Abstract
The extent to which conventional cryptographic primitives such as encryption and authentication can be built based on imperfect sources of randomness was examined. In particular, the class of "cryptographic" sources was compared with the well studied classes of weak and extractable random sources. The results illustrate that the set of sources sufficient for various cryptographic applications seems to be quite different from the well studied classes, and also strongly depends on the cryptographic task at hand.
Original language | English (US) |
---|---|
Title of host publication | Annual Symposium on Foundations of Computer Science - Proceedings |
Editors | D.C. Martin |
Pages | 376-385 |
Number of pages | 10 |
State | Published - 2002 |
Event | The 34rd Annual IEEE Symposium on Foundations of Computer Science - Vancouver, BC, Canada Duration: Nov 16 2002 → Nov 19 2002 |
Other
Other | The 34rd Annual IEEE Symposium on Foundations of Computer Science |
---|---|
Country/Territory | Canada |
City | Vancouver, BC |
Period | 11/16/02 → 11/19/02 |
ASJC Scopus subject areas
- Hardware and Architecture