Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

On the generation of cryptographically strong pseudorandom sequences

Published: 01 February 1983 Publication History
  • Get Citation Alerts
  • First page of PDF

    References

    [1]
    DIFFIE, W. AND HELLMAN, M. Privacy and authentication: An introduction to cryptography. Proc. IEEE 67, 3 (March 1979).
    [2]
    KAHN, D. The Code Breakers, Macmillan, New York, N.Y., 1967.
    [3]
    RABIN, M.O. Digitized signatures and public-key functions as intractable as factorization. Tech. Rep. LCS/TR-212, Massachusetts Institute of Technology, Cambridge, Mass., Jan. 1979.
    [4]
    RIVEST, R.L. Forwards and backwards encryption. Cryptologia 4, 1 (Jan. 1980).
    [5]
    RIVEST, R.L., SHAMIR, A., AND ADLEMAN, L.M. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2, (Feb. 1978), 120-126.
    [6]
    SAVAGE, J.E. The Complexity of Computing. Wiley, New York, N.Y., 1976.
    [7]
    SHAMIR, A. On the power of commutativity in cryptography. In Proc. of ICALP 80, Lecture Notes in Computer Science, vol. 85, Springer-Verlag, July 1980.

    Cited By

    View all
    • (2024)Locally Verifiable Aggregate Signature Scheme for Health Monitoring SystemsProceedings of the 13th International Conference on Computer Engineering and Networks10.1007/978-981-99-9247-8_1(1-10)Online publication date: 4-Jan-2024
    • (2023)Cryptographically Secured Pseudo-Random Number Generators: Analysis and Testing with NIST Statistical Test SuiteMathematics10.3390/math1123481211:23(4812)Online publication date: 28-Nov-2023
    • (2023)Enabling efficient and secure health data sharing for Healthcare IoT systemsFuture Generation Computer Systems10.1016/j.future.2023.07.031149(304-316)Online publication date: Dec-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Computer Systems
    ACM Transactions on Computer Systems  Volume 1, Issue 1
    Feb. 1983
    92 pages
    ISSN:0734-2071
    EISSN:1557-7333
    DOI:10.1145/357353
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 February 1983
    Published in TOCS Volume 1, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. RSA cryptosystems
    2. cryptography
    3. one-time pads
    4. pseudorandom sequences

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)132
    • Downloads (Last 6 weeks)10

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Locally Verifiable Aggregate Signature Scheme for Health Monitoring SystemsProceedings of the 13th International Conference on Computer Engineering and Networks10.1007/978-981-99-9247-8_1(1-10)Online publication date: 4-Jan-2024
    • (2023)Cryptographically Secured Pseudo-Random Number Generators: Analysis and Testing with NIST Statistical Test SuiteMathematics10.3390/math1123481211:23(4812)Online publication date: 28-Nov-2023
    • (2023)Enabling efficient and secure health data sharing for Healthcare IoT systemsFuture Generation Computer Systems10.1016/j.future.2023.07.031149(304-316)Online publication date: Dec-2023
    • (2023)Counting Unpredictable Bits: A Simple PRG from One-Way FunctionsTheory of Cryptography10.1007/978-3-031-48615-9_7(191-218)Online publication date: 27-Nov-2023
    • (2022)A Novel Nonlinear Pseudorandom Sequence Generator for the Fractal FunctionFractal and Fractional10.3390/fractalfract61005896:10(589)Online publication date: 13-Oct-2022
    • (2022)L2chainProceedings of the VLDB Endowment10.14778/3574245.357427816:4(986-999)Online publication date: 1-Dec-2022
    • (2022)Succinct Zero-Knowledge Batch Proofs for Set AccumulatorsProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560677(455-469)Online publication date: 7-Nov-2022
    • (2022)PCR-Auth: Solving Authentication Puzzle Challenge with Encoded Palm Contact Response2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833564(1034-1048)Online publication date: May-2022
    • (2022)On the connection between quantum pseudorandomness and quantum hardware assumptionsQuantum Science and Technology10.1088/2058-9565/ac66fb7:3(035004)Online publication date: 29-Apr-2022
    • (2022)A Privacy-Preserving Framework for Endorsement Process in Hyperledger FabricComputers and Security10.1016/j.cose.2022.102637116:COnline publication date: 1-May-2022
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media