{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T19:54:03Z","timestamp":1718049243998},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,7,25]],"date-time":"2012-07-25T00:00:00Z","timestamp":1343174400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Theory Comput Syst"],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1007\/s00224-012-9418-z","type":"journal-article","created":{"date-parts":[[2012,7,24]],"date-time":"2012-07-24T07:49:46Z","timestamp":1343116186000},"page":"162-178","source":"Crossref","is-referenced-by-count":5,"title":["One-Way Functions Using Algorithmic and Classical Information Theories"],"prefix":"10.1007","volume":"52","author":[{"given":"Lu\u00eds","family":"Antunes","sequence":"first","affiliation":[]},{"given":"Armando","family":"Matos","sequence":"additional","affiliation":[]},{"given":"Alexandre","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9","family":"Souto","sequence":"additional","affiliation":[]},{"given":"Andreia","family":"Teixeira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,25]]},"reference":[{"key":"9418_CR1","first-page":"200","volume-title":"Proceedings of International Conference on Random Structures and Algorithms","author":"B. Barak","year":"2003","unstructured":"Barak, B., Shaltiel, R., Wigderson, A.: Computational analogues of entropy. In: Proceedings of International Conference on Random Structures and Algorithms, pp. 200\u2013215 (2003)"},{"issue":"4","key":"9418_CR2","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1137\/0213053","volume":"13","author":"M. Blum","year":"1984","unstructured":"Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput. 13(4), 850\u2013864 (1984)","journal-title":"SIAM J. Comput."},{"key":"9418_CR3","series-title":"ETH Series in Information Security and Cryptography","volume-title":"Entropy Measures and Unconditional Security in Cryptography","author":"C. Cachin","year":"1997","unstructured":"Cachin, C.: Entropy Measures and Unconditional Security in Cryptography, 1st edn. ETH Series in Information Security and Cryptography. Hartung-Gorre, Konstanz (1997)","edition":"1"},{"issue":"4","key":"9418_CR4","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1145\/321356.321363","volume":"13","author":"G. Chaitin","year":"1966","unstructured":"Chaitin, G.: On the length of programs for computing finite binary sequences. J. ACM 13(4), 547\u2013569 (1966)","journal-title":"J. ACM"},{"key":"9418_CR5","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T. Cover","year":"1991","unstructured":"Cover, T., Thomas, J.: Elements of Information Theory. Wiley-Interscience, New York (1991)"},{"key":"9418_CR6","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O.: Foundations of Cryptography. Cambridge University Press, Cambridge (2001)"},{"issue":"2","key":"9418_CR7","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"9418_CR8","doi-asserted-by":"crossref","first-page":"2426","DOI":"10.1016\/j.ins.2009.03.002","volume":"179","author":"L. Golshani","year":"2009","unstructured":"Golshani, L., Pasha, E., Yari, G.: Some properties of Renyi entropy and Renyi entropy rate. Inf. Sci. 179, 2426\u20132433 (2009)","journal-title":"Inf. Sci."},{"key":"9418_CR9","first-page":"12","volume-title":"Proceedings of Symposium on Theory of Computing\u201989","author":"R. Impagliazzo","year":"1989","unstructured":"Impagliazzo, R., Levin, L., Luby, M.: Pseudo-random generation from one-way functions. In: Proceedings of Symposium on Theory of Computing\u201989, pp. 12\u201324. ACM, New York (1989)"},{"key":"9418_CR10","volume-title":"Proceedings of Symposium on Foundations of Computer Science\u201989","author":"R. Impagliazzo","year":"1989","unstructured":"Impagliazzo, R., Luby, M.: One-way functions are essential for complexity based cryptography. In: Proceedings of Symposium on Foundations of Computer Science\u201989 (1989)"},{"key":"9418_CR11","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.aop.2004.01.002","volume":"312","author":"P. Jizba","year":"2004","unstructured":"Jizba, P., Arimitsu, T.: The world according to Renyi: thermodynamics of multifractal systems. Ann. Phys. 312, 17 (2004)","journal-title":"Ann. Phys."},{"issue":"1","key":"9418_CR12","first-page":"1","volume":"1","author":"A. Kolmogorov","year":"1965","unstructured":"Kolmogorov, A.: Three approaches to the quantitative definition of information. Probl. Inf. Transm. 1(1), 1\u20137 (1965)","journal-title":"Probl. Inf. Transm."