Liu, Yanyi; Pass, Rafael On one-way functions and sparse languages. (English) Zbl 07890220 Rothblum, Guy (ed.) et al., Theory of cryptography. 21st international conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14369, 219-237 (2023). Reviewer: Janaka Alawatugoda (Pēradeniya) MSC: 94A17 68Q30 PDFBibTeX XMLCite \textit{Y. Liu} and \textit{R. Pass}, Lect. Notes Comput. Sci. 14369, 219--237 (2023; Zbl 07890220) Full Text: DOI
Amit, Noga; Rothblum, Guy N. Constant-round arguments from one-way functions. (English) Zbl 07844691 Saha, Barna (ed.) et al., Proceedings of the 55th annual ACM SIGACT symposium on theory of computing, STOC ’23, Orlando, FL, USA, June 20–23, 2023. New York, NY: Association for Computing Machinery (ACM). 1537-1544 (2023). MSC: 68Qxx PDFBibTeX XMLCite \textit{N. Amit} and \textit{G. N. Rothblum}, in: Proceedings of the 55th annual ACM SIGACT symposium on theory of computing, STOC '23, Orlando, FL, USA, June 20--23, 2023. New York, NY: Association for Computing Machinery (ACM). 1537--1544 (2023; Zbl 07844691) Full Text: DOI
Hirahara, Shuichi; Ilango, Rahul; Lu, Zhenjian; Nanashima, Mikito; Oliveira, Igor C. A duality between one-way functions and average-case symmetry of information. (English) Zbl 07844651 Saha, Barna (ed.) et al., Proceedings of the 55th annual ACM SIGACT symposium on theory of computing, STOC ’23, Orlando, FL, USA, June 20–23, 2023. New York, NY: Association for Computing Machinery (ACM). 1039-1050 (2023). MSC: 68Qxx PDFBibTeX XMLCite \textit{S. Hirahara} et al., in: Proceedings of the 55th annual ACM SIGACT symposium on theory of computing, STOC '23, Orlando, FL, USA, June 20--23, 2023. New York, NY: Association for Computing Machinery (ACM). 1039--1050 (2023; Zbl 07844651) Full Text: DOI
Hirahara, Shuichi Capturing one-way functions via NP-hardness of meta-complexity. (English) Zbl 07844650 Saha, Barna (ed.) et al., Proceedings of the 55th annual ACM SIGACT symposium on theory of computing, STOC ’23, Orlando, FL, USA, June 20–23, 2023. New York, NY: Association for Computing Machinery (ACM). 1027-1038 (2023). MSC: 68Qxx PDFBibTeX XMLCite \textit{S. Hirahara}, in: Proceedings of the 55th annual ACM SIGACT symposium on theory of computing, STOC '23, Orlando, FL, USA, June 20--23, 2023. New York, NY: Association for Computing Machinery (ACM). 1027--1038 (2023; Zbl 07844650) Full Text: DOI
Ye, Rendao; Du, Weixiao; Lu, Yiting Bootstrap inference for skew-normal unbalanced heteroscedastic one-way classification random effects model. (English) Zbl 07792787 J. Stat. Comput. Simulation 93, No. 15, 2672-2702 (2023). MSC: 62-XX 62F03 62F40 PDFBibTeX XMLCite \textit{R. Ye} et al., J. Stat. Comput. Simulation 93, No. 15, 2672--2702 (2023; Zbl 07792787) Full Text: DOI
Applebaum, Benny; Kachlon, Eliran; Patra, Arpita Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract). (English) Zbl 1519.94034 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 103-120 (2023). MSC: 94A60 68M14 68M25 PDFBibTeX XMLCite \textit{B. Applebaum} et al., Lect. Notes Comput. Sci. 13748, 103--120 (2023; Zbl 1519.94034) Full Text: DOI
Liu, Yanyi; Pass, Rafael On one-way functions from NP-complete problems. (English) Zbl 07877683 Lovett, Shachar (ed.), 37th computational complexity conference, CCC 2022, Philadelphia, PA, USA, July 20–23, 2022. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 234, Article 36, 24 p. (2022). MSC: 68Q25 PDFBibTeX XMLCite \textit{Y. Liu} and \textit{R. Pass}, LIPIcs -- Leibniz Int. Proc. Inform. 234, Article 36, 24 p. (2022; Zbl 07877683) Full Text: DOI
Ilango, Rahul; Ren, Hanlin; Santhanam, Rahul Robustness of average-case meta-complexity via pseudorandomness. (English) Zbl 07774439 Leonardi, Stefano (ed.) et al., Proceedings of the 54th annual ACM SIGACT symposium on theory of computing, STOC ’22, Rome, Italy June 20–24, 2022. New York, NY: Association for Computing Machinery (ACM). 1575-1583 (2022). MSC: 68Qxx PDFBibTeX XMLCite \textit{R. Ilango} et al., in: Proceedings of the 54th annual ACM SIGACT symposium on theory of computing, STOC '22, Rome, Italy June 20--24, 2022. New York, NY: Association for Computing Machinery (ACM). 1575--1583 (2022; Zbl 07774439) Full Text: DOI
Komargodski, Ilan; Moran, Tal; Naor, Moni; Pass, Rafael; Rosen, Alon; Yogev, Eylon One-way functions and (im)perfect obfuscation. (English) Zbl 1512.68084 SIAM J. Comput. 51, No. 6, 1769-1795 (2022). MSC: 68P25 68N30 68Q15 68Q17 94A60 PDFBibTeX XMLCite \textit{I. Komargodski} et al., SIAM J. Comput. 51, No. 6, 1769--1795 (2022; Zbl 1512.68084) Full Text: DOI
Chen, Hui-Min; Jia, Heng-Yue; Wu, Xia; Wang, Xiu-Li Transferable quantum cheque scheme based on quantum public-key cryptography. (English) Zbl 1502.81024 Int. J. Theor. Phys. 61, No. 8, Paper No. 210, 18 p. (2022). MSC: 81P94 81P70 81P47 94A62 PDFBibTeX XMLCite \textit{H.-M. Chen} et al., Int. J. Theor. Phys. 61, No. 8, Paper No. 210, 18 p. (2022; Zbl 1502.81024) Full Text: DOI
