Sciweavers

4 search results - page 1 / 1
» Derandomization in Cryptography
Sort
View
CRYPTO
2003
Springer
92views Cryptology» more  CRYPTO 2003»
13 years 10 months ago
Derandomization in Cryptography
We give two applications of Nisan–Wigderson-type (“non-cryptographic”) pseudorandom generators in cryptography. Specifically, assuming the existence of an appropriate NW-ty...
Boaz Barak, Shien Jin Ong, Salil P. Vadhan
APPROX
2004
Springer
121views Algorithms» more  APPROX 2004»
13 years 10 months ago
Small Pseudo-random Families of Matrices: Derandomizing Approximate Quantum Encryption
A quantum encryption scheme (also called private quantum channel, or state randomization protocol) is a one-time pad for quantum messages. If two parties share a classical random s...
Andris Ambainis, Adam Smith
STOC
2009
ACM
133views Algorithms» more  STOC 2009»
14 years 5 months ago
New direct-product testers and 2-query PCPs
The "direct product code" of a function f gives its values on all k-tuples (f(x1), . . . , f(xk)). This basic construct underlies "hardness amplification" in c...
Russell Impagliazzo, Valentine Kabanets, Avi Wigde...
APPROX
2007
Springer
104views Algorithms» more  APPROX 2007»
13 years 11 months ago
Worst-Case to Average-Case Reductions Revisited
Abstract. A fundamental goal of computational complexity (and foundations of cryptography) is to find a polynomial-time samplable distribution (e.g., the uniform distribution) and...
Dan Gutfreund, Amnon Ta-Shma