},{"key":"9418_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-49820-1","volume-title":"An Introduction to Kolmogorov Complexity and Its Applications","author":"M. Li","year":"2008","unstructured":"Li, M., Vit\u00e1nyi, P.: An Introduction to Kolmogorov Complexity and Its Applications. Springer, Berlin (2008)"},{"issue":"2","key":"9418_CR14","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/0020-0190(93)90204-M","volume":"46","author":"L. Longpr\u00e9","year":"1993","unstructured":"Longpr\u00e9, L., Mocas, S.: Symmetry of information and one-way functions. Inf. Process. Lett. 46(2), 95\u2013100 (1993)","journal-title":"Inf. Process. Lett."},{"issue":"1","key":"9418_CR15","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1006\/inco.1995.1120","volume":"121","author":"L. Longpr\u00e9","year":"1995","unstructured":"Longpr\u00e9, L., Watanabe, O.: On symmetry of information and polynomial time invertibility. Inf. Comput. 121(1), 14\u201322 (1995)","journal-title":"Inf. Comput."},{"key":"9418_CR16","first-page":"169","volume-title":"Proceedings of EUROCRYPT\u201907","author":"C. Lu","year":"2007","unstructured":"Lu, C., Reyzin, L.: Conditional computational entropy, or toward separating pseudoentropy from compressibility. In: Proceedings of EUROCRYPT\u201907, pp. 169\u2013186 (2007)"},{"key":"9418_CR17","volume-title":"Computational Complexity","author":"C. Papadimitriou","year":"1994","unstructured":"Papadimitriou, C.: Computational Complexity. Addison-Wesley, Reading (1994)"},{"key":"9418_CR18","doi-asserted-by":"crossref","first-page":"944","DOI":"10.1007\/s00224-009-9177-7","volume":"45","author":"A. Pinto","year":"2009","unstructured":"Pinto, A.: Comparing notions of computational entropy. Theory Comput. Syst. 45, 944\u2013962 (2009)","journal-title":"Theory Comput. Syst."},{"key":"9418_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/11593447_11","volume-title":"Advances in Cryptology\u2014ASIACRYPT 2005","author":"R. Renner","year":"2005","unstructured":"Renner, R., Wolf, S.: Simple and tight bounds for information reconciliation and privacy amplification. In: Advances in Cryptology\u2014ASIACRYPT 2005. Lecture Notes in Computer Science, pp. 199\u2013216. Springer, Berlin (2005)"},{"key":"9418_CR20","first-page":"387","volume-title":"Proceedings of Symposium on Theory of Computing\u201990","author":"J. Rompel","year":"1990","unstructured":"Rompel, J.: One-way functions are necessary and sufficient for secure signatures. In: Proceedings of Symposium on Theory of Computing\u201990, pp. 387\u2013394. ACM, New York (1990)"},{"issue":"1","key":"9418_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0019-9958(64)90223-2","volume":"7","author":"R. Solomonoff","year":"1964","unstructured":"Solomonoff, R.: A formal theory of inductive inference, part I. Inf. Control 7(1), 1\u201322 (1964)","journal-title":"Inf. Control"},{"key":"9418_CR22","first-page":"80","volume-title":"Proceedings of Symposium on Foundations of Computer Science","author":"A. Yao","year":"1982","unstructured":"Yao, A.: Theory and applications of trapdoor functions (extended abstract). In: Proceedings of Symposium on Foundations of Computer Science, pp. 80\u201391 (1982)"},{"key":"9418_CR23","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1070\/RM1970v025n06ABEH001269","volume":"256","author":"A. Zvonkin","year":"1970","unstructured":"Zvonkin, A., Levin, L.: The complexity of finite objects and the development of the concepts of information and randomness by means of the theory of algorithms. Russian Mathematics Surveys 256, 83\u2013124 (1970)","journal-title":"Russian Mathematics Surveys"}],"container-title":["Theory of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00224-012-9418-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00224-012-9418-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00224-012-9418-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T07:54:24Z","timestamp":1558684464000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00224-012-9418-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,25]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"alternative-id":["9418"],"URL":"https:\/\/doi.org\/10.1007\/s00224-012-9418-z","relation":{},"ISSN":["1432-4350","1433-0490"],"issn-type":[{"value":"1432-4350","type":"print"},{"value":"1433-0490","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,25]]}}}