Fact-checked by Grok 2 weeks ago
References
-
[1]
Pseudorandom function family - Glossary | CSRCDefinitions: An indexed family of (efficiently computable) functions, each defined for the same particular pair of input and output spaces.Missing: primary | Show results with:primary
-
[2]
How to construct random functions | Journal of the ACMA constructive theory of randomness for functions, based on computational complexity, is developed, and a pseudorandom function generator is presented.Missing: original | Show results with:original
-
[3]
[PDF] Pseudorandom Functions: Three Decades LaterIn 1984, Goldreich, Goldwasser and Micali formalized the concept of pseudorandom functions and proposed a construction based on any length-doubling ...
-
[4]
[PDF] Pseudorandom Functions Revisited: The Cascade Construction and ...Oct 31, 2005 · Pseudorandom function families are a powerful cryptographic primitive, yielding, in partic- ular, simple solutions for the main problems in ...Missing: primary sources
-
[5]
[PDF] Lecture 15 1 Pseudorandom Functions and PermutationsThe analogous property we would like from F is that it should "look like a random function" when a random key is chosen. ... bits does it take to represent a ...Missing: limitations | Show results with:limitations
-
[6]
[PDF] Random Oracles are Practical: A Paradigm for Designing Efficient ...Mihir Bellare. ∗. Phillip Rogaway. †. August 2, 2021. Abstract. We argue that the random oracle model —where all parties have access to a public random oracle ...
-
[7]
Pseudo-Random Functions - Applied Cryptography GroupSuppose Alice wishes to authenticate herself to Bob, by proving she knows a secret that they share. With PRNG's they could proceed as follows.Missing: primary sources
-
[8]
[PDF] Chapter 3 Pseudorandom FunctionsA pseudorandom function is a family of functions with the property that the input- output behavior of a random instance of the family is “computationally ...Missing: sources | Show results with:sources
-
[9]
[PDF] Pseudo-Random Generators (PRGs) and Pseudo-Random ...Sep 6, 2019 · [1] O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. 1986. 4-8.<|control11|><|separator|>
-
[10]
[PDF] 6 Pseudorandom Functions & Block CiphersA pseudorandom function (PRF) is a tool that allows Alice & Bob to achieve the effect of such an exponentially large table of shared randomness in practice. In ...Missing: limitations | Show results with:limitations
-
[11]
Pseudorandom functions - An intensive introduction to cryptographyThe key to understanding schemes using pseudorandom functions is to imagine what would happen if f s f_s fs was be an actual random function instead of a ...Missing: primary sources<|control11|><|separator|>
-
[12]
NoneError: Could not load webpage.<|control11|><|separator|>
-
[13]
[PDF] A PSEUDORANDOM GENERATOR FROM ANY ONE-WAY ...Pseudorandom generators are fundamental to many theoretical and applied aspects of computing. We show how to construct a pseudorandom generator from any one-way ...
-
[14]
[PDF] 1 Introduction 2 Concrete formalizationOur definition. of PPT refers to a uniform algorithm, with a fixed program size independent of n. (However, in many treatments of cryptography, it is common to ...
-
[15]
[PDF] From Non-Adaptive to Adaptive Pseudorandom FunctionsA pseudorandom function family (PRF), introduced by Goldreich, Goldwasser, and Micali [11], cannot be distinguished from a family of truly random functions.
-
[16]
[PDF] Weak Pseudorandom Functions in MinicryptSo in Minicrypt, i.e. under the assumption that one-way functions exist but public-key cryptography does not, the notion of public- and secret-coin weak PRFs ...
-
[17]
[PDF] Keyword Search and Oblivious Pseudorandom FunctionsAbstract. We study the problem of privacy-preserving access to a database. Particularly, we consider the problem of privacy-preserving keyword search.
-
[18]
[PDF] SoK: Oblivious Pseudorandom Functions - Cryptology ePrint ArchiveMar 4, 2022 · We explain which OPRF constructions can. (or cannot) achieve which properties. Section 4 explains in which models one can formulate OPRF ...