Oliveira, Igor C.; Santhanam, Rahul; Tell, Roei Expander-based cryptography meets natural proofs. (English) Zbl 07506816 Comput. Complexity 31, No. 1, Paper No. 4, 60 p. (2022). MSC: 94A60 68Q06 05C48 68R10 PDFBibTeX XMLCite \textit{I. C. Oliveira} et al., Comput. Complexity 31, No. 1, Paper No. 4, 60 p. (2022; Zbl 07506816) Full Text: DOI Link
Allender, Eric; Cheraghchi, Mahdi; Myrisiotis, Dimitrios; Tirumala, Harsha; Volkovich, Ilya One-way functions and a conditional variant of MKTP. (English) Zbl 07799585 Bojańczyk, Mikołaj (ed.) et al., 41st IARCS annual conference on foundations of software technology and theoretical computer science, FSTTCS 2021, virtual conference, December 15–17, 2021. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 213, Article 7, 19 p. (2021). MSC: 68N30 68Qxx PDFBibTeX XMLCite \textit{E. Allender} et al., LIPIcs -- Leibniz Int. Proc. Inform. 213, Article 7, 19 p. (2021; Zbl 07799585) Full Text: DOI
Liu, Yanyi; Pass, Rafael Cryptography from sublinear-time average-case hardness of time-bounded Kolmogorov complexity. (English) Zbl 07765205 Khuller, Samir (ed.) et al., Proceedings of the 53rd annual ACM SIGACT symposium on theory of computing, STOC ’21, virtual, Italy, June 21–25, 2021. New York, NY: Association for Computing Machinery (ACM). 722-735 (2021). MSC: 68Qxx PDFBibTeX XMLCite \textit{Y. Liu} and \textit{R. Pass}, in: Proceedings of the 53rd annual ACM SIGACT symposium on theory of computing, STOC '21, virtual, Italy, June 21--25, 2021. New York, NY: Association for Computing Machinery (ACM). 722--735 (2021; Zbl 07765205) Full Text: DOI
Chia, Nai-Hui; Chung, Kai-Min; Yamakawa, Takashi A black-box approach to post-quantum zero-knowledge in constant rounds. (English) Zbl 1486.94089 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12825, 315-345 (2021). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 81P94 68P25 PDFBibTeX XMLCite \textit{N.-H. Chia} et al., Lect. Notes Comput. Sci. 12825, 315--345 (2021; Zbl 1486.94089) Full Text: DOI arXiv
Kuryazov, D. M. Development of electronic digital signature algorithms with compound modules and their cryptanalysis. (English) Zbl 1483.94061 J. Discrete Math. Sci. Cryptography 24, No. 4, 1085-1099 (2021). MSC: 94A62 94A60 11Y05 PDFBibTeX XMLCite \textit{D. M. Kuryazov}, J. Discrete Math. Sci. Cryptography 24, No. 4, 1085--1099 (2021; Zbl 1483.94061) Full Text: DOI
Grilo, Alex B.; Lin, Huijia; Song, Fang; Vaikuntanathan, Vinod Oblivious transfer is in MiniQCrypt. (English) Zbl 1479.94182 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 531-561 (2021). MSC: 94A60 81P45 81P94 PDFBibTeX XMLCite \textit{A. B. Grilo} et al., Lect. Notes Comput. Sci. 12697, 531--561 (2021; Zbl 1479.94182) Full Text: DOI arXiv
Dutta, Sabyasachi; Sakurai, Kouichi Theory and application of computationally-independent one-way functions: interactive proof of ability – revisited. (English) Zbl 07388839 Giri, Debasis (ed.) et al., Proceedings of the fifth international conference on mathematics and computing, ICMC 2019, Bhubaneswar, India, February 6–9, 2019. Singapore: Springer. Adv. Intell. Syst. Comput. 1170, 97-109 (2021). MSC: 65-XX PDFBibTeX XMLCite \textit{S. Dutta} and \textit{K. Sakurai}, Adv. Intell. Syst. Comput. 1170, 97--109 (2021; Zbl 07388839) Full Text: DOI
Burrage, Kevin; Burrage, Pamela; MacNamara, Shev The reflectionless properties of Toeplitz waves and Hankel waves: an analysis via Bessel functions. (English) Zbl 1474.65419 Appl. Math. Comput. 389, Article ID 125576, 17 p. (2021). MSC: 65N06 15A60 65F99 65F60 33C10 15B05 PDFBibTeX XMLCite \textit{K. Burrage} et al., Appl. Math. Comput. 389, Article ID 125576, 17 p. (2021; Zbl 1474.65419) Full Text: DOI arXiv
Arvanitakis, Antonios I. A constitutive level-set model for shape memory alloys. (English) Zbl 1537.74285 Meccanica 55, No. 8, 1585-1601 (2020). MSC: 74M05 74N30 74F05 74A20 74A15 PDFBibTeX XMLCite \textit{A. I. Arvanitakis}, Meccanica 55, No. 8, 1585--1601 (2020; Zbl 1537.74285) Full Text: DOI
Ball, Marshall; Boyle, Elette; Degwekar, Akshay; Deshpande, Apoorvaa; Rosen, Alon; Vaikuntanathan, Vinod; Vasudevan, Prashant Nalini Cryptography from information loss. (English) Zbl 07650429 Vidick, Thomas (ed.), 11th innovations in theoretical computer science conference, ITCS 2020, Seattle, Washington, USA, January 12–14, 2020. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 151, Article 81, 27 p. (2020). MSC: 68Qxx PDFBibTeX XMLCite \textit{M. Ball} et al., LIPIcs -- Leibniz Int. Proc. Inform. 151, Article 81, 27 p. (2020; Zbl 07650429) Full Text: DOI
Tutueva, Aleksandra V.; Karimov, Artur I.; Moysis, Lazaros; Volos, Christos; Butusov, Denis N. Construction of one-way hash functions with increased key space using adaptive chaotic maps. (English) Zbl 1496.94066 Chaos Solitons Fractals 141, Article ID 110344, 12 p. (2020). MSC: 94A60 37D45 PDFBibTeX XMLCite \textit{A. V. Tutueva} et al., Chaos Solitons Fractals 141, Article ID 110344, 12 p. (2020; Zbl 1496.94066) Full Text: DOI
Hubáček, Pavel; Kamath, Chethan; Král, Karel; Slívová, Veronika On average-case hardness in TFNP from one-way functions. (English) Zbl 1485.94092 Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12552, 614-638 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Hubáček} et al., Lect. Notes Comput. Sci. 12552, 614--638 (2020; Zbl 1485.94092) Full Text: DOI
