{"created":"2021-03-01T06:22:58.796030+00:00","id":19877,"links":{},"metadata":{"_buckets":{"deposit":"7b2ac700-6dcd-4a28-bc77-ce03d258ee38"},"_deposit":{"id":"19877","owners":[],"pid":{"revision_id":0,"type":"depid","value":"19877"},"status":"published"},"_oai":{"id":"oai:soar-ir.repo.nii.ac.jp:00019877","sets":["1169:1170"]},"author_link":["105684","105685","105686","105687","105688"],"item_1628147817048":{"attribute_name":"出版タイプ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_6_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2015-02","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicPageEnd":"194","bibliographicPageStart":"169","bibliographicVolumeNumber":"26","bibliographic_titles":[{"bibliographic_title":"INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE"}]}]},"item_6_description_20":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"In this paper, we specify a class of mathematical problems, which we refer to as \"Function Density Problems\" (FDPs, in short), and point out novel connections of FDPs to the following two cryptographic topics; theoretical security evaluations of keyless hash functions (such as SHA-1.), and constructions of provably secure pseudorandom generators (PRGs) with some enhanced security property introduced by Dubrov and Ishai (STOC 2006). Our argument aims at proposing new theoretical frameworks for these topics (especially for the former) based on FDPs, rather than providing some concrete and practical results on the topics. We also give some examples of mathematical discussions on FDFs, which would be of independent interest from mathematical viewpoints. Finally, we discuss possible directions of future research on other cryptographic applications of FDPs and on mathematical studies on FDPs themselves.","subitem_description_type":"Abstract"}]},"item_6_description_30":{"attribute_name":"資源タイプ(コンテンツの種類)","attribute_value_mlt":[{"subitem_description":"Article","subitem_description_type":"Other"}]},"item_6_description_5":{"attribute_name":"引用","attribute_value_mlt":[{"subitem_description":"INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE. 26(2):169-194 (2015)","subitem_description_type":"Other"}]},"item_6_link_3":{"attribute_name":"信州大学研究者総覧へのリンク","attribute_value_mlt":[{"subitem_link_text":"Numata, Yasuhide","subitem_link_url":"http://soar-rd.shinshu-u.ac.jp/profile/ja.OanmPhLa.html"}]},"item_6_link_67":{"attribute_name":"WoS","attribute_value_mlt":[{"subitem_link_url":"http://gateway.isiknowledge.com/gateway/Gateway.cgi?&GWVersion=2&SrcAuth=ShinshuUniv&SrcApp=ShinshuUniv&DestLinkType=FullRecord&DestApp=WOS&KeyUT=000354049200001"}]},"item_6_publisher_4":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"WORLD SCIENTIFIC PUBL CO PTE LTD"}]},"item_6_relation_48":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"10.1142/S0129054115500100"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.1142/S0129054115500100","subitem_relation_type_select":"DOI"}}]},"item_6_rights_62":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"Electronic version of an article published as International Journal of Foundations of Computer Science, 26(2), 2015, 169-194 DOI: 10.1142/s0129054115500100. © World Scientific Publishing Company, https://doi.org/10.1142/s0129054115500100"}]},"item_6_source_id_35":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0129-0541","subitem_source_identifier_type":"ISSN"}]},"item_6_source_id_40":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA10742015","subitem_source_identifier_type":"NCID"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Nuida, Koji"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Abe, Takuro"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kaji, Shizuo"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Maeno, Toshiaki"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Numata, Yasuhide"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2018-06-13"}],"displaytype":"detail","filename":"A_Mathematical_Problem_for_Security_Analysis_of_Hash_Functions_and_Pseudorandom_Generators.pdf","filesize":[{"value":"182.9 kB"}],"format":"application/pdf","licensefree":"Electronic version of an article published as International Journal of Foundations of Computer Science, 26(2), 2015, 169-194 DOI: 10.1142/s0129054115500100. © World Scientific Publishing Company, https://doi.org/10.1142/s0129054115500100","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"A_Mathematical_Problem_for_Security_Analysis_of_Hash_Functions_and_Pseudorandom_Generators.pdf","url":"https://soar-ir.repo.nii.ac.jp/record/19877/files/A_Mathematical_Problem_for_Security_Analysis_of_Hash_Functions_and_Pseudorandom_Generators.pdf"},"version_id":"17a5d24d-ae58-4426-b65f-16e534b8d574"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Function density problem","subitem_subject_scheme":"Other"},{"subitem_subject":"hash function","subitem_subject_scheme":"Other"},{"subitem_subject":"pseudorandom generator","subitem_subject_scheme":"Other"},{"subitem_subject":"security evaluation","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators","subitem_title_language":"en"}]},"item_type_id":"6","owner":"1","path":["1170"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2018-06-13"},"publish_date":"2018-06-13","publish_status":"0","recid":"19877","relation_version_is_last":true,"title":["A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-12-14T03:45:51.547478+00:00"}