-
2
-
-
51249173801
-
On Lovász lattice reduction and the nearest lattice point problem
-
L. Babai, On Lovász lattice reduction and the nearest lattice point problem, Combinatorica, Vol. 6 (1986) pp. 1-13.
-
(1986)
Combinatorica
, vol.6
, pp. 1-13
-
-
Babai, L.1
-
3
-
-
84958656559
-
"Pseudo-random" number generation within cryptographic algorithms: The DSS case
-
Proc. of Crypto '97. IACR, Springer-Verlag
-
M. Bellare, S. Goldwasser and D. Micciancio, "Pseudo-random" number generation within cryptographic algorithms: The DSS case, In Proc. of Crypto '97, volume 1294 of LNCS. IACR, Springer-Verlag (1997) pp. 277-291.
-
(1997)
LNCS
, vol.1294
, pp. 277-291
-
-
Bellare, M.1
Goldwasser, S.2
Micciancio, D.3
-
4
-
-
35048877979
-
On the generation of DSS one-time keys. Manuscript
-
March, February 2001
-
D. Bleichenbacher, On the generation of DSS one-time keys. Manuscript. The result was presented at the Monteverita workshop in March 2001, February 2001.
-
(2001)
Monteverita Workshop
-
-
Bleichenbacher, D.1
-
5
-
-
84955621986
-
Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes
-
Proc. of Crypto '96. IACR, Springer-Verlag
-
D. Boneh and R. Venkatesan, Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes, In Proc. of Crypto '96, volume 1109 of LNCS. IACR, Springer-Verlag (1996).
-
(1996)
LNCS
, vol.1109
-
-
Boneh, D.1
Venkatesan, R.2
-
7
-
-
0142002517
-
The exact security of ECDSA
-
Department of Combinatorics and Optimization, University of Waterloo CORR
-
D. R. L. Brown, The exact security of ECDSA. Technical report, Department of Combinatorics and Optimization, University of Waterloo (2000) CORR 2000-54.
-
(2000)
Technical Report
, pp. 2000-2054
-
-
Brown, D.R.L.1
-
9
-
-
84958967057
-
The insecurity of Nyberg-Rueppel and other DSA-like signature schemes with partially known nonce
-
Proc. Workshop on Cryptography and Lattices (CALC '01), Springer-Verlag
-
E. El Mahassni, P. Q. Nguyen and I. E. Shparlinski, The insecurity of Nyberg-Rueppel and other DSA-like signature schemes with partially known nonce, In Proc. Workshop on Cryptography and Lattices (CALC '01), volume 2146 of LNCS, Springer-Verlag (2001) pp. 97-109.
-
(2001)
LNCS
, vol.2146
, pp. 97-109
-
-
El Mahassni, E.1
Nguyen, P.Q.2
Shparlinski, I.E.3
-
10
-
-
0001170206
-
On the security of Diffie-Hellman bits
-
K.-Y. Lam, I. E. Shparlinski, H. Wang and C. Xing eds., Birkhäuser
-
M. I. González Vasco and I. E. Shparlinski, On the security of Diffie-Hellman bits, In (K.-Y. Lam, I. E. Shparlinski, H. Wang and C. Xing eds.), Proc. Workshop on Cryptography and Computational Number Theory (CCNT'99), Singapore, Birkhäuser (2001) pp. 257-268.
-
(2001)
Proc. Workshop on Cryptography and Computational Number Theory (CCNT'99), Singapore
, pp. 257-268
-
-
González Vasco, M.I.1
Shparlinski, I.E.2
-
11
-
-
0036003397
-
Security of the most significant bits of the Shamir message passing scheme
-
M. I. González Vasco and I. E. Shparlinski, Security of the most significant bits of the Shamir message passing scheme, Math. Comp., Vol. 71 (2002) pp. 333-342.
-
(2002)
Math. Comp.
, vol.71
, pp. 333-342
-
-
González Vasco, M.I.1
Shparlinski, I.E.2
-
14
-
-
84957705004
-
An elliptic curve implementation of the finite field digital signature algorithm
-
Proc. of Crypto '98, IACR, Springer-Verlag
-
N. Koblitz, An elliptic curve implementation of the finite field digital signature algorithm, In Proc. of Crypto '98, volume 1462 of LNCS, IACR, Springer-Verlag (1998) pp. 327-337.
-
(1998)
LNCS
, vol.1462
, pp. 327-337
-
-
Koblitz, N.1
-
15
-
-
0348003132
-
The state of elliptic curve cryptography
-
N. Koblitz, A. J. Menezes and S. A. Vanstone, The state of elliptic curve cryptography, Designs, Codes and Cryptography, Vol. 19 (1994) pp. 173-193.