Bitansky, Nir; Eizenstadt, Noa; Paneth, Omer Weakly extractable one-way functions. (English) Zbl 1479.94131 Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12550, 596-626 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Bitansky} et al., Lect. Notes Comput. Sci. 12550, 596--626 (2020; Zbl 1479.94131) Full Text: DOI
Hazay, Carmit; Pass, Rafael; Venkitasubramaniam, Muthuramakrishnan Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions? (English) Zbl 1531.94063 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12107, 599-619 (2020). MSC: 94A60 68P25 68Q15 PDFBibTeX XMLCite \textit{C. Hazay} et al., Lect. Notes Comput. Sci. 12107, 599--619 (2020; Zbl 1531.94063) Full Text: DOI
Brier, Éric; Ferradi, Houda; Joye, Marc; Naccache, David New number-theoretic cryptographic primitives. (English) Zbl 1465.94059 J. Math. Cryptol. 14, 224-235 (2020). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 11T71 11A15 11R18 PDFBibTeX XMLCite \textit{É. Brier} et al., J. Math. Cryptol. 14, 224--235 (2020; Zbl 1465.94059) Full Text: DOI OA License
Haitner, Iftach; Holenstein, Thomas; Reingold, Omer; Vadhan, Salil; Wee, Hoeteck Inaccessible entropy. II: IE functions and universal one-way hashing. (English) Zbl 1458.94177 Theory Comput. 16, Paper No. 8, 55 p. (2020). MSC: 94A17 94A60 PDFBibTeX XMLCite \textit{I. Haitner} et al., Theory Comput. 16, Paper No. 8, 55 p. (2020; Zbl 1458.94177) Full Text: DOI arXiv OA License
Nobre, Juvêncio Santos; Singer, Julio M.; Batista, Maria J. Improved \(U\)-tests for variance components in one-way random effects models. (English) Zbl 1445.62120 Braz. J. Probab. Stat. 34, No. 3, 464-477 (2020). MSC: 62H15 62G30 62P10 PDFBibTeX XMLCite \textit{J. S. Nobre} et al., Braz. J. Probab. Stat. 34, No. 3, 464--477 (2020; Zbl 1445.62120) Full Text: DOI Euclid
Carboni, Oliveira Igor; Santhanam, Rahul; Tell, Roei Expander-based cryptography meets natural proofs. (English) Zbl 07559061 Blum, Avrim (ed.), 10th innovations in theoretical computer science conference, ITCS 2019, January 10–12, 2019, San Diego, CA, USA. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 124, Article 18, 14 p. (2019). MSC: 94A60 68Q06 68R10 05C48 PDFBibTeX XMLCite \textit{O. I. Carboni} et al., LIPIcs -- Leibniz Int. Proc. Inform. 124, Article 18, 14 p. (2019; Zbl 07559061) Full Text: DOI
Bitansky, Nir; Haitner, Iftach; Komargodski, Ilan; Yogev, Eylon Distributional collision resistance beyond one-way functions. (English) Zbl 1509.94066 Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11478, 667-695 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Bitansky} et al., Lect. Notes Comput. Sci. 11478, 667--695 (2019; Zbl 1509.94066) Full Text: DOI arXiv
Birget, J. C. Inverse monoids associated with the complexity class NP. (English) Zbl 1419.68053 Semigroup Forum 98, No. 2, 369-397 (2019). Reviewer: Jaak Henno (Tallinn) MSC: 68Q15 20M18 PDFBibTeX XMLCite \textit{J. C. Birget}, Semigroup Forum 98, No. 2, 369--397 (2019; Zbl 1419.68053) Full Text: DOI arXiv
Sakalauskas, Eligijus; Mihalkovich, Aleksejus MPF problem over modified medial semigroup is NP-complete. (English) Zbl 1423.94099 Symmetry 10, No. 11, Paper No. 571, 13 p. (2018). MSC: 94A60 68Q15 PDFBibTeX XMLCite \textit{E. Sakalauskas} and \textit{A. Mihalkovich}, Symmetry 10, No. 11, Paper No. 571, 13 p. (2018; Zbl 1423.94099) Full Text: DOI OA License
Berman, Itay; Haitner, Iftach; Tentes, Aris Coin flipping of any constant bias implies one-way functions. (English) Zbl 1426.94083 J. ACM 65, No. 3, Article No. 14, 95 p. (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Berman} et al., J. ACM 65, No. 3, Article No. 14, 95 p. (2018; Zbl 1426.94083) Full Text: DOI arXiv
Behera, Amit; Paul, Goutam Quantum to classical one-way function and its applications in quantum money authentication. (English) Zbl 1448.81279 Quantum Inf. Process. 17, No. 8, Paper No. 200, 24 p. (2018). MSC: 81P94 94A62 81P05 PDFBibTeX XMLCite \textit{A. Behera} and \textit{G. Paul}, Quantum Inf. Process. 17, No. 8, Paper No. 200, 24 p. (2018; Zbl 1448.81279) Full Text: DOI arXiv
Komargodski, Ilan Leakage resilient one-way functions: the auxiliary-input setting. (English) Zbl 1408.94942 Theor. Comput. Sci. 746, 6-18 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Komargodski}, Theor. Comput. Sci. 746, 6--18 (2018; Zbl 1408.94942) Full Text: DOI
Fischlin, Marc; Harasser, Patrick Invisible sanitizable signatures and public-key encryption are equivalent. (English) Zbl 1440.94093 Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 202-220 (2018). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{M. Fischlin} and \textit{P. Harasser}, Lect. Notes Comput. Sci. 10892, 202--220 (2018; Zbl 1440.94093) Full Text: DOI
Yurischev, Mikhail A. Bimodal behavior of post-measured entropy and one-way quantum deficit for two-qubit X states. (English) Zbl 1395.81054 Quantum Inf. Process. 17, No. 1, Paper No. 6, 14 p. (2018). MSC: 81P40 81P16 81P15 94A17 PDFBibTeX XMLCite \textit{M. A. Yurischev}, Quantum Inf. Process. 17, No. 1, Paper No. 6, 14 p. (2018; Zbl 1395.81054) Full Text: DOI arXiv
