logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Pseudorandomness And Cryptographic Applications Michael Luby

  • SKU: BELL-51948432
Pseudorandomness And Cryptographic Applications Michael Luby
$ 35.00 $ 45.00 (-22%)

4.8

24 reviews

Pseudorandomness And Cryptographic Applications Michael Luby instant download after payment.

Publisher: Princeton University Press
File Extension: PDF
File size: 18.83 MB
Pages: 248
Author: Michael Luby
ISBN: 9780691206844, 0691206848
Language: English
Year: 2019

Product desciption

Pseudorandomness And Cryptographic Applications Michael Luby by Michael Luby 9780691206844, 0691206848 instant download after payment.

A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack.



There do not seem to be natural examples of functions that are pseudorandom generators. On the other hand, there do seem to be a variety of natural examples of another basic primitive: the one-way function. A function is one-way if it is easy to compute but hard for any efficient adversary to invert on average.



The first half of the book shows how to construct a pseudorandom generator from any one-way function. Building on this, the second half of the book shows how to construct other useful cryptographic primitives, such as private key cryptosystems, pseudorandom function generators, pseudorandom permutation generators, digital signature schemes, bit commitment protocols, and zero-knowledge interactive proof systems. The book stresses rigorous definitions and proofs.

Related Products