-
(1994)
Designs, Codes and Cryptography
, vol.19
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.J.2
Vanstone, S.A.3
-
16
-
-
84946822318
-
Exponential sums and group generators for elliptic curves over finite fields
-
Algorithmic Number Theory - Proc. of ANTS-IV, Springer-Verlag
-
D. Kohel and I. E. Shparlinski, Exponential sums and group generators for elliptic curves over finite fields, In Algorithmic Number Theory - Proc. of ANTS-IV, volume 1838 of LNCS, Springer-Verlag (2000) pp. 395-404.
-
(2000)
LNCS
, vol.1838
, pp. 395-404
-
-
Kohel, D.1
Shparlinski, I.E.2
-
19
-
-
34250244723
-
Factoring polynomials with rational coefficients
-
A. K. Lenstra, H. W. Lenstra, Jr. and L. Lovász, Factoring polynomials with rational coefficients, Mathematische Ann., Vol. 261 (1982) pp. 513-534.
-
(1982)
Mathematische Ann.
, vol.261
, pp. 513-534
-
-
Lenstra, A.K.1
Lenstra H.W., Jr.2
Lovász, L.3
-
21
-
-
84968466879
-
Exponential sums and Goppa codes
-
C. J. Moreno and O. Moreno, Exponential sums and Goppa codes, I. Proc. Amer. Math. Soc., Vol. 111 (1991) pp. 523-531.
-
(1991)
I. Proc. Amer. Math. Soc.
, vol.111
, pp. 523-531
-
-
Moreno, C.J.1
Moreno, O.2
-
23
-
-
0141898671
-
The dark side of the hidden number problem: Lattice attacks on DSA
-
K.-Y. Lam, I. E. Shparlinski, H. Wang and C. Xing, eds., Birkhäuser
-
P. Q. Nguyen, The dark side of the hidden number problem: Lattice attacks on DSA, In (K.-Y. Lam, I. E. Shparlinski, H. Wang and C. Xing, eds.), Proc. Workshop on Cryptography and Computational Number Theory (CCNT'99), Singapore, Birkhäuser (2001) pp. 321-330.
-
(2001)
Proc. Workshop on Cryptography and Computational Number Theory (CCNT'99), Singapore
, pp. 321-330
-
-
Nguyen, P.Q.1
-
24
-
-
33746391879
-
The insecurity of the Digital Signature Algorithm with partially known nonces
-
P. Q. Nguyen and I. E. Shparlinski, The insecurity of the Digital Signature Algorithm with partially known nonces, J. Cryptology, Vol. 15 (2002) pp. 151-176.
-
(2002)
J. Cryptology
, vol.15
, pp. 151-176
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
-
25
-
-
33846870481
-
Lattice reduction in cryptology: An update
-
Algorithmic Number Theory - Proc. of ANTS-IV, Springer-Verlag
-
P. Q. Nguyen and J. Stern, Lattice reduction in cryptology: An update, In Algorithmic Number Theory - Proc. of ANTS-IV, volume 1838 of LNCS, Springer-Verlag (2000) pp. 85-112.
-
(2000)
LNCS
, vol.1838
, pp. 85-112
-
-
Nguyen, P.Q.1
Stern, J.2
-
26
-
-
33846867921
-
The two faces of lattices in cryptology
-
Proc. Workshop on Cryptography and Lattices (CALC '01), Springer-Verlag
-
P. Q. Nguyen and J. Stern, The two faces of lattices in cryptology, In Proc. Workshop on Cryptography and Lattices (CALC '01), volume 2146 of LNCS, Springer-Verlag (2001) pp. 146-180.
-
(2001)
LNCS
, vol.2146
, pp. 146-180
-
-
Nguyen, P.Q.1
Stern, J.2
-
27
-
-
0000997571
-
Quasi-Monte Carlo methods and Pseudo-random numbers
-
H. Niederreiter, Quasi-Monte Carlo methods and Pseudo-random numbers, Bull. Amer. Math. Soc., Vol. 84 (1978) pp. 957-1041.
-
(1978)
Bull. Amer. Math. Soc.
, vol.84
, pp. 957-1041
-
-
Niederreiter, H.1
-
28
-
-
0141967801
-
-
SIAM, Philadelphia, CBMS-NSF Regional Conference Series in Applied Mathematics
-
H. Niederreiter, Random Number Generation and Quasi-Monte Carlo Methods, volume 63, SIAM, Philadelphia, 1992, CBMS-NSF Regional Conference Series in Applied Mathematics.
-
(1992)
Random Number Generation and Quasi-Monte Carlo Methods
, vol.63
-
-
Niederreiter, H.1
|