Tag: pseudo-random-function
Found 186 results for 'pseudo-random-function'.
1) pseudo-random-generator - Existence of PRF $\implies$ existence of PRG
2) pseudo-random-generator - PRF and deterministic polytime function implie PRG
3) cryptanalysis - Is this a secure PRG or not?
4) keys - How are the keys used in cryptography generated?
5) random-number-generator - Cryptographic security of PHP mt_rand() function using Mersenne Twister algo
6) pseudo-random-function - How to construct a good PRF from a block cipher?
7) key-derivation - Key derivation function in theory & practice
8) pseudo-random-function - Prove that a function is PRF?
9) pseudo-random-function - Prove that a function is not PRF?
10) pseudo-random-function - Wrong Proof of Secure PRF
11) pseudo-random-function - Determine whether a given function is a pseudorandom generator/function
12) pseudo-random-generator - Necessary conditions for construction of $n$ to $p(n)$ pseudorandom generators from $n$ to $n+1$ generators?
13) mac - Why is this MAC based on secure PRF with ordering and randomization insecure?
14) pseudo-random-generator - Is this a PRF? Fk(x) = G(k⊕x) where G is a PRG
15) pseudo-random-function - Is a function defined as PRF with a given key a PRG?
16) random-number-generator - GGM PRG construction: Why do we need to change keys all the time with underlying PRG
17) mac - Why is $Mac_k(m_1||m_2) = ⟨F_k(m_1), F_k(m_1 \oplus \overline{m_2})⟩$ not a secure MAC?
18) stream-cipher - Pseudorandom Generator
19) pseudo-random-generator - Can we use Pohlig-Hellman Exponentiation Cipher with a PRG to achieve an oblivious PRF
20) aes - Fundamental difference between the constant, key, nonce, and counter bits in Salsa20/ChaCha20 or AES-Encrypt?
21) pseudo-random-function - Statistical tests for PRNG that generates a sequence which is not binary
22) random-number-generator - Cryptographically strong pseudo-random seq. generators
23) hash - Security of KDF1 and KDF2 (hash based KDF's)
24) random-number-generator - Relationship between source and output entropy
25) protocol-design - Private set intersection, using a semi-trusted server
26) cryptanalysis - Key Derivation Function (KDF): Can a key derived from KDF be considered as a secure key?
27) pseudo-random-function - Simple application of verifiable random function?
28) tls - TLS 1.2 PRF with HMAC-SHA256
29) block-cipher - Deterministic Counter Mode with a PRF. What does evaluate at a point mean?
30) cryptanalysis - Data Switching and Information Leakage
31) hash - Could a fixed RSA encryption be used instead of a salt to prevent rainbow table attacks?
32) post-quantum-cryptography - Post-Quantum security of Pseudo-Random Functions
33) pseudo-random-function - Correctness of signle-point Oblivious PRF
34) pseudo-random-function - Give a distinguisher to differentiate between PRP and RPO
35) pseudo-random-function - How to prove the PRF, $F(k,x) = (k \wedge x ) \oplus k$ is PRP?
36) aes - Can you defeat AES-CTR's birthday boundary with a 2nd AES?
37) provable-security - How to build a periodic PRF from a PRF?
38) pseudo-random-function - Proof that a function constructed from a PRP is, or is not a PRF?
39) key-derivation - Questions about Key Derivation Functions
40) block-cipher - Using a PRP $\pi: \{0,1\}^{16} \to \{0,1\}^{16}$ to construct an ideal cipher
41) hmac - Is HMAC-SHA256 a PRF?
42) hash - Proof that MAC and hash composition is insecure
43) pseudo-random-function - Show that G is not a PRF
44) random-number-generator - Correlation among Psuedo Random Sequences generated from seeds which are correlated
45) pseudo-random-function - Number of possible functions for a PRP
46) cryptanalysis - Using only pseudorandom function to drive many deterministic keys
47) pseudo-random-function - Security of this PRF
48) pseudo-random-generator - Do 'nonsequential' PRNGs exist?
49) block-cipher - How is a PRP different from PRF? Both can be inverted to get the same input
50) hash - Is there a property comparable to IND-CPA for hash functions taking a random value?