Abstract.
We argue that it is unnatural and undesirable to use the non-uniform model of complexity for practice-oriented security reductions in cryptography.
Received: 2012-08-31
Published Online: 2013-10-08
Published in Print: 2013-11-01
© 2013 by Walter de Gruyter Berlin Boston
You are currently not able to access this content.
You are currently not able to access this content.
Articles in the same Issue
- Masthead
- Another look at non-uniformity
- An asymmetric generalisation of Artin monoids
- Non-associative key establishment for left distributive systems
- On the dimension of matrix representations of finitely generated torsion free nilpotent groups
- On the intersection of subgroups in free groups: Echelon subgroups are inert
- A secret sharing scheme based on the Closest Vector Theorem and a modification to a private key cryptosystem
Articles in the same Issue
- Masthead
- Another look at non-uniformity
- An asymmetric generalisation of Artin monoids
- Non-associative key establishment for left distributive systems
- On the dimension of matrix representations of finitely generated torsion free nilpotent groups
- On the intersection of subgroups in free groups: Echelon subgroups are inert
- A secret sharing scheme based on the Closest Vector Theorem and a modification to a private key cryptosystem