Contents 1. Introduction 1.1 Cryptography: main topics 1.2 Some background from probability theory 1.3 The computational model 1.4 Motivation to the rigorous treatment 1.5 Miscellaneous 2. Computational difficulty 2.1 One- way functions: motivation 2.2 One-way functions: definitions 2.3 Weak one- way functions imply strong ones 2.4 One-way functions : variations 2.5 Hard-core pr…
Foundations of Cryptography II Basic Applications......Page 4 Contents II Basic Applications......Page 8 List of Figures......Page 12 Preface......Page 14 Acknowledgments......Page 22 5 Encryption Schemes......Page 24 5.1. The Basic Setting......Page 25 5.2. De.nitions of Security......Page 29 5.3. Constructions of Secure Encryption Schemes......Page 54 5.4.* Beyond Eavesdropping Secur…
The interplay between randomness and computation is one of the most fas cinating scientific phenomena uncovered in the last couple of decades. This interplay is at the heart of modern cryptography and plays a fundamental role in complexity theory at large. Specifically, the interplay of randomness and computation is pivotal to several intriguing notions of probabilistic proof systems and is the…