{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T19:20:03Z","timestamp":1748460003285,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE Computer. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/sfcs.2003.1238182","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"68-79","source":"Crossref","is-referenced-by-count":10,"title":["On the implementation of huge random objects"],"prefix":"10.1109","author":[{"given":"O.","family":"Goldreich","sequence":"first","affiliation":[]},{"given":"S.","family":"Goldwasser","sequence":"additional","affiliation":[]},{"given":"A.","family":"Nussboim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The art of computer programming","year":"0","author":"knuth","key":"19"},{"key":"22","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s00145-001-0008-5","article-title":"Constructing pseudo-random permutations with a prescribed structure","volume":"15","author":"naor","year":"2002","journal-title":"Jour of Cryptology"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/S0196-6774(03)00017-8"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258590"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.45"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.3240030206"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2003.1238182"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(90)90010-U"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1137\/0217022"},{"journal-title":"Analytic Methods in the Analysis and Design of Number-Theoretic Algorithms","year":"1985","author":"bach","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1137\/0215020"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(86)90019-2"},{"key":"1","first-page":"297","article-title":"On generating hard, solved instances of computational problem","author":"abadi","year":"0","journal-title":"Crypto88"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46885-4_34"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/0885-064X(89)90015-0"},{"journal-title":"Random Graphs","year":"1985","author":"bollobas","key":"6"},{"key":"5","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1137\/0213053","article-title":"How to generate cryptographically strong sequences of pseudo-random bits","volume":"13","author":"blum","year":"1984","journal-title":"SICOMP"},{"key":"4","first-page":"193","article-title":"On the theory of average case complexity","volume":"44","author":"ben-david","year":"1992","journal-title":"JCSS"},{"key":"9","first-page":"501","article-title":"An approximate L1-difference algorithm for massive data streams","author":"feigenbaum","year":"1999","journal-title":"Proceedings of 40th FOCS"},{"key":"8","first-page":"203","article-title":"Collision free hash functions and public key signature schemes","author":"damga?rd","year":"0","journal-title":"EuroCrypt'87"}],"event":{"name":"44th Annual IEEE Symposium on Foundations of Computer Science - FOCS 2003","acronym":"SFCS-03","location":"Cambridge, MA, USA"},"container-title":["44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8767\/27770\/01238182.pdf?arnumber=1238182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:05:26Z","timestamp":1497571526000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1238182\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/sfcs.2003.1238182","relation":{},"subject":[]}}