Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Advances in Cryptology

Best Price (Coupon Required):
Buy Advances in Cryptology for $36.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $39.99 - $39.99
BEST PRICE

Single Product Purchase

$36.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$39.99 $39.99

10% OFF
This deals requires coupon
$36.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783540395683
Condition
New
Product Description

Recently, there has been a lot of interest in provably "good" pseudo-random number generators [lo, 4, 14, 31. These cryptographically secure generators are "good" in the sense that they pass all probabilistic polynomial time statistical tests. However, despite these nice properties, the secure generators known so far suffer from the han- cap of being inefiicient; the most efiicient of these take n2 steps (one modular multip- cation, n being the length of the seed) to generate one bit. Pseudc-random number g- erators that are currently used in practice output n bits per multiplication (n2 steps). An important open problem was to output even two bits on each multiplication in a cryptographically secure way. This problem was stated by Blum, Blum & Shub [3] in the context of their z2 mod N generator. They further ask: how many bits can be o- put per multiplication, maintaining cryptographic security? In this paper we state a simple condition, the XOR-Condition and show that any generator satisfying this condition can output logn bits on each multiplication. We show that the XOR-Condition is satisfied by the lop least significant bits of the z2-mod N generator. The security of the z2 mod N generator was based on Quadratic Residu- ity [3]. This generator is an example of a Trapdoor Generator [13], and its trapdoor properties have been used in protocol design. We strengthen the security of this gene- tor by proving it as hard as factoring.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Statistik in der Epidemiologie psychischer Strungen

Statistik in der Epidemiologie psychischer Strungen

$44.99
Composite Synthetic Scaffolds for Tissue Engineering and Regenerative Medicine

Composite Synthetic Scaffolds for Tissue Engineering and Regenerative Medicine

$54.99
Analysis of Images, Social Networks and Texts

Analysis of Images, Social Networks and Texts

$54.99
Technologies in Biomedical and Life Sciences Education

Technologies in Biomedical and Life Sciences Education

$189.00
Infections in the Adult Intensive Care Unit

Infections in the Adult Intensive Care Unit

$109.99
Adenovirus

Adenovirus

$109.99
Towards Implementation of Sustainability Concepts in Developing Countries

Towards Implementation of Sustainability Concepts in Developing Countries

$199.99
Basic and Advanced Laboratory Techniques in Histopathology and Cytology

Basic and Advanced Laboratory Techniques in Histopathology and Cytology

$84.99
New England Nation

New England Nation

$54.99
Proceedings of the 10th Hydrogen Technology Convention, Volume 1

Proceedings of the 10th Hydrogen Technology Convention, Volume 1

$59.99
Atlas of Pediatric Cataract

Atlas of Pediatric Cataract

$219.99
Hollywood and the Box Office

Hollywood and the Box Office

$44.99
Huawei Goes Global

Huawei Goes Global

$109.00
The Chemical Structure of Solids

The Chemical Structure of Solids

$109.99
Rethinking Chicana/o Literature through Food

Rethinking Chicana/o Literature through Food

$54.99
Compliance in der Unternehmerpraxis

Compliance in der Unternehmerpraxis

$44.99
Innovative Technologies and Learning

Innovative Technologies and Learning

$54.99
Hidden Dynamics

Hidden Dynamics

$129.99
Calcium in Muscle Activation

Calcium in Muscle Activation

$74.99
Toward an Anthropology of Graphing

Toward an Anthropology of Graphing

$109.99
Der Anti-Stress-Trainer

Der Anti-Stress-Trainer

$29.99
Familie  Beruf  Karriere

Familie Beruf Karriere

$64.99
Untersuchungsverfahren in Dermatologie und Venerologie

Untersuchungsverfahren in Dermatologie und Venerologie

$64.99
Digitale Hardware/Software-Systeme

Digitale Hardware/Software-Systeme

$39.99
Soziales im Netz

Soziales im Netz

$79.99
Advances in Energy and Control Systems

Advances in Energy and Control Systems

$249.99
Wolf Hollow

Wolf Hollow

$6.74
Trust Management

Trust Management

$54.99
Reincarnating Experience in Education

Reincarnating Experience in Education

$39.99
Cancer Cell Lines Part 1

Cancer Cell Lines Part 1

$129.00
A Step-by-Step Guide to Conducting an Integrative Review

A Step-by-Step Guide to Conducting an Integrative Review

$49.99
South Africa's Post-Apartheid Military

South Africa's Post-Apartheid Military

$109.99
Innovation Interactions Between Knowledge-Intensive Business Services And And Medium-Sized Ent

Innovation Interactions Between Knowledge-Intensive Business Services And And Medium-Sized Ent

$54.99
E-Business and Telecommunications

E-Business and Telecommunications

$54.99
Artificial Intelligence. ECAI 2023 International Workshops

Artificial Intelligence. ECAI 2023 International Workshops

$119.99
Pediatric Liver Intensive Care

Pediatric Liver Intensive Care

$139.99
Optimum Design of Structures

Optimum Design of Structures

$109.99
Proceedings of the International Conference on Transformations in Engineering Education

Proceedings of the International Conference on Transformations in Engineering Education

$169.99
Force of Nature: A Novel of Rachel Carson (Hardcover)

Force of Nature: A Novel of Rachel Carson (Hardcover)

$14.99
Geography Education in Japan

Geography Education in Japan

$109.99
previous
next