) Zbl 1343.94060 SIAM J. Comput. 42, No. 3, 1405-1430 (2013). MSC: 94A60 68P25 68Q85 65C10 PDF BibTeX XML Cite \textit{I. Haitner} et al., SIAM J. Comput. 42, No. 3, 1405--1430 (2013; Zbl 1343.94060) Full Text: DOI
Antunes, Luís; Matos, Armando; Pinto, Alexandre; Souto, André; Teixeira, Andreia One-way functions using algorithmic and classical information theories. (English) Zbl 1261.68074 Theory Comput. Syst. 52, No. 1, 162-178 (2013). MSC: 68Q30 94A17 PDF BibTeX XML Cite \textit{L. Antunes} et al., Theory Comput. Syst. 52, No. 1, 162--178 (2013; Zbl 1261.68074) Full Text: DOI Link
Hirsch, E. A.; Melanich, O.; Nikolenko, S. I. Feebly secure cryptographic primitives. (English. Russian original) Zbl 1262.94023 J. Math. Sci., New York 188, No. 1, 17-34 (2013); translation from Zap. Nauchn. Semin. POMI 399, 32-64 (2012). MSC: 94A60 94C10 PDF BibTeX XML Cite \textit{E. A. Hirsch} et al., J. Math. Sci., New York 188, No. 1, 17--34 (2013; Zbl 1262.94023); translation from Zap. Nauchn. Semin. POMI 399, 32--64 (2012) Full Text: DOI
Barhum, Kfir; Holenstein, Thomas A cookbook for black-box separations and a recipe for UOWHFs. (English) Zbl 1315.94053 Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 662-679 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{K. Barhum} and \textit{T. Holenstein}, Lect. Notes Comput. Sci. 7785, 662--679 (2013; Zbl 1315.94053) Full Text: DOI
Haitner, Iftach; Omri, Eran; Zarosim, Hila Limits on the usefulness of random oracles. (English) Zbl 1310.94150 Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 437-456 (2013). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{I. Haitner} et al., Lect. Notes Comput. Sci. 7785, 437--456 (2013; Zbl 1310.94150) Full Text: DOI
Omar, Sami; Ouni, Raouf; Bouanani, Saber Hashing with elliptic curve \(L\)-functions. (English) Zbl 1292.94123 Özbudak, Ferruh (ed.) et al., Arithmetic of finite fields. 4th international workshop, WAIFI 2012, Bochum, Germany, July 16–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31661-6/pbk). Lecture Notes in Computer Science 7369, 196-207 (2012). MSC: 94A60 14G50 PDF BibTeX XML Cite \textit{S. Omar} et al., Lect. Notes Comput. Sci. 7369, 196--207 (2012; Zbl 1292.94123) Full Text: DOI
Goldreich, Oded; Izsak, Rani Monotone circuits: one-way functions versus pseudorandom generators. (English) Zbl 1247.68099 Theory Comput. 8, Paper No. 10, 231-238 (2012). MSC: 68Q17 03D15 PDF BibTeX XML Cite \textit{O. Goldreich} and \textit{R. Izsak}, Theory Comput. 8, Paper No. 10, 231--238 (2012; Zbl 1247.68099) Full Text: DOI
Mahmoody, Mohammad; Pass, Rafael The curious case of non-interactive commitments – on the power of black-box vs. non-black-box use of primitives. (English) Zbl 1296.94131 Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 701-718 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Mahmoody} and \textit{R. Pass}, Lect. Notes Comput. Sci. 7417, 701--718 (2012; Zbl 1296.94131) Full Text: DOI
Barhum, Kfir; Maurer, Ueli UOWHFs from OWFs: trading regularity for efficiency. (English) Zbl 1304.94034 Hevia, Alejandro (ed.) et al., Progress in cryptology – LATINCRYPT 2012. 2nd international conference on cryptology and information security in Latin America, Santiago, Chile, October 7–10, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33480-1/pbk). Lecture Notes in Computer Science 7533, 234-253 (2012). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{K. Barhum} and \textit{U. Maurer}, Lect. Notes Comput. Sci. 7533, 234--253 (2012; Zbl 1304.94034) Full Text: DOI
