{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:05:28Z","timestamp":1753887928114},"publisher-location":"New York, NY","reference-count":23,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387973173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34805-0_11","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T02:05:53Z","timestamp":1194573953000},"page":"100-112","source":"Crossref","is-referenced-by-count":10,"title":["Perfect Local Randomness in Pseudo-random Sequences"],"prefix":"10.1007","author":[{"given":"Ueli M.","family":"Maurer","sequence":"first","affiliation":[]},{"given":"James L.","family":"Massey","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/0196-6774(86)90019-2","volume":"7","author":"N. Alon","year":"1986","unstructured":"N. Alon, L. Babai and A. Itai, A fast and simple randomized parallel algorithm for the maximal independent set problem, Journal of Algorithms, Vol. 7, pp. 567\u2013583, 1986.","journal-title":"Journal of Algorithms"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L. Blum","year":"1986","unstructured":"L. Blum, M. Blum and M. Shub, A simple unpredictable pseudo-random number generator, SIAM J. on Computing, Vol. 15, pp. 364\u2013383, 1986.","journal-title":"SIAM J. on Computing"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1137\/0213053","volume":"13","author":"M. Blum","year":"1984","unstructured":"M. Blum and S. Micali, How to generate cryptographically strong sequences of pseudorandom bits, SIAM J. on Computing, Vol. 13, pp. 850\u2013864, 1984.","journal-title":"SIAM J. on Computing"},{"issue":"1","key":"11_CR4","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/0885-064X(89)90015-0","volume":"5","author":"B. Chor","year":"1989","unstructured":"B. Chor and O. Goldreich, On the power of two-point based sampling, Journal of Complexity, Vol. 5, No. 1, pp. 96\u2013106, 1989.","journal-title":"Journal of Complexity"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"B. Chor, O. Goldreich, J. Hastad, J. Freidmann, S. Rudich and R. Smolensky, The bit extraction problem or t-resilient functions, Proc. 26th ann. Symp. on Foundations of Computer Science, pp. 396\u2013407, 1985.","DOI":"10.1109\/SFCS.1985.55"},{"key":"11_CR6","unstructured":"P. Delsarte, An algebraic approach to the association schemes of coding theory, Philips Research Reports Supplements, No. 10, 1973."},{"issue":"2","key":"11_CR7","doi-asserted-by":"publisher","first-page":"381","DOI":"10.2307\/2038147","volume":"29","author":"A. Joffe","year":"1971","unstructured":"A. Joffe, On a sequence of almost deterministic pairwise independent random variables, Proc. Amer. Math. Soc, Vol. 29, No. 2, pp. 381\u2013382, July 1971.","journal-title":"Proc. Amer. Math. Soc"},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1214\/aop\/1176996762","volume":"2","author":"A. Joffe","year":"1974","unstructured":"A. Joffe, On a set of almost deterministic \u03ba-independent random variables, The Annals of Probability, Vol. 2, No. 1, pp. 161\u2013162, 1974.","journal-title":"The Annals of Probability"},{"key":"11_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-322-96647-6","volume-title":"Primality and cryptography","author":"E. Kranakis","year":"1986","unstructured":"E. Kranakis, Primality and cryptography, Stuttgart and New York: Wiley-Teubner Series in Computer Science, 1986."},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1214\/aoms\/1177700007","volume":"36","author":"H.O. Lancaster","year":"1965","unstructured":"H.O. Lancaster, Pairwise statistical independence, Ann. Math. Statist., Vol. 36, pp. 1313\u20131317, 1965.","journal-title":"Ann. Math. Statist."},{"issue":"4","key":"11_CR11","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1137\/0215074","volume":"15","author":"M. Luby","year":"1986","unstructured":"M. Luby, A simple parallel algorithm for the maximal independent set problem, SIAM J. on Computing, Vol. 15, No. 4, pp. 1036\u20131053, Nov. 1986.","journal-title":"SIAM J. on Computing"},{"key":"11_CR12","volume-title":"The theory of error-correcting codes","author":"F.J. MacWilliams","year":"1986","unstructured":"F.J. MacWilliams and N.J.A. Sloane, The theory of error-correcting codes, Amsterdam, New York, Oxford: North-Holland Publishing Company, Fifth Printing, 1986."},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/TIT.1977.1055688","volume":"IT-23","author":"R.J. McEliece","year":"1977","unstructured":"R.J. McEliece, E.R. Rodemich, H.C. Rumsey and L.R. Welch, New upper bounds on the rate of a code via the Delsarte-MacWilliams inequalities, IEEE Trans. Info. Th., Vol. IT-23, pp. 157\u2013166, 1977.","journal-title":"IEEE Trans. Info. Th."},{"key":"11_CR14","unstructured":"S. Micali and C.P. Schnorr, Efficient, perfect random number generators, Preprint MIT, Universit\u00e4t Frankfurt, Nov. 1988."},{"issue":"10","key":"11_CR15","first-page":"2135","volume":"63","author":"L.H. Ozarow","year":"1984","unstructured":"L.H. Ozarow and A. D. Wyuer, Wire-tap channel II, AT&T Bell Lab. Tech. J., Vol. 63, No. 10, pp. 2135\u20132157, Dec. 1984.","journal-title":"Tech. J."},{"key":"11_CR16","unstructured":"J.-M. Piveteau, Local pseudorandom generators, Preprint, ETH Z\u00fcrich, 1989."},{"key":"11_CR17","volume-title":"Constructions and combinatorial problems in Design of Experiments","author":"D. Raghavarao","year":"1971","unstructured":"D. Raghavarao, Constructions and combinatorial problems in Design of Experiments, New York: Wiley, 1971."},{"key":"11_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/3-540-45961-8_19","volume-title":"Proc. EUROCRYPT\u201988","author":"C.P. Schnorr","year":"1988","unstructured":"C.P. Schnorr, On the construction of random number generators and random function generators, Proc. EUROCRYPT\u201988, Lecture Notes in Computer Science, Vol. 330, Springer Verlag, pp. 225\u2013232, 1988."},{"key":"11_CR19","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"C.E. Shannon, A mathematical theory of communication, Bell Syst. Tech. J., Vol. 27, pp. 379\u2013423 and 623\u2013656, 1948.","journal-title":"Bell Syst. Tech. J."},{"key":"11_CR20","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1109\/TIT.1987.1057356","volume":"IT-33","author":"T. Verhoeff","year":"1987","unstructured":"T. Verhoeff, An updated table of minimum-distance bounds for binary linear codes, IEEE Trans. Info. Th., Vol. IT-33, pp. 665\u2013680, 1987.","journal-title":"IEEE Trans. Info. Th."},{"key":"11_CR21","volume-title":"Sequential Decoding","author":"J.M. Wozencraft","year":"1961","unstructured":"J.M. Wozencraft and B. Reiffen, Sequential Decoding, MIT Press, Cambridge, MA, 1961."},{"key":"11_CR22","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/18.6037","volume":"34","author":"G.Z. Xiao","year":"1988","unstructured":"G.Z. Xiao and J.L. Massey, A spectral characterization of correlation-immune combining functions, IEEE Trans. Inform. Theory, Vol. 34, pp. 569\u2013571, 1988.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"A.C. Yao, Theory and applications of trapdoor functions, Proc. 23rd IEEE Symposium on Foundations of Computer Science, pp. 80\u201391, 1982.","DOI":"10.1109\/SFCS.1982.45"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34805-0_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:28:01Z","timestamp":1619501281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34805-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387973173"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/0-387-34805-0_11","relation":{},"subject":[]}}