Chen, Yu; Qin, Baodong; Xue, Haiyang Regular lossy functions and their applications in leakage-resilient cryptography. (English) Zbl 1408.94931 Theor. Comput. Sci. 739, 13-38 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Chen} et al., Theor. Comput. Sci. 739, 13--38 (2018; Zbl 1408.94931) Full Text: DOI
Hubáček, Pavel; Naor, Moni; Yogev, Eylon The journey from NP to TFNP hardness. (English) Zbl 1402.68067 Papadimitriou, Christos H. (ed.), 8th innovations in theoretical computer science conference, ITCS 2017, Berkeley, CA, USA, January 9–11, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-029-3). LIPIcs – Leibniz International Proceedings in Informatics 67, Article 60, 21 p. (2017). MSC: 68Q15 68Q17 68Q25 PDFBibTeX XMLCite \textit{P. Hubáček} et al., LIPIcs -- Leibniz Int. Proc. Inform. 67, Article 60, 21 p. (2017; Zbl 1402.68067) Full Text: DOI
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Goldwasser, Shafi; Lin, Huijia; Rubinstein, Aviad; Tromer, Eran The hunting of the SNARK. (English) Zbl 1386.94066 J. Cryptology 30, No. 4, 989-1066 (2017). MSC: 94A60 68Q05 68Q10 PDFBibTeX XMLCite \textit{N. Bitansky} et al., J. Cryptology 30, No. 4, 989--1066 (2017; Zbl 1386.94066) Full Text: DOI
Lu, Steve; Ostrovsky, Rafail Black-box parallel garbled RAM. (English) Zbl 1409.94893 Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10402, 66-92 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Lu} and \textit{R. Ostrovsky}, Lect. Notes Comput. Sci. 10402, 66--92 (2017; Zbl 1409.94893) Full Text: DOI
Applebaum, Benny; Moses, Yoni Locally computable UOWHF with linear shrinkage. (English) Zbl 1377.94028 J. Cryptology 30, No. 3, 672-698 (2017); correction ibid. 36, No. 2, Paper No. 5, 2 p. (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Applebaum} and \textit{Y. Moses}, J. Cryptology 30, No. 3, 672--698 (2017; Zbl 1377.94028) Full Text: DOI
Anokhin, Mikhail Pseudo-free families of finite computational elementary abelian \(p\)-groups. (English) Zbl 1392.20045 Groups Complex. Cryptol. 9, No. 1, 1-18 (2017). MSC: 20K01 20D15 94A60 PDFBibTeX XMLCite \textit{M. Anokhin}, Groups Complex. Cryptol. 9, No. 1, 1--18 (2017; Zbl 1392.20045) Full Text: DOI
Holden, Joshua The mathematics of secrets. Cryptography from Caesar ciphers to digital encryption. (English) Zbl 1364.94002 Princeton, NJ: Princeton University Press (ISBN 978-0-691-14175-6/hbk; 978-1-4008-8562-6/ebook). xiv, 373 p. (2017). Reviewer: Jaak Henno (Tallinn) MSC: 94-01 94A60 PDFBibTeX XMLCite \textit{J. Holden}, The mathematics of secrets. Cryptography from Caesar ciphers to digital encryption. Princeton, NJ: Princeton University Press (2017; Zbl 1364.94002) Full Text: DOI
Berndt, Sebastian; Liśkiewicz, Maciej Hard communication channels for steganography. (English) Zbl 1398.94192 Seok-Hee Hong (ed.), 27th international symposium on algorithms and computation, ISAAC 2016, Sydney, Australia, December 12–14, 2016. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-026-2). LIPIcs – Leibniz International Proceedings in Informatics 64, Article 16, 13 p. (2016). MSC: 94A62 94A40 94A60 PDFBibTeX XMLCite \textit{S. Berndt} and \textit{M. Liśkiewicz}, LIPIcs -- Leibniz Int. Proc. Inform. 64, Article 16, 13 p. (2016; Zbl 1398.94192) Full Text: DOI
Hubáček, Pavel; Naor, Moni; Ullman, Jonathan When can limited randomness be used in repeated games? (English) Zbl 1356.91010 Theory Comput. Syst. 59, No. 4, 722-746 (2016). MSC: 91A20 91A28 65C10 PDFBibTeX XMLCite \textit{P. Hubáček} et al., Theory Comput. Syst. 59, No. 4, 722--746 (2016; Zbl 1356.91010) Full Text: DOI arXiv
Baldimtsi, Foteini; Kiayias, Aggelos; Zacharias, Thomas; Zhang, Bingsheng Indistinguishable proofs of work or knowledge. (English) Zbl 1407.94079 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 902-933 (2016). MSC: 94A60 68M11 PDFBibTeX XMLCite \textit{F. Baldimtsi} et al., Lect. Notes Comput. Sci. 10032, 902--933 (2016; Zbl 1407.94079) Full Text: DOI Link
Miller, Douglas; Scrivener, Adam; Stern, Jesse; Venkitasubramaniam, Muthuramakrishnan On negation complexity of injections, surjections and collision-resistance in cryptography. (English) Zbl 1411.94077 Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 345-363 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Miller} et al., Lect. Notes Comput. Sci. 10095, 345--363 (2016; Zbl 1411.94077) Full Text: DOI
Applebaum, Benny Cryptographic hardness of random local functions. Survey. (English) Zbl 1360.94293 Comput. Complexity 25, No. 3, 667-722 (2016). MSC: 94A60 68Q17 68P25 PDFBibTeX XMLCite \textit{B. Applebaum}, Comput. Complexity 25, No. 3, 667--722 (2016; Zbl 1360.94293) Full Text: DOI
Bitansky, Nir; Canetti, Ran; Paneth, Omer; Rosen, Alon On the existence of extractable one-way functions. (English) Zbl 1353.94039 SIAM J. Comput. 45, No. 5, 1910-1952 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Bitansky} et al., SIAM J. Comput. 45, No. 5, 1910--1952 (2016; Zbl 1353.94039) Full Text: DOI Link