-
[19]
[PDF] How to Construct Random FunctionsGOLDREICH, O., GOLDWasser, S., and MICALI, S. How to construct random functions. Tech. Memo 244, Laboratory for Computer Science, MIT, Cambridge, Mass., Nov ...
-
[20]
[PDF] PRPs and PRFs - Stanford UniversityAny secure PRP is also a secure PRF. • Lemma: Let E be a PRP over (K,X). Then for any q-query adversary A: | PRF Adv[A,E] - PRP Adv[A,E] | < q2 / 2|X|.
-
[21]
[PDF] PRPs and PRFs - Stanford UniversityChal. Any secure PRP is also a secure PRF. Goal: build “secure” encryption from a PRP.
-
[22]
How to Construct Pseudorandom Permutations from Pseudorandom ...We show how to efficiently construct a pseudorandom invertible permutation generator from a pseudorandom function generator.
-
[23]
[PDF] New Proofs for NMAC and HMAC: Security without Collision ...This paper proves that HMAC is a PRF under the sole assumption that the compression function is a PRF. This recovers a proof based guarantee since no known ...
-
[24]
[PDF] Encrypted Davies-Meyer and Its Dual: Towards Optimal Security ...The dashed line represents the necessary addition to yield EWCDM. where h is an almost xor universal hash function, p1,p2 are two permutations, and where ν ...
-
[25]
[PDF] The Security and Performance of the Galois/Counter Mode (GCM) of ...GCM uses E as a pseudorandom function (PRF). In our analysis, we make use of the well-known result on the use of a PRP as a PRF [4]. Our defini ...
-
[26]
Key-Homomorphic Pseudorandom Functions from LWE with a Small ...Feb 24, 2020 · In this work, we provide two new PRF constructions from the LWE problem that each focuses on either minimizing the depth of its evaluation circuit or providing ...
-
[27]
[PDF] Key Homomorphic PRFs and Their ApplicationsFeb 2, 2014 · Abstract. A pseudorandom function F : K×X →Y is said to be key homomorphic if given F(k1,x) and F(k2,x) there is an efficient algorithm to ...<|control11|><|separator|>
-
[28]
[PDF] Symmetric Key Authentication, revisited - Cryptology ePrint ArchiveOct 28, 2012 · Abstract. Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseu- dorandom functions (PRFs).
-
[29]
[PDF] Symmetric Encryption: PRFs, Counter mode, and ChaCha20 - MITFeb 10, 2025 · Encrypting with a pseudorandom function: Counter mode. Last time, Yael demonstrated how to encrypt messages using a pseu- dorandom function.
-
[30]
[PDF] On The Exact Security of MACs Using PRFsHowever, the CBC mode of operation can also be used to construct a MAC when the underlying primitive is a domain preserving pseudo random function (PRF) or a ...
-
[31]
[PDF] The Poly1305-AES message-authentication codeMar 29, 2005 · Polynomial-evaluation MACs over prime fields can exploit the multipliers built into many current CPUs, achieving substantially better ...
-
[32]
RFC 5869 - HMAC-based Extract-and-Expand Key Derivation ...This document specifies a simple Hashed Message Authentication Code (HMAC)-based key derivation function (HKDF), which can be used as a building block in ...Missing: family | Show results with:family
-
[33]
RFC 8018 - PKCS #5: Password-Based Cryptography Specification ...RFC 8018 PKCS #5 v2.1 January 2017 B.1. Pseudorandom Functions Examples of pseudorandom function for PBKDF2 (Section 5.2) include HMAC with SHA-1, SHA-224 ...
-
[34]
[PDF] Efficient Batched Oblivious PRF with Applications to Private Set ...ABSTRACT. We describe a lightweight protocol for oblivious evaluation of a pseudorandom function (OPRF) in the presence of semi- honest adversaries.
-
[35]
[2112.10020] Cryptography from Pseudorandom Quantum StatesDec 18, 2021 · A consequence of (a) is that pseudorandom states are sufficient to construct maliciously secure multiparty computation protocols in the ...