-
1
-
-
84955621986
-
Hardness of computing the most significant bits of secrete keys in DiffieHellman and related schemes
-
D. Boneh and R. Venkatesan, Hardness of computing the most significant bits of secrete keys in DiffieHellman and related schemes, Advances in Cry-ptology-CRYPTO '96, LNCS 1109, Springer-Verlag, Berlin, 1996, pp. 129-142.
-
Advances in Cry-ptology-CRYPTO '96, LNCS 1109, Springer-Verlag, Berlin, 1996, Pp. 129-142.
-
-
Boneh, D.1
Venkatesan, R.2
-
2
-
-
0030781798
-
Hounding in lattices and its cryptographic applications
-
D. Boneh and R. Venkatesan, Hounding in lattices and its cryptographic applications, Proc. 8//i Annual ACM-SIAM Symp. on Discrete Algorithms, ACM, New York, 1997, pp. 675-681.
-
Proc. 8//i Annual ACM-SIAM Symp. on Discrete Algorithms, ACM, New York, 1997, Pp. 675-681.
-
-
Boneh, D.1
Venkatesan, R.2
-
3
-
-
0000924324
-
On certain exponential sums and the distribution of Diffie-Hellman triples
-
R. Canetti, J. Friedlander, and I. E. Shparlinski, On certain exponential sums and the distribution of Diffie-Hellman triples, J. London Math. Soc., 59,1999,799-812.
-
J. London Math. Soc., 59,1999,799-812.
-
-
Canetti, R.1
Friedlander, J.2
Shparlinski, I.E.3
-
4
-
-
33745994687
-
Polynomial congruences over incomplete residue systems modulo
-
J. H. H. Chalk, Polynomial congruences over incomplete residue systems modulo k, Proc. Kon. Ned. Acad. Wetensch., A92,1989,49-62.
-
K, Proc. Kon. Ned. Acad. Wetensch., A92,1989,49-62.
-
-
Chalk, J.H.H.1
-
5
-
-
0028407027
-
Exact lower time bounds for computing Boolean functions on CREW PRAMs
-
M. Dietzfelbinger, M. Kutylowski, and R. Reischuk, Exact lower time bounds for computing Boolean functions on CREW PRAMs, J. Comput. System Sei., 48,1994,231-254.
-
J. Comput. System Sei., 48,1994,231-254.
-
-
Dietzfelbinger, M.1
Kutylowski, M.2
Reischuk, R.3
-
6
-
-
0013458027
-
Feasible time-optimal algorithms for Boolean functions on exclusive-write parallel random access machine
-
M. Dietzfelbinger, M. Kutyfowski, and R. Reischuk, Feasible time-optimal algorithms for Boolean functions on exclusive-write parallel random access machine, SIAM J. Comput., 25,1996, 1196-1230.
-
SIAM J. Comput., 25,1996, 1196-1230.
-
-
Dietzfelbinger, M.1
Kutyfowski, M.2
Reischuk, R.3
-
7
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory, 22, 1976, 644-654.
-
IEEE Trans. Inform. Theory, 22, 1976, 644-654.
-
-
Diffie, W.1
Hellman, M.2
-
8
-
-
33745987974
-
The complexity of computation on the parallel random access machine
-
F. E. Fich, The complexity of computation on the parallel random access machine, Handbook of Theo-retical Computer Science, Vol. A, Elsevier, Amsterdam, 1990, pp. 757-804.
-
Handbook of Theo-retical Computer Science, Vol. A, Elsevier, Amsterdam, 1990, Pp. 757-804.
-
-
Fich, F.E.1
-
13
-
-
84949211445
-
The CREW PRAM complexity of modular inversion
-
J. von zur Gathen and I. E. Shparlinski, The CREW PRAM complexity of modular inversion, SIAM J. Comput. (to appear). Preliminary version in Proc. 3rd Latin American Theoretical Information Conf., LNCS 1380, Springer-Verlag, Berlin, 1998, pp. 305-315.
-
SIAM J. Comput. (To Appear). Preliminary Version in Proc. 3rd Latin American Theoretical Information Conf., LNCS 1380, Springer-Verlag, Berlin, 1998, Pp. 305-315.
-
-
Von Zur Gathen, J.1
Shparlinski, I.E.2
-
14
-
-
0344056457
-
A. W. Schrift, and A. Shamir
-
J. Hâstad, A. W. Schrift, and A. Shamir, The discrete logarithm modulo a composite hides O(n) bits, J. Comput. System Sei., 47,1993,376-404.
-
The Discrete Logarithm Modulo a Composite Hides O(n) Bits, J. Comput. System Sei., 47,1993,376-404.
-
-
Hâstad, J.1
-
18
-
-
0003600298
-
-
R. Lidl and H. Niederreiter, Finite Fields, Addison-Wesley, Reading, MA, 1983.
-
Finite Fields, Addison-Wesley, Reading, MA, 1983.
-
-
Lidl, R.1
Niederreiter, H.2
-
20
-
-
0032621240
-
The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms
-
U. M. Maurer and S. Wolf, The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms, SIAM J. Comput., 28,1999,1689-1721.
-
SIAM J. Comput., 28,1999,1689-1721.
-
-
Maurer, U.M.1
Wolf, S.2
-
21
-
-
33746006307
-
A polynomial representation for logarithms in
-
G. L. Müllen and D. White, A polynomial representation for logarithms in GF(q),Acta Arith., 47,1986, 255-261.
-
GF(q),Acta Arith., 47,1986, 255-261.
-
-
Müllen, G.L.1
White, D.2
-
24
-
-
0026104904
-
Improved upper and lower time bounds for parallel random access machines without simultaneous writes
-
I. Parberry and P. Yuan Yan, Improved upper and lower time bounds for parallel random access machines without simultaneous writes, SIAM J. Comput., 20,1991,88-99.
-
SIAM J. Comput., 20,1991,88-99.
-
-
Parberry, I.1
Yuan Yan, P.2
-
25
-
-
0039783282
-
Simultaneous security of bits of the discrete log
-
R. Peralta, Simultaneous security of bits of the discrete log, Advances in Cryptology-Eurocrypt '85, LNCS 219, Springer-Verlag, Berlin, 1986, pp. 62-72.
-
Advances in Cryptology-Eurocrypt '85, LNCS 219, Springer-Verlag, Berlin, 1986, Pp. 62-72.
-
-
Peralta, R.1
-
26
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
V. Shoup, Lower bounds for discrete logarithms and related problems. Advances in CryplologyEurocrypt '91, LNCS 1233, Springer-Verlag, Berlin, 1997, pp. 256-266.
-
Advances in CryplologyEurocrypt '91, LNCS 1233, Springer-Verlag, Berlin, 1997, Pp. 256-266.
-
-
Shoup, V.1
|