Haitner, Iftach; Omri, Eran; Zarosim, Hila Limits on the usefulness of random oracles. (English) Zbl 1355.94060 J. Cryptology 29, No. 2, 283-335 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Haitner} et al., J. Cryptology 29, No. 2, 283--335 (2016; Zbl 1355.94060) Full Text: DOI
Chung, Kai-Min; Pass, Rafael; Seth, Karn Non-black-box simulation from one-way functions and applications to resettable security. (English) Zbl 1384.94045 SIAM J. Comput. 45, No. 2, 415-458 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{K.-M. Chung} et al., SIAM J. Comput. 45, No. 2, 415--458 (2016; Zbl 1384.94045) Full Text: DOI
Chen, Yu; Qin, Baodong; Zhang, Jiang; Deng, Yi; Chow, Sherman S. M. Non-malleable functions and their applications. (English) Zbl 1395.94273 Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49386-1/pbk; 978-3-662-49387-8/ebook). Lecture Notes in Computer Science 9615, 386-416 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Chen} et al., Lect. Notes Comput. Sci. 9615, 386--416 (2016; Zbl 1395.94273) Full Text: DOI
Aggarwal, Divesh; Agrawal, Shashank; Gupta, Divya; Maji, Hemanta K.; Pandey, Omkant; Prabhakaran, Manoj Optimal computational split-state non-malleable codes. (English) Zbl 1382.94038 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 393-417 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Aggarwal} et al., Lect. Notes Comput. Sci. 9563, 393--417 (2016; Zbl 1382.94038) Full Text: DOI
Catalano, Dario; Fiore, Dario; Gennaro, Rosario; Vamvourellis, Konstantinos Algebraic (trapdoor) one-way functions: constructions and applications. (English) Zbl 1397.94053 Theor. Comput. Sci. 592, 143-165 (2015). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{D. Catalano} et al., Theor. Comput. Sci. 592, 143--165 (2015; Zbl 1397.94053) Full Text: DOI
Haitner, Iftach; Hoch, Jonathan J.; Reingold, Omer; Segev, Gil Finding collisions in interactive protocols – tight lower bounds on the round and communication complexities of statistically hiding commitments. (English) Zbl 1397.94068 SIAM J. Comput. 44, No. 1, 193-242 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{I. Haitner} et al., SIAM J. Comput. 44, No. 1, 193--242 (2015; Zbl 1397.94068) Full Text: DOI arXiv Link
Yu, Yu; Li, Xiangxue; Weng, Jian Pseudorandom generators from regular one-way functions: new constructions with improved parameters. (English) Zbl 1338.94088 Theor. Comput. Sci. 569, 58-69 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Yu} et al., Theor. Comput. Sci. 569, 58--69 (2015; Zbl 1338.94088) Full Text: DOI
Mahmoody, Mohammad; Maji, Hemanta K.; Prabhakaran, Manoj Limits of random oracles in secure computation (extended abstract). (English) Zbl 1364.68206 Proceedings of the 5th conference on innovations in theoretical computer science, ITCS’14, Princeton, NJ, USA, January 11–14, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2243-0). 23-33 (2014). MSC: 68Q05 68Q10 94A60 PDFBibTeX XMLCite \textit{M. Mahmoody} et al., in: Proceedings of the 5th conference on innovations in theoretical computer science, ITCS'14, Princeton, NJ, USA, January 11--14, 2014. New York, NY: Association for Computing Machinery (ACM). 23--33 (2014; Zbl 1364.68206) Full Text: DOI
Berman, Itay; Haitner, Iftach; Tentes, Aris Coin flipping of any constant bias implies one-way functions. (English) Zbl 1315.94055 Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 – June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 398-407 (2014). MSC: 94A60 68Q17 PDFBibTeX XMLCite \textit{I. Berman} et al., in: Proceedings of the 46th annual ACM symposium on theory of computing, STOC '14, New York, NY, USA, May 31 -- June 3, 2014. New York, NY: Association for Computing Machinery (ACM). 398--407 (2014; Zbl 1315.94055) Full Text: DOI
Grigoriev, Dima; Shpilrain, Vladimir Yao’s millionaires’ problem and decoy-based public key encryption by classical physics. (English) Zbl 1302.94049 Int. J. Found. Comput. Sci. 25, No. 4, 409-417 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Grigoriev} and \textit{V. Shpilrain}, Int. J. Found. Comput. Sci. 25, No. 4, 409--417 (2014; Zbl 1302.94049) Full Text: DOI arXiv
Baron, Joshua; Ishai, Yuval; Ostrovsky, Rafail On linear-size pseudorandom generators and hardcore functions. (English) Zbl 1384.94032 Theor. Comput. Sci. 554, 50-63 (2014). MSC: 94A60 11K45 68Q17 PDFBibTeX XMLCite \textit{J. Baron} et al., Theor. Comput. Sci. 554, 50--63 (2014; Zbl 1384.94032) Full Text: DOI
Haitner, Iftach; Omri, Eran Coin flipping with constant bias implies one-way functions. (English) Zbl 1302.94051 SIAM J. Comput. 43, No. 2, 389-409 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{I. Haitner} and \textit{E. Omri}, SIAM J. Comput. 43, No. 2, 389--409 (2014; Zbl 1302.94051) Full Text: DOI
Hong, Yicheng; Lee, Sungchul Kruskal-Wallis one-way analysis of variance based on linear placements. (English) Zbl 1308.60026 Bull. Korean Math. Soc. 51, No. 3, 701-716 (2014). Reviewer: Pavel Stoynov (Sofia) MSC: 60F05 62E20 62G20 60E05 60E10 PDFBibTeX XMLCite \textit{Y. Hong} and \textit{S. Lee}, Bull. Korean Math. Soc. 51, No. 3, 701--716 (2014; Zbl 1308.60026) Full Text: DOI Link
