-
1
Efficient Quantum Pseudorandomness
Published 2018“…Fully random transformations require exponential time for either classical or quantum systems, but in man y cases pseudorandom operations can emulate certain properties of truly random ones. …”
Get full text
Get full text
Article -
2
-
3
-
4
Functional Signatures and Pseudorandom Functions
Published 2014“…As a special case, this implies pseudorandom functions with selective access, where one can delegate the ability to evaluate the pseudorandom function on inputs y for which a predicate P(y) = 1 holds. …”
Get full text
Get full text
Article -
5
Cryptanalysis of pseudorandom number generator
Published 2024“…A pseudorandom number generator (PRNG) is an algorithm for generating a sequence of random-like numbers. …”
Get full text
Final Year Project (FYP) -
6
-
7
Extremal results in sparse pseudorandom graphs
Published 2015“…The main advance of this paper lies in a new counting lemma, proved following the functional approach of Gowers, which complements the sparse regularity lemma of Kohayakawa and Rodl, allowing us to count small graphs in regular subgraphs of a sufficiently pseudorandom graph. We use this to prove sparse extensions of several well-known combinatorial theorems, including the removal lemmas for graphs and groups, the Erdos–Stone–Simonovits theorem and Ramsey's theorem. …”
Get full text
Article -
8
Pseudorandom functions with structure : extensions and implications
Published 2015Get full text
Thesis -
9
Chaotic pseudorandom sequences and the security of cryptosystems
Published 2015“…This paper intends to review the development of chaotic pseudorandom number generators through the years and the statistical tests they are required to pass as a measure of their randomness.…”
Get full text
Book Section -
10
Low complexity pseudorandom generators and indistinguishability obfuscation
Published 2018Get full text
Thesis -
11
Post-Quantum Verifiable Oblivious Pseudorandom Functions
Published 2024“…This work presents the construction of a post-quantum verifiable oblivious pseudorandom function (VOPRF) with a focus on efficiency and practicality. …”
Get full text
Thesis -
12
Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation
Published 2021“…Lin and Tessaro (ePrint 2017) recently proposed indistinguishability obfuscation (IO) and functional encryption (FE) candidates and proved their security based on two assumptions: a standard assumption on bilinear maps and a non-standard assumption on “Goldreich-like” pseudorandom generators. In a nutshell, their second assumption requires the existence of pseudorandom generators G:[q] n → {0,1} m for some poly(n) -size alphabet q, each of whose output bits depend on at most two in put alphabet symbols, and which achieve sufficiently large stretch. …”
Get full text
Article -
13
Robustness of Average-Case Meta-Complexity via Pseudorandomness
Published 2022Get full text
Article -
14
Z8-Kerdock codes and pseudorandom binary sequences
Published 2013Get full text
Get full text
Journal Article -
15
Generation and statistical analysis of chaos-based pseudorandom sequences
Published 2019“…A deterministically generated pseudorandom (appear to be random) numbers are therefore relied upon. …”
Get full text
Thesis -
16
Pseudorandom dynamics of frequency combs in free-running quantum cascade lasers
Published 2018“…With this model, we confirm that the most efficient mode of operation of a free-running quantum cascade laser is indeed a pseudorandom frequency-modulated field with nearly constant intensity. …”
Get full text
Get full text
Get full text
Article -
17
Elliptic curves and cryptography : a pseudorandom bit generator and other tools
Published 2005Get full text
Thesis -
18
A New Trend of Pseudorandom Number Generator using Multiple Chaotic Systems
Published 2018Get full text
Article -
19
Limitations of the Impagliazzo–Nisan–Wigderson Pseudorandom Generator Against Permutation Branching Programs
Published 2024“…The classic Impagliazzo–Nisan–Wigderson (INW) pseudorandom generator (PRG) (STOC ‘94) for space-bounded computation uses a seed of length 𝑂(log𝑛⋅log(𝑛𝑤/ε)+log𝑑) to fool ordered branching programs of length n, width w, and alphabet size d to within error ε . …”
Get full text
Article -
20