Neupane, Kashi Two-party key establishment: from passive to active security without introducing new assumptions. (English) Zbl 1272.94054 Groups Complex. Cryptol. 4, No. 1, 1-17 (2012). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{K. Neupane}, Groups Complex. Cryptol. 4, No. 1, 1--17 (2012; Zbl 1272.94054) Full Text: DOI
Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian Quantum public-key cryptosystem. (English) Zbl 1243.81065 Int. J. Theor. Phys. 51, No. 3, 912-924 (2012). MSC: 81P94 94A60 PDF BibTeX XML Cite \textit{M.-X. Luo} et al., Int. J. Theor. Phys. 51, No. 3, 912--924 (2012; Zbl 1243.81065) Full Text: DOI
Agrawal, Manindra The isomorphism conjecture for NP. (English) Zbl 1269.68053 Cooper, S. Barry (ed.) et al., Computability in context. Computation and logic in the real world. London: Imperial College Press (ISBN 978-1-84816-245-7/hbk; 978-1-84816-277-8/ebook). 19-48 (2011). MSC: 68Q15 68-02 PDF BibTeX XML Cite \textit{M. Agrawal}, in: Computability in context. Computation and logic in the real world. London: Imperial College Press. 19--48 (2011; Zbl 1269.68053)
Li, Yi The normal meromorphic functions family concerning higher order derivative and shared set by one-way. (English) Zbl 1242.30028 Adv. Pure Math. 1, No. 6, 322-324 (2011). MSC: 30D45 PDF BibTeX XML Cite \textit{Y. Li}, Adv. Pure Math. 1, No. 6, 322--324 (2011; Zbl 1242.30028) Full Text: DOI
Haitner, Iftach; Harnik, Danny; Reingold, Omer On the power of the randomized iterate. (English) Zbl 1236.94055 SIAM J. Comput. 40, No. 6, 1486-1528 (2011). MSC: 94A60 PDF BibTeX XML Cite \textit{I. Haitner} et al., SIAM J. Comput. 40, No. 6, 1486--1528 (2011; Zbl 1236.94055) Full Text: DOI Link
Birget, J. C. On the circuit-size of inverses. (English) Zbl 1234.68128 Int. J. Found. Comput. Sci. 22, No. 8, 1925-1938 (2011). MSC: 68Q17 68Q15 PDF BibTeX XML Cite \textit{J. C. Birget}, Int. J. Found. Comput. Sci. 22, No. 8, 1925--1938 (2011; Zbl 1234.68128) Full Text: DOI
Goldreich, Oded; Nisan, Noam; Wigderson, Avi On Yao’s XOR-lemma. (English) Zbl 1304.68074 Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 273-301 (2011). MSC: 68Q25 62E99 68P30 68Q87 94A60 PDF BibTeX XML Cite \textit{O. Goldreich} et al., Lect. Notes Comput. Sci. 6650, 273--301 (2011; Zbl 1304.68074) Full Text: DOI
Goldreich, Oded Three XOR-lemmas – an exposition. (English) Zbl 1343.68112 Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 248-272 (2011). MSC: 68Q25 62E99 68P30 68Q87 PDF BibTeX XML Cite \textit{O. Goldreich}, Lect. Notes Comput. Sci. 6650, 248--272 (2011; Zbl 1343.68112) Full Text: DOI
Goldreich, Oded A candidate counterexample to the easy cylinders conjecture. (English) Zbl 1343.68083 Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 136-140 (2011). MSC: 68Q15 94A60 PDF BibTeX XML Cite \textit{O. Goldreich}, Lect. Notes Comput. Sci. 6650, 136--140 (2011; Zbl 1343.68083) Full Text: DOI
Goldreich, Oded Candidate one-way functions based on expander graphs. (English) Zbl 1306.94056 Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 76-87 (2011). MSC: 94A60 05C75 05C90 PDF BibTeX XML Cite \textit{O. Goldreich}, Lect. Notes Comput. Sci. 6650, 76--87 (2011; Zbl 1306.94056) Full Text: DOI
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai Collision-free hashing from lattice problems. (English) Zbl 1343.94055 Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 30-39 (2011). MSC: 94A60 11H06 PDF BibTeX XML Cite \textit{O. Goldreich} et al., Lect. Notes Comput. Sci. 6650, 30--39 (2011; Zbl 1343.94055) Full Text: DOI Link
Goldreich, Oded; Levin, Leonid A.; Nisan, Noam On constructing 1-1 one-way functions. (English) Zbl 1343.94056 Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 13-25 (2011). MSC: 94A60 PDF BibTeX XML Cite \textit{O. Goldreich} et al., Lect. Notes Comput. Sci. 6650, 13--25 (2011; Zbl 1343.94056) Full Text: DOI
