Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Advances in Cryptology

Best Price (Coupon Required):
Buy Advances in Cryptology for $36.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $39.99 - $39.99
BEST PRICE

Single Product Purchase

$36.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$39.99 $39.99

10% OFF
This deals requires coupon
$36.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783540395683
Condition
New
Product Description

Recently, there has been a lot of interest in provably "good" pseudo-random number generators [lo, 4, 14, 31. These cryptographically secure generators are "good" in the sense that they pass all probabilistic polynomial time statistical tests. However, despite these nice properties, the secure generators known so far suffer from the han- cap of being inefiicient; the most efiicient of these take n2 steps (one modular multip- cation, n being the length of the seed) to generate one bit. Pseudc-random number g- erators that are currently used in practice output n bits per multiplication (n2 steps). An important open problem was to output even two bits on each multiplication in a cryptographically secure way. This problem was stated by Blum, Blum & Shub [3] in the context of their z2 mod N generator. They further ask: how many bits can be o- put per multiplication, maintaining cryptographic security? In this paper we state a simple condition, the XOR-Condition and show that any generator satisfying this condition can output logn bits on each multiplication. We show that the XOR-Condition is satisfied by the lop least significant bits of the z2-mod N generator. The security of the z2 mod N generator was based on Quadratic Residu- ity [3]. This generator is an example of a Trapdoor Generator [13], and its trapdoor properties have been used in protocol design. We strengthen the security of this gene- tor by proving it as hard as factoring.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Marx fr SozialwissenschaftlerInnen

Marx fr SozialwissenschaftlerInnen

$34.99
Like=Remember: Online-Erinnerungskulturen an die Shoah

Like=Remember: Online-Erinnerungskulturen an die Shoah

$54.99
Grundlagen einer Theorie betrieblicher Datenverarbeitung

Grundlagen einer Theorie betrieblicher Datenverarbeitung

$59.99
Hauspflege

Hauspflege

$49.99
Statistik mit MATHCAD und MATLAB

Statistik mit MATHCAD und MATLAB

$49.99
Comparing Strategies of (De)Politicisation in Europe

Comparing Strategies of (De)Politicisation in Europe

$159.99
Internationalization

Internationalization

$109.99
Labour Dispute Resolution in Turkey

Labour Dispute Resolution in Turkey

$89.99
Stereotypes and Self-Representations of Women with a Muslim Background

Stereotypes and Self-Representations of Women with a Muslim Background

$99.99
Thermocapillary Convection in Models of Crystal Growth

Thermocapillary Convection in Models of Crystal Growth

$39.99
Sums and Gaussian Vectors

Sums and Gaussian Vectors

$44.99
Exkursionen und Exkursionsdidaktik in der Hochschullehre

Exkursionen und Exkursionsdidaktik in der Hochschullehre

$49.99
Wozu Experten?

Wozu Experten?

$64.99
Flugphysik der Tragschrauber

Flugphysik der Tragschrauber

$99.99
Infrastructure and the Space-Economy

Infrastructure and the Space-Economy

$84.99
Bret Easton Ellis

Bret Easton Ellis

$54.99
Principles of Electrical Neural Interfacing

Principles of Electrical Neural Interfacing

$49.99
Unilateral Denunciation of Treaty Because of Prior Violations of Obligations by Other Party

Unilateral Denunciation of Treaty Because of Prior Violations of Obligations by Other Party

$54.99
Aphasias Implications for Linguistics Research

Aphasias Implications for Linguistics Research

$99.00
Roloff/Matek Maschinenelemente Aufgabensammlung

Roloff/Matek Maschinenelemente Aufgabensammlung

$27.99
Into the A, B, Sea

Into the A, B, Sea

$5.21
Mlances Offerts  Juraj Andrassy

Mlances Offerts Juraj Andrassy

$74.99
Mikrocomputergesttzte Instrumente der strategischen Unternehmensplanung

Mikrocomputergesttzte Instrumente der strategischen Unternehmensplanung

$59.99
Uncanny American Fiction

Uncanny American Fiction

$39.99
Heart Genomics

Heart Genomics

$169.99
Coordination Chemistry

Coordination Chemistry

$84.99
Automation: The Future of Weed Control in Cropping Systems

Automation: The Future of Weed Control in Cropping Systems

$169.99
Brgerliches Recht

Brgerliches Recht

$34.99
International Conference on Advanced Intelligent Systems for Sustainable Development

International Conference on Advanced Intelligent Systems for Sustainable Development

$249.99
Kommunalwirtschaft

Kommunalwirtschaft

$64.99
Procedural Justice and Legitimacy in Policing

Procedural Justice and Legitimacy in Policing

$64.99
Introduction to Systems Analysis

Introduction to Systems Analysis

$54.99
Basics of Computer Networking

Basics of Computer Networking

$54.99
Advances in Signal Processing and Communication Engineering

Advances in Signal Processing and Communication Engineering

$279.99
Advanced Communication and Networking

Advanced Communication and Networking

$54.99
Das Antonius-Feuer in Kunst und Medizin

Das Antonius-Feuer in Kunst und Medizin

$89.99
Die Erosion der Abgrenzung

Die Erosion der Abgrenzung

$69.99
The Fate of Holocaust Memories

The Fate of Holocaust Memories

$39.99
Modular Chemistry

Modular Chemistry

$54.99
Smart and Sustainable Planning for Cities and Regions

Smart and Sustainable Planning for Cities and Regions

$129.00
previous
next