Pseudorandomness

Pseudorandomness
Author: Salil P. Vadhan
Publisher: Foundations and Trends(r) in T
Total Pages: 352
Release: 2012
Genre: Computers
ISBN: 9781601985941

A survey of pseudorandomness, the theory of efficiently generating objects that look random despite being constructed using little or no randomness. This theory has significance for areas in computer science and mathematics, including computational complexity, algorithms, cryptography, combinatorics, communications, and additive number theory.

Pseudorandomness and Cryptographic Applications

Pseudorandomness and Cryptographic Applications
Author: Michael Luby
Publisher: Princeton University Press
Total Pages: 257
Release: 2019-12-31
Genre: Mathematics
ISBN: 0691206848

A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack. There do not seem to be natural examples of functions that are pseudorandom generators. On the other hand, there do seem to be a variety of natural examples of another basic primitive: the one-way function. A function is one-way if it is easy to compute but hard for any efficient adversary to invert on average. The first half of the book shows how to construct a pseudorandom generator from any one-way function. Building on this, the second half of the book shows how to construct other useful cryptographic primitives, such as private key cryptosystems, pseudorandom function generators, pseudorandom permutation generators, digital signature schemes, bit commitment protocols, and zero-knowledge interactive proof systems. The book stresses rigorous definitions and proofs.

Modern Cryptography, Probabilistic Proofs and Pseudorandomness

Modern Cryptography, Probabilistic Proofs and Pseudorandomness
Author: Oded Goldreich
Publisher: Springer Science & Business Media
Total Pages: 192
Release: 2013-03-09
Genre: Mathematics
ISBN: 3662125218

Cryptography is one of the most active areas in current mathematics research and applications. This book focuses on cryptography along with two related areas: the study of probabilistic proof systems, and the theory of computational pseudorandomness. Following a common theme that explores the interplay between randomness and computation, the important notions in each field are covered, as well as novel ideas and insights.

A Primer on Pseudorandom Generators

A Primer on Pseudorandom Generators
Author: Oded Goldreich
Publisher: American Mathematical Soc.
Total Pages: 130
Release: 2010
Genre: Computers
ISBN: 0821851926

The primer assumes basic familiarity with the notion of efficient algorithms and with elementary probability theory, but provides a basic introduction to all notions that are actually used. as a result, the primer is essentially self-contained, although the interested reader is at times referred to other sources for more detail. --Book Jacket.

Advances in Cryptology -- EUROCRYPT 2012

Advances in Cryptology -- EUROCRYPT 2012
Author: David Pointcheval
Publisher: Springer Science & Business Media
Total Pages: 769
Release: 2012-04-02
Genre: Computers
ISBN: 3642290108

This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012. The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices.

A Primer on Pseudorandom Generators

A Primer on Pseudorandom Generators
Author: Oded Goldreich
Publisher: American Mathematical Soc.
Total Pages: 130
Release:
Genre: Mathematics
ISBN: 0821883119

A fresh look at the question of randomness was taken in the theory of computing: A distribution is pseudorandom if it cannot be distinguished from the uniform distribution by any efficient procedure. This paradigm, originally associating efficient procedures with polynomial-time algorithms, has been applied with respect to a variety of natural classes of distinguishing procedures. The resulting theory of pseudorandomness is relevant to science at large and is closely related to central areas of computer science, such as algorithmic design, complexity theory, and cryptography. This primer surveys the theory of pseudorandomness, starting with the general paradigm, and discussing various incarnations while emphasizing the case of general-purpose pseudorandom generators (withstanding any polynomial-time distinguisher). Additional topics include the "derandomization" of arbitrary probabilistic polynomial-time algorithms, pseudorandom generators withstanding space-bounded distinguishers, and serveral natural notions of special-purpose pseudorandom generators. The primer assumes basic familiarity with the notion of efficient algorithms and with elementary probability theory, but provides a basic introduction to all notions that are actually used. as a result, the primer is essentially self-contained, although the interested reader is at times referred to other sources for more detail.

