Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Advances in Cryptology

Best Price (Coupon Required):
Buy Advances in Cryptology for $36.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $39.99 - $39.99
BEST PRICE

Single Product Purchase

$36.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$39.99 $39.99

10% OFF
This deals requires coupon
$36.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783540395683
Condition
New
Product Description

Recently, there has been a lot of interest in provably "good" pseudo-random number generators [lo, 4, 14, 31. These cryptographically secure generators are "good" in the sense that they pass all probabilistic polynomial time statistical tests. However, despite these nice properties, the secure generators known so far suffer from the han- cap of being inefiicient; the most efiicient of these take n2 steps (one modular multip- cation, n being the length of the seed) to generate one bit. Pseudc-random number g- erators that are currently used in practice output n bits per multiplication (n2 steps). An important open problem was to output even two bits on each multiplication in a cryptographically secure way. This problem was stated by Blum, Blum & Shub [3] in the context of their z2 mod N generator. They further ask: how many bits can be o- put per multiplication, maintaining cryptographic security? In this paper we state a simple condition, the XOR-Condition and show that any generator satisfying this condition can output logn bits on each multiplication. We show that the XOR-Condition is satisfied by the lop least significant bits of the z2-mod N generator. The security of the z2 mod N generator was based on Quadratic Residu- ity [3]. This generator is an example of a Trapdoor Generator [13], and its trapdoor properties have been used in protocol design. We strengthen the security of this gene- tor by proving it as hard as factoring.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Verhandlungsbericht 1984 der Deutschen Gesellschaft fr Hals- Nasen- Ohren-Heilkunde, Kopf- und Hals

Verhandlungsbericht 1984 der Deutschen Gesellschaft fr Hals- Nasen- Ohren-Heilkunde, Kopf- und Hals

$59.99
Interferon Alpha-2: Pre-Clinical and Clinical Evaluation

Interferon Alpha-2: Pre-Clinical and Clinical Evaluation

$84.99
Marketing Communications and Brand Development in Emerging Economies Volume I

Marketing Communications and Brand Development in Emerging Economies Volume I

$199.99
Human Impact on the Environment

Human Impact on the Environment

$169.99
My Books Summer Spanish Grade 3 Nonfiction 5-Book Pack

My Books Summer Spanish Grade 3 Nonfiction 5-Book Pack

$29.95
Heaving, Stretching and Spicing Modes

Heaving, Stretching and Spicing Modes

$159.99
Organic Reactions and Their Mechanisms

Organic Reactions and Their Mechanisms

$99.99
Gender and Class Consciousness

Gender and Class Consciousness

$44.99
Contributions to Econometric Theory and Application

Contributions to Econometric Theory and Application

$84.99
Advanced Digital System Design using SoC FPGAs

Advanced Digital System Design using SoC FPGAs

$109.99
Livelihood Strategies in Southern India

Livelihood Strategies in Southern India

$109.99
Frontiers of Expert Systems

Frontiers of Expert Systems

$169.99
Rethinking Victorian Culture

Rethinking Victorian Culture

$109.99
Biomedical Visualisation

Biomedical Visualisation

$109.99
Mathematics in Industrial Problems

Mathematics in Industrial Problems

$109.99
PHP 7 Quick Scripting Reference

PHP 7 Quick Scripting Reference

$24.99
Beam Effects, Surface Topography, and Depth Profiling in Surface Analysis

Beam Effects, Surface Topography, and Depth Profiling in Surface Analysis

$129.00
Open Foresight-Prozesse

Open Foresight-Prozesse

$54.99
UWB Communication Systems: Conventional and GHz

UWB Communication Systems: Conventional and GHz

$109.99
Intelligent Transport Systems

Intelligent Transport Systems

$59.99
Cancer Gene Profiling

Cancer Gene Profiling

$84.99
Trade, Growth, and Economic Policy in Open Economies

Trade, Growth, and Economic Policy in Open Economies

$54.99
Mathematical and Engineering Methods in Computer Science

Mathematical and Engineering Methods in Computer Science

$84.99
Rumi and Shams Silent Rebellion

Rumi and Shams Silent Rebellion

$129.99
Die Elbe im Spannungsfeld zwischen kologie und konomie

Die Elbe im Spannungsfeld zwischen kologie und konomie

$59.99
Microstructure-Property Correlations for Hard, Superhard, and Ultrahard Materials

Microstructure-Property Correlations for Hard, Superhard, and Ultrahard Materials

$109.99
Decision and Game Theory for Security

Decision and Game Theory for Security

$54.99
The Laser Inventor

The Laser Inventor

$59.99
Systolic Time Intervals

Systolic Time Intervals

$109.99
Untersuchung ber energiesparende Manahmen in der wrmeintensiven Industrie

Untersuchung ber energiesparende Manahmen in der wrmeintensiven Industrie

$79.99
Scientific Computing in Electrical Engineering

Scientific Computing in Electrical Engineering

$109.99
Stranded

Stranded

$5.99
Chica confeti

Chica confeti

$3.74
Lie Group Actions in Complex Analysis

Lie Group Actions in Complex Analysis

$39.99
Give Peace a Chant

Give Peace a Chant

$109.99
Social and Environmental Impacts in the North: Methods in Evaluation of Socio-Economic and Environme

Social and Environmental Impacts in the North: Methods in Evaluation of Socio-Economic and Environme

$329.99
Chato's Kitchen

Chato's Kitchen

$6.50
Security of Natural Gas Supply through Transit Countries

Security of Natural Gas Supply through Transit Countries

$84.99
Hedges in Chinese-English Conference Interpreting

Hedges in Chinese-English Conference Interpreting

$54.99
Polymere: Synthese, Eigenschaften und Anwendungen

Polymere: Synthese, Eigenschaften und Anwendungen

$64.99
previous
next