The odyssey of entropy: cryptography

B Zolfaghari, K Bibak, T Koshiba - Entropy, 2022 - mdpi.com
After being introduced by Shannon as a measure of disorder and unavailable information,
the notion of entropy has found its applications in a broad range of scientific disciplines. In …

[图书][B] How to time-stamp a digital document

S Haber, WS Stornetta - 1991 - Springer
The prospect of a world in which all text, audio, picture, and video documents are in digital
form on easily modifiable media raises the issue of how to certify when a document was …

[图书][B] Foundations of cryptography: volume 2, basic applications

O Goldreich - 2001 - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …

[图书][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007 - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …

Entity authentication and key distribution

M Bellare, P Rogaway - Annual international cryptology conference, 1993 - Springer
We provide the first formal treatment of entity authentication and authenticated key
distribution appropriate to the distributed environment. Addressed in detail are the problems …

A pseudorandom generator from any one-way function

J Håstad, R Impagliazzo, LA Levin, M Luby - SIAM Journal on Computing, 1999 - SIAM
Pseudorandom generators are fundamental to many theoretical and applied aspects of
computing. We show how to construct a pseudorandom generator from any one-way …

On the (im) possibility of obfuscating programs

B Barak, O Goldreich, R Impagliazzo, S Rudich… - Annual international …, 2001 - Springer
Informally, an obfuscator O is an (efficient, probabilistic)“compiler” that takes as input a
program (or circuit) P and produces a new program O (P) that has the same functionality as …

[PDF][PDF] Non-malleable cryptography

D Dolev, C Dwork, M Naor - Proceedings of the twenty-third annual ACM …, 1991 - dl.acm.org
The notion of non-malleable cryptography, an extension of semantically secure
cryptography, is defined. Informally, the additional requirement is that given the ciphertext it …

Limits on the provable consequences of one-way permutations

R Impagliazzo, S Rudich - Proceedings of the twenty-first annual ACM …, 1989 - dl.acm.org
We present strong evidence that the implication,“if one-way permutations exist, then secure
secret key agreement is possible”, is not provable by standard techniques. Since both sides …

Relations among notions of security for public-key encryption schemes

M Bellare, A Desai, D Pointcheval… - Advances in Cryptology …, 1998 - Springer
We compare the relative strengths of popular notions of security for public key encryption
schemes. We consider the goals of privacy and non-malleability, each under chosen …