2013
DOI: 10.1137/100814421
|View full text |Cite
|
Sign up to set email alerts
|

Efficiency Improvements in Constructing Pseudorandom Generators from One-Way Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
74
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 49 publications
(74 citation statements)
references
References 25 publications
0
74
0
Order By: Relevance
“…In addition to simplicity, our technique can also be used to refine and tighten the proof given in [7] (see Section 3.2 and Remark 3.2 for details). We mention that our proofs sketched above are not implied by the recent work of [13,23]. In particular, the construction of [13] applies a dedicated universal hash function h of description length O(n 2 ) to f (X) such that the first k output bits are statistically random and the next O(log n) bits are computationally random, and this holds even if k is unknown (which is desired for a general OWF f whose preimage size may vary for different images).…”
Section: Summary Of Contributionsmentioning
confidence: 95%
See 4 more Smart Citations
“…In addition to simplicity, our technique can also be used to refine and tighten the proof given in [7] (see Section 3.2 and Remark 3.2 for details). We mention that our proofs sketched above are not implied by the recent work of [13,23]. In particular, the construction of [13] applies a dedicated universal hash function h of description length O(n 2 ) to f (X) such that the first k output bits are statistically random and the next O(log n) bits are computationally random, and this holds even if k is unknown (which is desired for a general OWF f whose preimage size may vary for different images).…”
Section: Summary Of Contributionsmentioning
confidence: 95%
“…We mention that our proofs sketched above are not implied by the recent work of [13,23]. In particular, the construction of [13] applies a dedicated universal hash function h of description length O(n 2 ) to f (X) such that the first k output bits are statistically random and the next O(log n) bits are computationally random, and this holds even if k is unknown (which is desired for a general OWF f whose preimage size may vary for different images). However, in our context k is known and it is crucial that the description length of the hash functions is linear, for which we do two extractions from f (X) using h 2 and h c respectively.…”
Section: Summary Of Contributionsmentioning
confidence: 95%
See 3 more Smart Citations