Quantcast
Channel: in theory » pseudorandom function
Browsing latest articles
Browse All 9 View Live

Image may be NSFW.
Clik here to view.

CS 276 Lecture 6: Pseudorandom Functions and Permutations

Scribed by Ian Haken Summary The encryption scheme we saw last time, based on pseudorandom functions, works and is CPA-secure, but it is not used in practice. A disadvantage of the scheme is that the...

View Article



Image may be NSFW.
Clik here to view.

CS276 Lecture 5: Encryption Using Pseudorandom Functions

Scribed by Manohar Jonnalagedda Summary Having introduced the notion of CPA security in the past lecture, we shall now see constructions that achieve it. Such constructions shall require either...

View Article

Image may be NSFW.
Clik here to view.

CS276 Lecture 13 (draft)

Summary Today we complete the proof that it is possible to construct a pseudorandom generator from a one-way permutation 1. Pseudorandom Generators from One-Way Permutations Last time we proved the...

View Article

Image may be NSFW.
Clik here to view.

CS276 Lecture 14 (draft)

Summary Today we show how to construct a pseudorandom function from a pseudorandom generator. 1. Construction of Pseudorandom Functions Lemma 1 (Generator Evaluated on Independent Seeds) Suppose that...

View Article

Image may be NSFW.
Clik here to view.

CS276 Lecture 15 (draft)

Summary Today we give a construction of a pseudorandom permutation (block cipher) given a pseudorandom function, and we begin its analysis. 1. Feistel Permutations Let be a function. We define the...

View Article


Image may be NSFW.
Clik here to view.

CS276 Lecture 16 (draft)

Today we finish the analysis of a construction of a pseudorandom permutation (block cipher) given a pseudorandom function. Recall that if is a function, then we define the Feistel permutation...

View Article

Image may be NSFW.
Clik here to view.

CS276 Lecture 15: Pseudorandom Permutations

Scribed by Siu-Man Chan Summary Given one way permutations (of which discrete logarithm is a candidate), we know how to construct pseudorandom functions. Today, we are going to construct pseudorandom...

View Article

Image may be NSFW.
Clik here to view.

CS276 Lecture 16: Pseudorandom Permutations

Scribed by Anupam Prakash Summary Today we finish the analysis of a construction of a pseudorandom permutation (block cipher) given a pseudorandom function. 1. The Luby-Rackoff Construction Recall...

View Article


Image may be NSFW.
Clik here to view.

CS276 Lecture 14: Pseudorandom Functions from Pseudorandom Generators

Scribed by Madhur Tulsian Summary Today we show how to construct a pseudorandom function from a pseudorandom generator. 1. Pseudorandom generators evaluated on independent seeds We first prove a...

View Article

Browsing latest articles
Browse All 9 View Live




Latest Images