Dachman-Soled, Dana; Mahmoody, Mohammad; Malkin, Tal Can optimally-fair coin tossing be based on one-way functions? (English) Zbl 1323.94108 Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 217-239 (2014). MSC: 94A60 68Q15 PDFBibTeX XMLCite \textit{D. Dachman-Soled} et al., Lect. Notes Comput. Sci. 8349, 217--239 (2014; Zbl 1323.94108) Full Text: DOI
Chung, Kai-Min; Pass, Rafael; Seth, Karn Non-black-box simulation from one-way functions and applications to resettable security. (English) Zbl 1293.94059 Proceedings of the 45th annual ACM symposium on theory of computing, STOC ’13. Palo Alto, CA, USA, June 1–4, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2029-0). 231-240 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{K.-M. Chung} et al., in: Proceedings of the 45th annual ACM symposium on theory of computing, STOC '13. Palo Alto, CA, USA, June 1--4, 2013. New York, NY: Association for Computing Machinery (ACM). 231--240 (2013; Zbl 1293.94059) Full Text: DOI
Haitner, Iftach; Reingold, Omer; Vadhan, Salil Efficiency improvements in constructing pseudorandom generators from one-way functions. (English) Zbl 1343.94060 SIAM J. Comput. 42, No. 3, 1405-1430 (2013). MSC: 94A60 68P25 68Q85 65C10 PDFBibTeX XMLCite \textit{I. Haitner} et al., SIAM J. Comput. 42, No. 3, 1405--1430 (2013; Zbl 1343.94060) Full Text: DOI Link
Antunes, Luís; Matos, Armando; Pinto, Alexandre; Souto, André; Teixeira, Andreia One-way functions using algorithmic and classical information theories. (English) Zbl 1261.68074 Theory Comput. Syst. 52, No. 1, 162-178 (2013). MSC: 68Q30 94A17 PDFBibTeX XMLCite \textit{L. Antunes} et al., Theory Comput. Syst. 52, No. 1, 162--178 (2013; Zbl 1261.68074) Full Text: DOI Link
Hirsch, E. A.; Melanich, O.; Nikolenko, S. I. Feebly secure cryptographic primitives. (English. Russian original) Zbl 1262.94023 J. Math. Sci., New York 188, No. 1, 17-34 (2013); translation from Zap. Nauchn. Semin. POMI 399, 32-64 (2012). MSC: 94A60 94C10 PDFBibTeX XMLCite \textit{E. A. Hirsch} et al., J. Math. Sci., New York 188, No. 1, 17--34 (2013; Zbl 1262.94023); translation from Zap. Nauchn. Semin. POMI 399, 32--64 (2012) Full Text: DOI
Barhum, Kfir; Holenstein, Thomas A cookbook for black-box separations and a recipe for UOWHFs. (English) Zbl 1315.94053 Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 662-679 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Barhum} and \textit{T. Holenstein}, Lect. Notes Comput. Sci. 7785, 662--679 (2013; Zbl 1315.94053) Full Text: DOI
Haitner, Iftach; Omri, Eran; Zarosim, Hila Limits on the usefulness of random oracles. (English) Zbl 1310.94150 Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 437-456 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{I. Haitner} et al., Lect. Notes Comput. Sci. 7785, 437--456 (2013; Zbl 1310.94150) Full Text: DOI
Omar, Sami; Ouni, Raouf; Bouanani, Saber Hashing with elliptic curve \(L\)-functions. (English) Zbl 1292.94123 Özbudak, Ferruh (ed.) et al., Arithmetic of finite fields. 4th international workshop, WAIFI 2012, Bochum, Germany, July 16–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31661-6/pbk). Lecture Notes in Computer Science 7369, 196-207 (2012). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{S. Omar} et al., Lect. Notes Comput. Sci. 7369, 196--207 (2012; Zbl 1292.94123) Full Text: DOI
Goldreich, Oded; Izsak, Rani Monotone circuits: one-way functions versus pseudorandom generators. (English) Zbl 1247.68099 Theory Comput. 8, Paper No. 10, 231-238 (2012). MSC: 68Q17 03D15 PDFBibTeX XMLCite \textit{O. Goldreich} and \textit{R. Izsak}, Theory Comput. 8, Paper No. 10, 231--238 (2012; Zbl 1247.68099) Full Text: DOI OA License
Mahmoody, Mohammad; Pass, Rafael The curious case of non-interactive commitments – on the power of black-box vs. non-black-box use of primitives. (English) Zbl 1296.94131 Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 701-718 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Mahmoody} and \textit{R. Pass}, Lect. Notes Comput. Sci. 7417, 701--718 (2012; Zbl 1296.94131) Full Text: DOI
Barhum, Kfir; Maurer, Ueli UOWHFs from OWFs: trading regularity for efficiency. (English) Zbl 1304.94034 Hevia, Alejandro (ed.) et al., Progress in cryptology – LATINCRYPT 2012. 2nd international conference on cryptology and information security in Latin America, Santiago, Chile, October 7–10, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33480-1/pbk). Lecture Notes in Computer Science 7533, 234-253 (2012). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Barhum} and \textit{U. Maurer}, Lect. Notes Comput. Sci. 7533, 234--253 (2012; Zbl 1304.94034) Full Text: DOI
Neupane, Kashi Two-party key establishment: from passive to active security without introducing new assumptions. (English) Zbl 1272.94054 Groups Complex. Cryptol. 4, No. 1, 1-17 (2012). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Neupane}, Groups Complex. Cryptol. 4, No. 1, 1--17 (2012; Zbl 1272.94054) Full Text: DOI
Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian Quantum public-key cryptosystem. (English) Zbl 1243.81065 Int. J. Theor. Phys. 51, No. 3, 912-924 (2012). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{M.-X. Luo} et al., Int. J. Theor. Phys. 51, No. 3, 912--924 (2012; Zbl 1243.81065) Full Text: DOI
Agrawal, Manindra The isomorphism conjecture for NP. (English) Zbl 1269.68053 Cooper, S. Barry (ed.) et al., Computability in context. Computation and logic in the real world. London: Imperial College Press (ISBN 978-1-84816-245-7/hbk; 978-1-84816-277-8/ebook). 19-48 (2011). MSC: 68Q15 68-02 PDFBibTeX XMLCite \textit{M. Agrawal}, in: Computability in context. Computation and logic in the real world. London: Imperial College Press. 19--48 (2011; Zbl 1269.68053)
Li, Yi The normal meromorphic functions family concerning higher order derivative and shared set by one-way. (English) Zbl 1242.30028 Adv. Pure Math. 1, No. 6, 322-324 (2011). MSC: 30D45 PDFBibTeX XMLCite \textit{Y. Li}, Adv. Pure Math. 1, No. 6, 322--324 (2011; Zbl 1242.30028) Full Text: DOI
Haitner, Iftach; Harnik, Danny; Reingold, Omer On the power of the randomized iterate. (English) Zbl 1236.94055 SIAM J. Comput. 40, No. 6, 1486-1528 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Haitner} et al., SIAM J. Comput. 40, No. 6, 1486--1528 (2011; Zbl 1236.94055) Full Text: DOI Link
Birget, J. C. On the circuit-size of inverses. (English) Zbl 1234.68128 Int. J. Found. Comput. Sci. 22, No. 8, 1925-1938 (2011). MSC: 68Q17 68Q15 PDFBibTeX XMLCite \textit{J. C. Birget}, Int. J. Found. Comput. Sci. 22, No. 8, 1925--1938 (2011; Zbl 1234.68128) Full Text: DOI
Goldreich, Oded; Nisan, Noam; Wigderson, Avi On Yao’s XOR-lemma. (English) Zbl 1304.68074 Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 273-301 (2011). MSC: 68Q25 62E99 68P30 68Q87 94A60 PDFBibTeX XMLCite \textit{O. Goldreich} et al., Lect. Notes Comput. Sci. 6650, 273--301 (2011; Zbl 1304.68074) Full Text: DOI
Goldreich, Oded Three XOR-lemmas – an exposition. (English) Zbl 1343.68112 Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 248-272 (2011). MSC: 68Q25 62E99 68P30 68Q87 PDFBibTeX XMLCite \textit{O. Goldreich}, Lect. Notes Comput. Sci. 6650, 248--272 (2011; Zbl 1343.68112) Full Text: DOI
Goldreich, Oded A candidate counterexample to the easy cylinders conjecture. (English) Zbl 1343.68083 Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 136-140 (2011). MSC: 68Q15 94A60 PDFBibTeX XMLCite \textit{O. Goldreich}, Lect. Notes Comput. Sci. 6650, 136--140 (2011; Zbl 1343.68083) Full Text: DOI
Goldreich, Oded Candidate one-way functions based on expander graphs. (English) Zbl 1306.94056 Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 76-87 (2011). MSC: 94A60 05C75 05C90 PDFBibTeX XMLCite \textit{O. Goldreich}, Lect. Notes Comput. Sci. 6650, 76--87 (2011; Zbl 1306.94056) Full Text: DOI
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai Collision-free hashing from lattice problems. (English) Zbl 1343.94055 Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 30-39 (2011). MSC: 94A60 11H06 PDFBibTeX XMLCite \textit{O. Goldreich} et al., Lect. Notes Comput. Sci. 6650, 30--39 (2011; Zbl 1343.94055) Full Text: DOI Link
Goldreich, Oded; Levin, Leonid A.; Nisan, Noam On constructing 1-1 one-way functions. (English) Zbl 1343.94056 Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 13-25 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{O. Goldreich} et al., Lect. Notes Comput. Sci. 6650, 13--25 (2011; Zbl 1343.94056) Full Text: DOI
Levin, V. Yu. Increasing the security of hash functions. (English. Russian original) Zbl 1223.94015 J. Math. Sci., New York 172, No. 5, 734-739 (2011); translation from Fundam. Prikl. Mat. 15, No. 5, 171-179 (2009). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{V. Yu. Levin}, J. Math. Sci., New York 172, No. 5, 734--739 (2011; Zbl 1223.94015); translation from Fundam. Prikl. Mat. 15, No. 5, 171--179 (2009) Full Text: DOI
Davydow, Alex; Nikolenko, Sergey I. Gate elimination for linear functions and new feebly secure constructions. (English) Zbl 1332.94064 Kulikov, Alexander (ed.) et al., Computer science – theory and applications. 6th international computer science symposium in Russia, CSR 2011, St. Petersburg, Russia, June 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20711-2/pbk). Lecture Notes in Computer Science 6651, 148-161 (2011). MSC: 94A60 68Q25 94C10 PDFBibTeX XMLCite \textit{A. Davydow} and \textit{S. I. Nikolenko}, Lect. Notes Comput. Sci. 6651, 148--161 (2011; Zbl 1332.94064) Full Text: DOI
De, Anindya; Trevisan, Luca; Tulsiani, Madhur Time space tradeoffs for attacks against one-way functions and PRGs. (English) Zbl 1283.94061 Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 649-665 (2010). MSC: 94A60 68Q25 PDFBibTeX XMLCite \textit{A. De} et al., Lect. Notes Comput. Sci. 6223, 649--665 (2010; Zbl 1283.94061) Full Text: DOI
