How to construct random functions
Journal of the ACM (JACM)
On the cryptographic applications of random functions
Proceedings of CRYPTO 84 on Advances in cryptology
Algebraic methods in the theory of lower bounds for Boolean circuit complexity
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
The complexity of Boolean functions
The complexity of Boolean functions
How to construct pseudorandom permutations from pseudorandom functions
SIAM Journal on Computing - Special issue on cryptography
Simulating threshold circuits by majority circuits
STOC '93 Proceedings of the twenty-fifth annual ACM symposium on Theory of computing
Constant depth circuits, Fourier transform, and learnability
Journal of the ACM (JACM)
Cryptographic limitations on learning Boolean formulae and finite automata
Journal of the ACM (JACM)
Robust trainability of single neurons
Journal of Computer and System Sciences
On lower bounds for read-k-times branching programs
Computational Complexity
Journal of Computer and System Sciences - Special issue: 26th annual ACM symposium on the theory of computing & STOC'94, May 23–25, 1994, and second annual Europe an conference on computational learning theory (EuroCOLT'95), March 13–15, 1995
Proceedings of the Third International Workshop on Fast Software Encryption
Cryptographic Primitives Based on Hard Learning Problems
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Synthesizers and their application to the parallel construction of pseudo-random functions
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Number-theoretic constructions of efficient pseudo-random functions
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
On the applications of multiplicity automata in learning
FOCS '96 Proceedings of the 37th Annual Symposium on Foundations of Computer Science
Interpolation of depth-3 arithmetic circuits with two multiplication gates
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
Natural proofs versus derandomization
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Hi-index | 0.00 |
This paper investigates which complexity classes inside NC can contain pseudorandom function generators (PRFGs). Under the Decisional Diffie-Hellman assumption (a common cryptographic assumption) TC40 contains PRFGs. No lower complexity classes with this property are currently known. On the other hand, we use effective lower bound arguments to show that some complexity classes cannot contain PRFGs. This provides evidence for the following conjecture: Any effective lower bound argument for a complexity class can be turned into an efficient distinguishing algorithm which proves that this class cannot contain PRFGs.