Pseudorandomness

Pseudorandomness

Author: Salil P. Vadhan

Publisher: Foundations and Trends(r) in T

Published: 2012

Total Pages: 352

ISBN-13: 9781601985941

DOWNLOAD EBOOK

A survey of pseudorandomness, the theory of efficiently generating objects that look random despite being constructed using little or no randomness. This theory has significance for areas in computer science and mathematics, including computational complexity, algorithms, cryptography, combinatorics, communications, and additive number theory.


Pseudorandomness and Cryptographic Applications

Pseudorandomness and Cryptographic Applications

Author: Michael Luby

Publisher: Princeton University Press

Published: 2019-12-31

Total Pages: 257

ISBN-13: 0691206848

DOWNLOAD EBOOK

A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack. There do not seem to be natural examples of functions that are pseudorandom generators. On the other hand, there do seem to be a variety of natural examples of another basic primitive: the one-way function. A function is one-way if it is easy to compute but hard for any efficient adversary to invert on average. The first half of the book shows how to construct a pseudorandom generator from any one-way function. Building on this, the second half of the book shows how to construct other useful cryptographic primitives, such as private key cryptosystems, pseudorandom function generators, pseudorandom permutation generators, digital signature schemes, bit commitment protocols, and zero-knowledge interactive proof systems. The book stresses rigorous definitions and proofs.


Modern Cryptography, Probabilistic Proofs and Pseudorandomness

Modern Cryptography, Probabilistic Proofs and Pseudorandomness

Author: Oded Goldreich

Publisher: Springer Science & Business Media

Published: 2013-03-09

Total Pages: 192

ISBN-13: 3662125218

DOWNLOAD EBOOK

Cryptography is one of the most active areas in current mathematics research and applications. This book focuses on cryptography along with two related areas: the study of probabilistic proof systems, and the theory of computational pseudorandomness. Following a common theme that explores the interplay between randomness and computation, the important notions in each field are covered, as well as novel ideas and insights.


A Primer on Pseudorandom Generators

A Primer on Pseudorandom Generators

Author: Oded Goldreich

Publisher: American Mathematical Soc.

Published: 2010

Total Pages: 130

ISBN-13: 0821851926

DOWNLOAD EBOOK

The primer assumes basic familiarity with the notion of efficient algorithms and with elementary probability theory, but provides a basic introduction to all notions that are actually used. as a result, the primer is essentially self-contained, although the interested reader is at times referred to other sources for more detail. --Book Jacket.


Advances in Cryptology -- EUROCRYPT 2012

Advances in Cryptology -- EUROCRYPT 2012

Author: David Pointcheval

Publisher: Springer Science & Business Media

Published: 2012-04-02

Total Pages: 769

ISBN-13: 3642290108

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012. The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices.


A Primer on Pseudorandom Generators

A Primer on Pseudorandom Generators

Author: Oded Goldreich

Publisher: American Mathematical Soc.

Published:

Total Pages: 130

ISBN-13: 0821883119

DOWNLOAD EBOOK

A fresh look at the question of randomness was taken in the theory of computing: A distribution is pseudorandom if it cannot be distinguished from the uniform distribution by any efficient procedure. This paradigm, originally associating efficient procedures with polynomial-time algorithms, has been applied with respect to a variety of natural classes of distinguishing procedures. The resulting theory of pseudorandomness is relevant to science at large and is closely related to central areas of computer science, such as algorithmic design, complexity theory, and cryptography. This primer surveys the theory of pseudorandomness, starting with the general paradigm, and discussing various incarnations while emphasizing the case of general-purpose pseudorandom generators (withstanding any polynomial-time distinguisher). Additional topics include the "derandomization" of arbitrary probabilistic polynomial-time algorithms, pseudorandom generators withstanding space-bounded distinguishers, and serveral natural notions of special-purpose pseudorandom generators. The primer assumes basic familiarity with the notion of efficient algorithms and with elementary probability theory, but provides a basic introduction to all notions that are actually used. as a result, the primer is essentially self-contained, although the interested reader is at times referred to other sources for more detail.


Random Numbers and Computers

Random Numbers and Computers

Author: Ronald T. Kneusel

Publisher: Springer

Published: 2018-04-05

Total Pages: 266

ISBN-13: 3319776975

DOWNLOAD EBOOK

This book covers pseudorandom number generation algorithms, evaluation techniques, and offers practical advice and code examples. Random Numbers and Computers is an essential introduction or refresher on pseudorandom numbers in computer science. The first comprehensive book on the topic, readers are provided with a practical introduction to the techniques of pseudorandom number generation, including how the algorithms work and how to test the output to decide if it is suitable for a particular purpose. Practical applications are demonstrated with hands-on presentation and descriptions that readers can apply directly to their own work. Examples are in C and Python and given with an emphasis on understanding the algorithms to the point of practical application. The examples are meant to be implemented, experimented with and improved/adapted by the reader.


Trusted Systems

Trusted Systems

Author: Liqun Chen

Publisher: Springer Science & Business Media

Published: 2010-07-15

Total Pages: 276

ISBN-13: 3642145965

DOWNLOAD EBOOK

This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2009.


Cryptographic Applications of Analytic Number Theory

Cryptographic Applications of Analytic Number Theory

Author: Igor Shparlinski

Publisher: Springer Science & Business Media

Published: 2003-02-12

Total Pages: 434

ISBN-13: 9783764366544

DOWNLOAD EBOOK

The book introduces new ways of using analytic number theory in cryptography and related areas, such as complexity theory and pseudorandom number generation. Cryptographers and number theorists will find this book useful. The former can learn about new number theoretic techniques which have proved to be invaluable cryptographic tools, the latter about new challenging areas of applications of their skills.


The Theory of Hash Functions and Random Oracles

The Theory of Hash Functions and Random Oracles

Author: Arno Mittelbach

Publisher: Springer Nature

Published: 2021-01-19

Total Pages: 788

ISBN-13: 3030632873

DOWNLOAD EBOOK

Hash functions are the cryptographer’s Swiss Army knife. Even though they play an integral part in today’s cryptography, existing textbooks discuss hash functions only in passing and instead often put an emphasis on other primitives like encryption schemes. In this book the authors take a different approach and place hash functions at the center. The result is not only an introduction to the theory of hash functions and the random oracle model but a comprehensive introduction to modern cryptography. After motivating their unique approach, in the first chapter the authors introduce the concepts from computability theory, probability theory, information theory, complexity theory, and information-theoretic security that are required to understand the book content. In Part I they introduce the foundations of hash functions and modern cryptography. They cover a number of schemes, concepts, and proof techniques, including computational security, one-way functions, pseudorandomness and pseudorandom functions, game-based proofs, message authentication codes, encryption schemes, signature schemes, and collision-resistant (hash) functions. In Part II the authors explain the random oracle model, proof techniques used with random oracles, random oracle constructions, and examples of real-world random oracle schemes. They also address the limitations of random oracles and the random oracle controversy, the fact that uninstantiable schemes exist which are provably secure in the random oracle model but which become insecure with any real-world hash function. Finally in Part III the authors focus on constructions of hash functions. This includes a treatment of iterative hash functions and generic attacks against hash functions, constructions of hash functions based on block ciphers and number-theoretic assumptions, a discussion of privately keyed hash functions including a full security proof for HMAC, and a presentation of real-world hash functions. The text is supported with exercises, notes, references, and pointers to further reading, and it is a suitable textbook for undergraduate and graduate students, and researchers of cryptology and information security.