Randomness and Secrecy - A Brief Introduction (original) (raw)

Review Paper on PROBABILISTIC ENCRYPTION

Nishu Sharma

View PDFchevron_right

Probabilistic Encryption--A Practical Implementation

Phú Lê

2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009

View PDFchevron_right

Randomness in Digital Cryptography: A Survey

Iosif Ignat

SCIENCE AND TECHNOLOGY, 2010

View PDFchevron_right

A Probabilistic Data Encryption scheme (PDES)

geoffrey muketha

Journal of Natural Sciences Research, 2013

View PDFchevron_right

Pseudorandomness and cryptographic applications

Michael Luby

1996

View PDFchevron_right

Public Randomness in Cryptography

Amir Herzberg

Advances in Cryptology — CRYPTO’ 92, 1993

View PDFchevron_right

Characterization of Security Notions for Probabilistic Private-Key Encryption

Jonathan Katz

2006

View PDFchevron_right

On the Power of Correlated Randomness in Secure Computation

Anat Paskin-Cherniavsky

Lecture Notes in Computer Science, 2013

View PDFchevron_right

Pseudo-probabilistic block ciphers and their randomization

Minh Hieu

Journal of Ambient Intelligence and Humanized Computing, 2018

View PDFchevron_right

Cryptography, Statistics and Pseudo-Randomness (Part I)

Richard Gill

View PDFchevron_right

On the (Im)possibility of Cryptography with Imperfect Randomness

Amit Sahai

45th Annual IEEE Symposium on Foundations of Computer Science

View PDFchevron_right

Randomness reuse: extensions and improvements

Manuel Barbosa

2007

View PDFchevron_right

Probabilistic Confidentiality Properties based on Indistinguishability

Thomas Santen

Schutz und Zuverl?ssigkeit, 2005

View PDFchevron_right

Randomized Text Encryption: a New Dimension in Cryptography

Chiroma Haruna

View PDFchevron_right

Pseudorandom functions revisited: the cascade construction and its concrete security

Ran Canetti

Proceedings of 37th Conference on Foundations of Computer Science, 1996

View PDFchevron_right

Semantic security for the McEliece cryptosystem without random oracles

Hideki Imai

Designs, Codes and Cryptography, 2008

View PDFchevron_right

Cryptography, Statistics and Pseudo-Randomness (Part II)

Richard Gill

View PDFchevron_right

This is a Chapter from the Handbook of Applied Cryptography, by A Overview of Cryptography

Mert Demirok

View PDFchevron_right

Randomness, Computation and Mathematics

Rod Downey

Lecture Notes in Computer Science, 2012

View PDFchevron_right

A New Cryptographic Approach: Iterated Random Encryption (IRE)

Osvaldo Skliar

ArXiv, 2018

View PDFchevron_right

On a Probabilistic Appproach to the Security Analysis of Cryptographic Hash Functions

Giovanni Schmid

2004

View PDFchevron_right

Cryptography: A Brief Overview

Mohan Hg

View PDFchevron_right

A Mathematical Theory of Cryptography

sean gao

View PDFchevron_right

Performance rating of new encryption algorithms with prominence on probabilistic encryption

Nishu Sharma

View PDFchevron_right

THE MATHEMATICAL FOUNDATIONS OF RANDOMNESS

Zayin Lezayen

View PDFchevron_right

How to construct random functions

Sreenandita Chatterjee

Journal of The ACM, 1986

View PDFchevron_right

An Ordeal Random Data Encryption Scheme (ORDES)

Dr. Ramveer Singh

International Journal of Engineering Science, 2010

View PDFchevron_right