Levin, V. Yu. Increasing the security of hash functions. (English. Russian original) Zbl 1223.94015 J. Math. Sci., New York 172, No. 5, 734-739 (2011); translation from Fundam. Prikl. Mat. 15, No. 5, 171-179 (2009). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{V. Yu. Levin}, J. Math. Sci., New York 172, No. 5, 734--739 (2011; Zbl 1223.94015); translation from Fundam. Prikl. Mat. 15, No. 5, 171--179 (2009) Full Text: DOI
Davydow, Alex; Nikolenko, Sergey I. Gate elimination for linear functions and new feebly secure constructions. (English) Zbl 1332.94064 Kulikov, Alexander (ed.) et al., Computer science – theory and applications. 6th international computer science symposium in Russia, CSR 2011, St. Petersburg, Russia, June 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20711-2/pbk). Lecture Notes in Computer Science 6651, 148-161 (2011). MSC: 94A60 68Q25 94C10 PDF BibTeX XML Cite \textit{A. Davydow} and \textit{S. I. Nikolenko}, Lect. Notes Comput. Sci. 6651, 148--161 (2011; Zbl 1332.94064) Full Text: DOI
De, Anindya; Trevisan, Luca; Tulsiani, Madhur Time space tradeoffs for attacks against one-way functions and PRGs. (English) Zbl 1283.94061 Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 649-665 (2010). MSC: 94A60 68Q25 PDF BibTeX XML Cite \textit{A. De} et al., Lect. Notes Comput. Sci. 6223, 649--665 (2010; Zbl 1283.94061) Full Text: DOI
Haitner, Iftach; Holenstein, Thomas; Reingold, Omer; Vadhan, Salil; Wee, Hoeteck Universal one-way hash functions via inaccessible entropy. (English) Zbl 1280.94065 Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 616-637 (2010). MSC: 94A60 PDF BibTeX XML Cite \textit{I. Haitner} et al., Lect. Notes Comput. Sci. 6110, 616--637 (2010; Zbl 1280.94065) Full Text: DOI
Haitner, Iftach; Reingold, Omer; Vadhan, Salil; Wee, Hoeteck Inaccessible entropy. (English) Zbl 1304.94014 Proceedings of the 41st annual ACM symposium on theory of computing, STOC ’09. Bethesda, MD, USA, May 31 – June 2, 2009. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-613-7). 611-620 (2009). MSC: 94A17 68Q25 94A60 PDF BibTeX XML Cite \textit{I. Haitner} et al., in: Proceedings of the 41st annual ACM symposium on theory of computing, STOC '09. Bethesda, MD, USA, May 31 -- June 2, 2009. New York, NY: Association for Computing Machinery (ACM). 611--620 (2009; Zbl 1304.94014) Full Text: DOI
Haitner, Iftach; Nguyen, Minh-Huyen; Ong, Shien Jin; Reingold, Omer; Vadhan, Salil Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function. (English) Zbl 1195.94057 SIAM J. Comput. 39, No. 3, 1153-1218 (2009). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 11T71 68P25 14G50 PDF BibTeX XML Cite \textit{I. Haitner} et al., SIAM J. Comput. 39, No. 3, 1153--1218 (2009; Zbl 1195.94057) Full Text: DOI Link
Goodrich, Michael T.; Sun, Jonathan Z.; Tamassia, Roberto; Triandopoulos, Nikos Reliable resource searching in P2P networks. (English) Zbl 1184.68114 Chen, Yan (ed.) et al., Security and privacy in communication networks. 5th international ICST conference, SecureComm 2009, Athens, Greece, September 14–18, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05283-5/pbk; 978-3-642-05284-2/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 19, 437-447 (2009). MSC: 68M15 68M10 PDF BibTeX XML Cite \textit{M. T. Goodrich} et al., in: Security and privacy in communication networks. 5th international ICST conference, SecureComm 2009, Athens, Greece, September 14--18, 2009. Revised selected papers. Berlin: Springer. 437--447 (2009; Zbl 1184.68114) Full Text: DOI
