Some applications of pairwise independence Research Seminar in Cryptography

نویسنده

  • Margus Niitsoo
چکیده

This report provides a brief review of lectures given by Michael Luby and Avi Wigderson in 1995 on the topic of pairwise independence and derandomization. We show that BPP ⊂ ∆2 with a proof given by Sipser in 1983 and then exhibit different ways of recycling random bits given by Chor and Goldreich (1989), Nisan (1992), Impagliazzo and Zuckerman (1990), Karp, Pippenger and Sipser (1986) and by Ajtai, Komloś and Szemerédi (1987). The article is mainly intended to show the power and applications of pairwise independent distributions in both complexity theory and in generating and recycling pseudorandom bits. 1 Pairwise independence and tools of the trade We look at a group of random variables Z = {Zu : u ∈ U} where U is an index set for the variables with |U | = N . Each Zi takes values

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Symmetric Cryptography Dagstuhl Seminar

From .. to .., the Dagstuhl Seminar 07021 Symmetric Cryptography was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put toget...

متن کامل

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

Cryptography 3 New Techniques for Cryptanalysis of Hash Functions and Improved

From 16.09.2007 to 21.09.2007 the Dagstuhl Seminar 07381 Cryptography was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put ...

متن کامل

INDEPENDENT SETS OF SOME GRAPHS ASSOCIATED TO COMMUTATIVE RINGS

Let $G=(V,E)$ be a simple graph. A set $Ssubseteq V$ isindependent set of $G$,  if no two vertices of $S$ are adjacent.The  independence number $alpha(G)$ is the size of a maximumindependent set in the graph. In this paper we study and characterize the independent sets ofthe zero-divisor graph $Gamma(R)$ and ideal-based zero-divisor graph $Gamma_I(R)$of a commutative ring $R$.

متن کامل

A Common Weight Multi-criteria Decision analysis-data Envelopment Analysis Approach with Assurance Region for Weight Derivation from Pairwise Comparison Matrices

Deriving weights from a pairwise comparison matrix (PCM) is a subject for which a wide range of methods have ever been presented. This paper proposes a common weight multi criteria decision analysis-data envelopment analysis (MCDA-DEA) approach with assurance region for weight derivation from a PCM. The proposed model has several merits over the competing approaches and removes the drawbacks of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007