{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:20:44Z","timestamp":1725495644703},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540534334"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46885-4_42","type":"book-chapter","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:15:56Z","timestamp":1195136156000},"page":"423-428","source":"Crossref","is-referenced-by-count":5,"title":["On the Security of Schnorr\u2019s Pseudo Random Generator"],"prefix":"10.1007","author":[{"given":"Rainer A.","family":"Rueppel","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"42_CR1","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1137\/0217013","volume":"17","author":"W. Alexi","year":"1988","unstructured":"W. Alexi, B. Chor, O. Goldreich, and C.P. Schnorr, \u201cRSA and Rabin Functions: Certain Parts are as Hard as the Whole\u201d, SIAM Journal on Comput. 17 (1988), pp.194\u2013209.","journal-title":"SIAM Journal on Comput"},{"key":"42_CR2","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L. Blum","year":"1986","unstructured":"L. Blum, M. Blum, and M. Shub, \u201cA simple unpredictable pseudo-random number generator\u201d, SIAM J. Comput. 15 (1986), pp. 364\u2013383.","journal-title":"SIAM J. Comput."},{"key":"42_CR3","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1137\/0213053","volume":"13","author":"M. Blum","year":"1984","unstructured":"M. Blum, S. Micali, \u201cHow to generate cryptographically strong sequences of pseudo-random bits\u201d, SIAM J. Comput. 13 (1984), pp. 850\u2013864.","journal-title":"SIAM J. Comput."},{"key":"42_CR4","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M.Luby","year":"1988","unstructured":"M.Luby, C. Rackoff, \u201cHow to construct pseudorandom permutations from pseudorandom functions\u201d, SIAM J.Comput. 17 (1988), pp. 373\u2013386.","journal-title":"SIAM J.Comput."},{"key":"42_CR5","unstructured":"U. Maurer, J.L. Massey, \u201cPerfect Local Randomness in Pseudo-random Sequences\u201d, submitted to Crypto 89."},{"key":"42_CR6","unstructured":"S. Micali, C.P. Schnorr, \u201cEfficient, perfect random number generators\u201d Preprint MIT, University of Frankfurt, 1988."},{"key":"42_CR7","volume-title":"A study on data security","author":"Y. Ohnishi","year":"1988","unstructured":"Y. Ohnishi, \u201cA study on data security\u201d, Master Thesis (in Japanese), Tohuku University, Japan, 1988."},{"key":"42_CR8","series-title":"Lect Notes Comput Sci","volume-title":"Proc. Of Eurocrypt 88","author":"C.P. Schnorr","year":"1988","unstructured":"C.P. Schnorr, \u201cOn the construction of random number generators and random function generators\u201d, Proc. Of Eurocrypt 88, Lecture Notes in Computer Science 330, Springer Verlag, 1988."},{"key":"42_CR9","series-title":"Lect Notes Comput Sci","volume-title":"8th International Colloquium on Automata, Languages, and Programming","author":"A. Shamir","year":"1981","unstructured":"A. Shamir, \u201cOn the generation of cryptographically strong pseudo-random sequences\u201d, 8th International Colloquium on Automata, Languages, and Programming, Lecture Notes in Computer Science 62, Springer Verlag, 1981."},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"A.C.Yao, \u201cTheory and applications of trap door functions\u201d, Proc. of the 25th IEEE Symp. on Foundations of Computer Science, New York, 1982.","DOI":"10.1109\/SFCS.1982.45"},{"key":"42_CR11","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of Eurocrypt 89","author":"Y. Zheng","year":"1989","unstructured":"Y. Zheng, T. Matsumoto, H. Imai, \u201cImpossibility and Optimality Results on Constructing Pseudorandom Permutations\u201d, Proceedings of Eurocrypt 89, this Volume, Lecture Notes in Computer Science, Springer Verlag, 1989."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201989"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46885-4_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:49:01Z","timestamp":1619570941000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46885-4_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540534334"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-46885-4_42","relation":{},"subject":[]}}