Cheong, K. Y.; Koshiba, Takeshi Reducing complexity assumptions for oblivious transfer. (English) Zbl 1287.94062 Takagi, Tsuyoshi (ed.) et al., Advances in information and computer security. 4th international workshop on security, IWSEC 2009, Toyama, Japan, October 28–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04845-6/pbk). Lecture Notes in Computer Science 5824, 110-124 (2009). MSC: 94A60 PDF BibTeX XML Cite \textit{K. Y. Cheong} and \textit{T. Koshiba}, Lect. Notes Comput. Sci. 5824, 110--124 (2009; Zbl 1287.94062) Full Text: DOI
Haitner, Iftach; Horvitz, Omer; Katz, Jonathan; Koo, Chiu-Yuen; Morselli, Ruggero; Shaltiel, Ronen Reducing complexity assumptions for statistically-hiding commitment. (English) Zbl 1173.94006 J. Cryptology 22, No. 3, 283-310 (2009). Reviewer: Jerzy Żurawiecki (Lublin) MSC: 94A60 94A62 68P25 PDF BibTeX XML Cite \textit{I. Haitner} et al., J. Cryptology 22, No. 3, 283--310 (2009; Zbl 1173.94006) Full Text: DOI
Haitner, Iftach; Holenstein, Thomas On the (im)possibility of key dependent encryption. (English) Zbl 1213.94105 Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 202-219 (2009). MSC: 94A60 PDF BibTeX XML Cite \textit{I. Haitner} and \textit{T. Holenstein}, Lect. Notes Comput. Sci. 5444, 202--219 (2009; Zbl 1213.94105) Full Text: DOI
Glukhov, M. M. Some applications of quasigroups in cryptography. (Russian. English summary) Zbl 1448.94198 Prikl. Diskretn. Mat. 2008, No. 2(2), 28-32 (2008). MSC: 94A60 94A62 20N05 PDF BibTeX XML Cite \textit{M. M. Glukhov}, Prikl. Diskretn. Mat. 2008, No. 2(2), 28--32 (2008; Zbl 1448.94198) Full Text: DOI MNR
Atani, Reza Ebrahimi; Atani, Shahabaddin Ebrahimi; Mirzakuchaki, Sattar Public key cryptography using semigroup actions and semirings. (English) Zbl 1206.94049 J. Discrete Math. Sci. Cryptography 11, No. 4, 437-445 (2008). MSC: 94A60 PDF BibTeX XML Cite \textit{R. E. Atani} et al., J. Discrete Math. Sci. Cryptography 11, No. 4, 437--445 (2008; Zbl 1206.94049) Full Text: DOI
Tartary, Christophe; Pieprzyk, Josef; Wang, Huaxiong Verifiable multi-secret sharing schemes for multiple threshold access structures. (English) Zbl 1166.94341 Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 167-181 (2008). MSC: 94A62 11A51 PDF BibTeX XML Cite \textit{C. Tartary} et al., Lect. Notes Comput. Sci. 4990, 167--181 (2008; Zbl 1166.94341) Full Text: DOI Link
Hemaspaandra, Lane A.; Rothe, Jörg; Saxena, Amitabh Enforcing and defying associativity, commutativity, totality, and strong noninvertibility for worst-case one-way functions. (English) Zbl 1146.68036 Theor. Comput. Sci. 401, No. 1-3, 27-35 (2008). MSC: 68Q15 PDF BibTeX XML Cite \textit{L. A. Hemaspaandra} et al., Theor. Comput. Sci. 401, No. 1--3, 27--35 (2008; Zbl 1146.68036) Full Text: DOI
Biham, Eli; Goren, Yaron J.; Ishai, Yuval Basing weak public-key cryptography on strong one-way functions. (English) Zbl 1162.94339 Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 55-72 (2008). MSC: 94A60 PDF BibTeX XML Cite \textit{E. Biham} et al., Lect. Notes Comput. Sci. 4948, 55--72 (2008; Zbl 1162.94339) Full Text: DOI
Micciancio, Daniele Generalized compact knapsacks, cyclic lattices, and efficient one-way functions. (English) Zbl 1133.68024 Comput. Complexity 16, No. 4, 365-411 (2007). MSC: 68Q17 11H06 94A60 94B15 PDF BibTeX XML Cite \textit{D. Micciancio}, Comput. Complexity 16, No. 4, 365--411 (2007; Zbl 1133.68024) Full Text: DOI
Ragulskis, Minvydas; Navickas, Zenonas Hash function construction based on time average moiré. (English) Zbl 1137.68365 Discrete Contin. Dyn. Syst., Ser. B 8, No. 4, 1007-1020 (2007). MSC: 68P25 68U10 94A08 PDF BibTeX XML Cite \textit{M. Ragulskis} and \textit{Z. Navickas}, Discrete Contin. Dyn. Syst., Ser. B 8, No. 4, 1007--1020 (2007; Zbl 1137.68365) Full Text: DOI
