Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Hard-core predicate

Known as: Trapdoor predicate, Goldreich-Levin theorem, Goldreich-Levin Construction 
In cryptography, a hard-core predicate of a one-way function f is a predicate b (i.e., a function whose output is a single bit) which is easy to… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
We propose a new tree-based ORAM scheme called Circuit ORAM. Circuit ORAM makes both theoretical and practical contributions… Expand
  • table 1
  • figure 2
  • figure 3
  • table 2
  • table 3
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Secure two-party computation is a rapidly emerging field of research and enables a large variety of privacy-preserving… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2012
Highly Cited
2012
We devise the first identity-based encryption (IBE) that remains secure even when the adversary is equipped with auxiliary input… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Lattice-based signature schemes following the Goldreich–Goldwasser–Halevi (GGH) design have the unusual property that each… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
This paper provides a framework for developing sampling designs in mixed methods research. First, we present sampling schemes… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We introduce a unifying framework for proving that predicate P is hard-core for a one-way function f, and apply it to a broad… Expand
  • table 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
In many standards, e.g. SSL/TLS, IPSEC, WTLS, messages are first pre-formatted, then encrypted in CBC mode with a block cipher… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Although interest in the links between religion and mental health has increased sharply in recent years, researchers remain far… Expand
  • table 1
  • table 1
  • table 2
  • table 2
  • table 3
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Consider the following setting: A user wishes to retrieve information from a database residing in a remote server (e.g. stock… Expand
Is this relevant?
Highly Cited
1989
Highly Cited
1989
A central tool in constructing pseudorandom generators, secure encryption functions, and in other areas are “hard-core… Expand
Is this relevant?