{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:21Z","timestamp":1725488661302},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540564133"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-47555-9_25","type":"book-chapter","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T23:23:49Z","timestamp":1186615429000},"page":"297-306","source":"Crossref","is-referenced-by-count":0,"title":["Uniform Results in Polynomial-Time Security"],"prefix":"10.1007","author":[{"given":"Paul","family":"Barbaroux","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"O. Goldreich, H. Krawcyzk, M. Luby, \u201cOn the Existence of Pseudorandom Generators,\u201d, Proc. FOCS 1988, pp. 12\u201324.","DOI":"10.1109\/SFCS.1988.21917"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"O. Goldreich, L.A Levin, \u201cA Hard-Core Predicate For All One-Way Function\u201d, Proc. STOC 1989, pp. 25\u201332.","DOI":"10.1145\/73007.73010"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"J. Hastad, \u201cPseudorandom Generators Under Uniform Assumptions\u201d, Proc. STOC 1990, pp. 395\u2013404.","DOI":"10.1145\/100216.100270"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"R. Impagliazzo, L.A. Levin, M. Luby, \u201cPseudo-Random Generation from One-Way Functions\u201d, Proc. STOC 1989, pp. 12\u201324.","DOI":"10.1145\/73007.73009"},{"issue":"4","key":"25_CR5","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BF02579323","volume":"7","author":"L.A. Levin","year":"1987","unstructured":"L.A. Levin, \u201cOne-Way Functions and Pseudorandom Generators\u201d, Combinatorica 7(4), pp. 357\u2013363, 1987.","journal-title":"Combinatorica"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"J. Rompel, \u201cOne-Way Functions are Necessary and sufficient for Secure Signatures\u201d, Proc. STOC 1990, pp. 387\u2013394.","DOI":"10.1145\/100216.100269"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"A.W. Schrift, A. Shamir, \u201cOn the Universality of the Next Bit Test\u201d, Proc. CRYPTO 1990, pp. 394\u2013408.","DOI":"10.1007\/3-540-38424-3_29"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"A.C. Yao, \u201cTheory and Applications of Trapdoor Functions\u201d, Proc. FOCS 1982, pp. 80\u201391.","DOI":"10.1109\/SFCS.1982.45"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47555-9_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:13:57Z","timestamp":1605647637000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47555-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540564133"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-47555-9_25","relation":{},"subject":[]}}