Maze, Gérard; Monico, Chris; Rosenthal, Joachim Public key cryptography based on semigroup actions. (English) Zbl 1194.94190 Adv. Math. Commun. 1, No. 4, 489-507 (2007). MSC: 94A60 11T71 16Y60 PDF BibTeX XML Cite \textit{G. Maze} et al., Adv. Math. Commun. 1, No. 4, 489--507 (2007; Zbl 1194.94190) Full Text: DOI arXiv
Kashefi, Elham; Kerenidis, Iordanis Statistical zero knowledge and quantum one-way functions. (English) Zbl 1118.68067 Theor. Comput. Sci. 378, No. 1, 101-116 (2007). MSC: 68Q10 68P25 81P68 PDF BibTeX XML Cite \textit{E. Kashefi} and \textit{I. Kerenidis}, Theor. Comput. Sci. 378, No. 1, 101--116 (2007; Zbl 1118.68067) Full Text: DOI arXiv Link
Akavia, Adi; Goldreich, Oded; Goldwasser, Shafi; Moshkovitz, Dana On basing one-way functions on NP-hardness. (English) Zbl 1302.68132 Kleinberg, Jon M. (ed.), Proceedings of the 38th annual ACM symposium on theory of computing, STOC 2006. Seattle, WA, USA, May 21–23, 2006. New York, NY: ACM Press (ISBN 1-59593-134-1). 701-710 (2006); erratum in: Proceedings of the 42nd annual ACM symposium on theory of computing, STOC ’10. Cambridge, MA, USA, June 5–8, 2010. New York, NY: Association for Computing Machinery (ACM). 795–796 (2010). MSC: 68Q25 68Q15 68Q17 68W20 94A60 PDF BibTeX XML Cite \textit{A. Akavia} et al., in: Proceedings of the 38th annual ACM symposium on theory of computing, STOC 2006. Seattle, WA, USA, May 21--23, 2006. New York, NY: ACM Press. 701--710 (2006; Zbl 1302.68132) Full Text: DOI
Bleistein, Norman; Zhang, Yu; Zhang, Guanquan Analysis of the neighborhood of a smooth caustic for true-amplitude one-way wave equations. (English) Zbl 1231.35108 Wave Motion 43, No. 4, 323-338 (2006). MSC: 35L05 35C20 35B40 PDF BibTeX XML Cite \textit{N. Bleistein} et al., Wave Motion 43, No. 4, 323--338 (2006; Zbl 1231.35108) Full Text: DOI
Mukhopadhyay, Debdeep; RoyChowdhury, Dipanwita Generation of expander graphs using cellular automata and its applications to cryptography. (English) Zbl 1155.68463 El Yacoubi, Samira (ed.) et al., Cellular automata. 7th international conference on cellular automata, for research and industry, ACRI 2006, Perpignan, France, September 20–23, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-40929-8/pbk). Lecture Notes in Computer Science 4173, 636-645 (2006). MSC: 68Q80 68R10 94A60 PDF BibTeX XML Cite \textit{D. Mukhopadhyay} and \textit{D. RoyChowdhury}, Lect. Notes Comput. Sci. 4173, 636--645 (2006; Zbl 1155.68463) Full Text: DOI
Kostenko, P. Yu.; Antonov, A. V.; Kostenko, T. P. Developing the concept of one-way functions for cryptographic security systems using achievements in chaotic dynamics. (English. Russian original) Zbl 1185.94054 Cybern. Syst. Anal. 42, No. 6, 884-891 (2006); translation from Kibern. Sist. Anal. 42, No. 6, 136-146 (2006). MSC: 94A60 37N99 PDF BibTeX XML Cite \textit{P. Yu. Kostenko} et al., Cybern. Syst. Anal. 42, No. 6, 884--891 (2006; Zbl 1185.94054); translation from Kibern. Sist. Anal. 42, No. 6, 136--146 (2006) Full Text: DOI
Hemaspaandra, Lane A.; Pasanen, Kari; Rothe, Jörg If P \(\neq\) NP then some strongly noninvertible functions are invertible. (English) Zbl 1100.68038 Theor. Comput. Sci. 362, No. 1-3, 54-62 (2006). MSC: 68Q17 68P25 68Q15 94A60 PDF BibTeX XML Cite \textit{L. A. Hemaspaandra} et al., Theor. Comput. Sci. 362, No. 1--3, 54--62 (2006; Zbl 1100.68038) Full Text: DOI
Chang, Yan-Cheng; Hsiao, Chun-Yuan; Lu, Chi-Jen The impossibility of basing one-way permutations on central cryptographic primitives. (English) Zbl 1096.94024 J. Cryptology 19, No. 1, 97-114 (2006). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{Y.-C. Chang} et al., J. Cryptology 19, No. 1, 97--114 (2006; Zbl 1096.94024) Full Text: DOI