Random Numbers and Computers

Random Numbers and Computers
Author: Ronald T. Kneusel
Publisher: Springer
Total Pages: 266
Release: 2018-04-05
Genre: Computers
ISBN: 3319776975

This book covers pseudorandom number generation algorithms, evaluation techniques, and offers practical advice and code examples. Random Numbers and Computers is an essential introduction or refresher on pseudorandom numbers in computer science. The first comprehensive book on the topic, readers are provided with a practical introduction to the techniques of pseudorandom number generation, including how the algorithms work and how to test the output to decide if it is suitable for a particular purpose. Practical applications are demonstrated with hands-on presentation and descriptions that readers can apply directly to their own work. Examples are in C and Python and given with an emphasis on understanding the algorithms to the point of practical application. The examples are meant to be implemented, experimented with and improved/adapted by the reader.

Cryptographic Applications of Analytic Number Theory

Cryptographic Applications of Analytic Number Theory
Author: Igor Shparlinski
Publisher: Springer Science & Business Media
Total Pages: 434
Release: 2003-02-12
Genre: Computers
ISBN: 9783764366544

The book introduces new ways of using analytic number theory in cryptography and related areas, such as complexity theory and pseudorandom number generation. Cryptographers and number theorists will find this book useful. The former can learn about new number theoretic techniques which have proved to be invaluable cryptographic tools, the latter about new challenging areas of applications of their skills.

The Theory of Hash Functions and Random Oracles

The Theory of Hash Functions and Random Oracles
Author: Arno Mittelbach
Publisher: Springer Nature
Total Pages: 788
Release: 2021-01-19
Genre: Computers
ISBN: 3030632873

Hash functions are the cryptographer’s Swiss Army knife. Even though they play an integral part in today’s cryptography, existing textbooks discuss hash functions only in passing and instead often put an emphasis on other primitives like encryption schemes. In this book the authors take a different approach and place hash functions at the center. The result is not only an introduction to the theory of hash functions and the random oracle model but a comprehensive introduction to modern cryptography. After motivating their unique approach, in the first chapter the authors introduce the concepts from computability theory, probability theory, information theory, complexity theory, and information-theoretic security that are required to understand the book content. In Part I they introduce the foundations of hash functions and modern cryptography. They cover a number of schemes, concepts, and proof techniques, including computational security, one-way functions, pseudorandomness and pseudorandom functions, game-based proofs, message authentication codes, encryption schemes, signature schemes, and collision-resistant (hash) functions. In Part II the authors explain the random oracle model, proof techniques used with random oracles, random oracle constructions, and examples of real-world random oracle schemes. They also address the limitations of random oracles and the random oracle controversy, the fact that uninstantiable schemes exist which are provably secure in the random oracle model but which become insecure with any real-world hash function. Finally in Part III the authors focus on constructions of hash functions. This includes a treatment of iterative hash functions and generic attacks against hash functions, constructions of hash functions based on block ciphers and number-theoretic assumptions, a discussion of privately keyed hash functions including a full security proof for HMAC, and a presentation of real-world hash functions. The text is supported with exercises, notes, references, and pointers to further reading, and it is a suitable textbook for undergraduate and graduate students, and researchers of cryptology and information security.

Advances in Cryptology - CRYPTO '89

Advances in Cryptology - CRYPTO '89
Author: Gilles Brassard
Publisher: Springer
Total Pages: 628
Release: 1995-01-01
Genre: Computers
ISBN: 0387348050

CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual meetings on this topic also take place in Europe and are regularly published in this Lecture Notes series under the name of EUROCRYPT. This volume presents the proceedings of the ninth CRYPTO meeting. The papers are organized into sections with the following themes: Why is cryptography harder than it looks?, pseudo-randomness and sequences, cryptanalysis and implementation, signature and authentication, threshold schemes and key management, key distribution and network security, fast computation, odds and ends, zero-knowledge and oblivious transfer, multiparty computation.