Cryptographically Strong Pseudorandom Functions and Their Applications
碩士 === 國立中興大學 === 資訊科學系所 === 94 === Modern cryptology is largely based on Computational Complexity Theory. A realistic program corresponds to an algorithm or a Turing machine in the theory. An algorithm running in probabilistic polynomial time is considered to be a feasible method. For instance, for...
Main Authors: | Yu-Sheng Chen, 陳昱升 |
---|---|
Other Authors: | 洪國寶 |
Format: | Others |
Language: | en_US |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/75520993414843530607 |
Similar Items
-
New constructions of cryptographic pseudorandom functions
by: Banerjee, Abhishek
Published: (2015) -
Performance Analysis of Cryptographic Pseudorandom Number Generators
by: Mohammad Aljohani, et al.
Published: (2019-01-01) -
Design and Analysis of Cryptographic Pseudorandom Number/Sequence Generators with Applications in RFID
by: Mandal, Kalikinkar
Published: (2013) -
Functional Signatures and Pseudorandom Functions
by: Boyle, Elette, et al.
Published: (2014) -
Affine equivalence and con-structions of cryptographically strong Boolean functions
by: Chung, Jong Ho.
Published: (2013)