Haitner, Iftach; Holenstein, Thomas; Reingold, Omer; Vadhan, Salil; Wee, Hoeteck Universal one-way hash functions via inaccessible entropy. (English) Zbl 1280.94065 Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 616-637 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Haitner} et al., Lect. Notes Comput. Sci. 6110, 616--637 (2010; Zbl 1280.94065) Full Text: DOI
Haitner, Iftach; Reingold, Omer; Vadhan, Salil; Wee, Hoeteck Inaccessible entropy. (English) Zbl 1304.94014 Proceedings of the 41st annual ACM symposium on theory of computing, STOC ’09. Bethesda, MD, USA, May 31 – June 2, 2009. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-613-7). 611-620 (2009). MSC: 94A17 68Q25 94A60 PDFBibTeX XMLCite \textit{I. Haitner} et al., in: Proceedings of the 41st annual ACM symposium on theory of computing, STOC '09. Bethesda, MD, USA, May 31 -- June 2, 2009. New York, NY: Association for Computing Machinery (ACM). 611--620 (2009; Zbl 1304.94014) Full Text: DOI
Haitner, Iftach; Nguyen, Minh-Huyen; Ong, Shien Jin; Reingold, Omer; Vadhan, Salil Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function. (English) Zbl 1195.94057 SIAM J. Comput. 39, No. 3, 1153-1218 (2009). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 11T71 68P25 14G50 PDFBibTeX XMLCite \textit{I. Haitner} et al., SIAM J. Comput. 39, No. 3, 1153--1218 (2009; Zbl 1195.94057) Full Text: DOI Link
Goodrich, Michael T.; Sun, Jonathan Z.; Tamassia, Roberto; Triandopoulos, Nikos Reliable resource searching in P2P networks. (English) Zbl 1184.68114 Chen, Yan (ed.) et al., Security and privacy in communication networks. 5th international ICST conference, SecureComm 2009, Athens, Greece, September 14–18, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05283-5/pbk; 978-3-642-05284-2/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 19, 437-447 (2009). MSC: 68M15 68M10 PDFBibTeX XMLCite \textit{M. T. Goodrich} et al., in: Security and privacy in communication networks. 5th international ICST conference, SecureComm 2009, Athens, Greece, September 14--18, 2009. Revised selected papers. Berlin: Springer. 437--447 (2009; Zbl 1184.68114) Full Text: DOI
Cheong, K. Y.; Koshiba, Takeshi Reducing complexity assumptions for oblivious transfer. (English) Zbl 1287.94062 Takagi, Tsuyoshi (ed.) et al., Advances in information and computer security. 4th international workshop on security, IWSEC 2009, Toyama, Japan, October 28–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04845-6/pbk). Lecture Notes in Computer Science 5824, 110-124 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Y. Cheong} and \textit{T. Koshiba}, Lect. Notes Comput. Sci. 5824, 110--124 (2009; Zbl 1287.94062) Full Text: DOI
Haitner, Iftach; Horvitz, Omer; Katz, Jonathan; Koo, Chiu-Yuen; Morselli, Ruggero; Shaltiel, Ronen Reducing complexity assumptions for statistically-hiding commitment. (English) Zbl 1173.94006 J. Cryptology 22, No. 3, 283-310 (2009). Reviewer: Jerzy Żurawiecki (Lublin) MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{I. Haitner} et al., J. Cryptology 22, No. 3, 283--310 (2009; Zbl 1173.94006) Full Text: DOI
Haitner, Iftach; Holenstein, Thomas On the (im)possibility of key dependent encryption. (English) Zbl 1213.94105 Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 202-219 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Haitner} and \textit{T. Holenstein}, Lect. Notes Comput. Sci. 5444, 202--219 (2009; Zbl 1213.94105) Full Text: DOI
Glukhov, M. M. Some applications of quasigroups in cryptography. (Russian. English summary) Zbl 1448.94198 Prikl. Diskretn. Mat. 2008, No. 2(2), 28-32 (2008). MSC: 94A60 94A62 20N05 PDFBibTeX XMLCite \textit{M. M. Glukhov}, Prikl. Diskretn. Mat. 2008, No. 2(2), 28--32 (2008; Zbl 1448.94198) Full Text: DOI MNR
Atani, Reza Ebrahimi; Atani, Shahabaddin Ebrahimi; Mirzakuchaki, Sattar Public key cryptography using semigroup actions and semirings. (English) Zbl 1206.94049 J. Discrete Math. Sci. Cryptography 11, No. 4, 437-445 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{R. E. Atani} et al., J. Discrete Math. Sci. Cryptography 11, No. 4, 437--445 (2008; Zbl 1206.94049) Full Text: DOI
Tartary, Christophe; Pieprzyk, Josef; Wang, Huaxiong Verifiable multi-secret sharing schemes for multiple threshold access structures. (English) Zbl 1166.94341 Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 167-181 (2008). MSC: 94A62 11A51 PDFBibTeX XMLCite \textit{C. Tartary} et al., Lect. Notes Comput. Sci. 4990, 167--181 (2008; Zbl 1166.94341) Full Text: DOI Link
Hemaspaandra, Lane A.; Rothe, Jörg; Saxena, Amitabh Enforcing and defying associativity, commutativity, totality, and strong noninvertibility for worst-case one-way functions. (English) Zbl 1146.68036 Theor. Comput. Sci. 401, No. 1-3, 27-35 (2008). MSC: 68Q15 PDFBibTeX XMLCite \textit{L. A. Hemaspaandra} et al., Theor. Comput. Sci. 401, No. 1--3, 27--35 (2008; Zbl 1146.68036) Full Text: DOI
Biham, Eli; Goren, Yaron J.; Ishai, Yuval Basing weak public-key cryptography on strong one-way functions. (English) Zbl 1162.94339 Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 55-72 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Biham} et al., Lect. Notes Comput. Sci. 4948, 55--72 (2008; Zbl 1162.94339) Full Text: DOI