메뉴 건너뛰기




Volumn 3574, Issue , 2005, Pages 52-60

On Stern's attack against secret truncated linear congruential generators

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DATA ACQUISITION; HEURISTIC METHODS; POLYNOMIALS; ROBUSTNESS (CONTROL SYSTEMS);

EID: 26444449872     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11506157_5     Document Type: Conference Paper
Times cited : (14)

References (16)
  • 2
    • 0024303956 scopus 로고
    • Inferring sequences produced by pseudo-random number generators
    • J. Boyar, 'Inferring sequences produced by pseudo-random number generators', J. ACM, 36 (1989), 129-141.
    • (1989) J. ACM , vol.36 , pp. 129-141
    • Boyar, J.1
  • 3
    • 0024867085 scopus 로고
    • Inferring sequences produces by a linear congruential generator missing low-order bits
    • J. Boyar, 'Inferring sequences produces by a linear congruential generator missing low-order bits', J. Cryptology 1 (1989) 177-184.
    • (1989) J. Cryptology , vol.1 , pp. 177-184
    • Boyar, J.1
  • 4
    • 0023985464 scopus 로고
    • Reconstructing truncated integer variables satisfying linear congruences
    • A. M. Frieze, J. Hastad, R. Kannan, J. C. Lagarias, and A. Shamir. 'Reconstructing truncated integer variables satisfying linear congruences', SIAM J. Comp., 17 (1988), 262-280.
    • (1988) SIAM J. Comp. , vol.17 , pp. 262-280
    • Frieze, A.M.1    Hastad, J.2    Kannan, R.3    Lagarias, J.C.4    Shamir, A.5
  • 5
    • 0001134554 scopus 로고    scopus 로고
    • Lattice reduction: A toolbox for the cryptanalyst
    • A. Joux and J. Stern, 'Lattice reduction: A toolbox for the cryptanalyst', J. Cryptology, 11 (1998), 161-185.
    • (1998) J. Cryptology , vol.11 , pp. 161-185
    • Joux, A.1    Stern, J.2
  • 7
    • 0021819410 scopus 로고
    • Deciphering a linear congruential encryption
    • D. E. Knuth, 'Deciphering a linear congruential encryption', IEEE Trans. Inf. Theory 31 (1985), 49-52.
    • (1985) IEEE Trans. Inf. Theory , vol.31 , pp. 49-52
    • Knuth, D.E.1
  • 9
    • 0012168966 scopus 로고
    • How to predict congruential generators
    • H. Krawczyk, 'How to predict congruential generators', J. Algorithms, 13 (1992), 527-545.
    • (1992) J. Algorithms , vol.13 , pp. 527-545
    • Krawczyk, H.1
  • 10
    • 26444439644 scopus 로고    scopus 로고
    • On the period of the linear congruential and power generators
    • to appear
    • P. Kurlberg and C. Pomerance, 'On the period of the linear congruential and power generators', Acta Arith., (to appear).
    • Acta Arith.
    • Kurlberg, P.1    Pomerance, C.2
  • 11
    • 34250244723 scopus 로고
    • Factoring polynomials with rational coefficients
    • A. K. Lenstra, H. W. Lenstra and L. Lovász, 'Factoring polynomials with rational coefficients', Mathematische Ann., 261 (1982), 513-534.
    • (1982) Mathematische Ann. , vol.261 , pp. 513-534
    • Lenstra, A.K.1    Lenstra, H.W.2    Lovász, L.3
  • 13
    • 0000997571 scopus 로고
    • Quasi-Monte Carlo methods and pseudo-random numbers
    • H. Niederreiter, 'Quasi-Monte Carlo methods and pseudo-random numbers', Bull. Amer. Math. Soc., 84 (1978), 957-1041.
    • (1978) Bull. Amer. Math. Soc. , vol.84 , pp. 957-1041
    • Niederreiter, H.1
  • 15
    • 0023532388 scopus 로고
    • A hierarchy of polynomial time basis reduction algorithms
    • C. P. Schnorr, 'A hierarchy of polynomial time basis reduction algorithms', Theor. Comp. Sci., 53 (1987), 201-224.
    • (1987) Theor. Comp. Sci. , vol.53 , pp. 201-224
    • Schnorr, C.P.1
  • 16
    • 0023576573 scopus 로고
    • Secret linear congruential generators are not cryptographically secure
    • IEEE
    • J. Stern, 'Secret linear congruential generators are not cryptographically secure', Proc. 28th IEEE Symp. on Found, of Comp. Sci., IEEE, 1987, 421-426.
    • (1987) Proc. 28th IEEE Symp. on Found, of Comp. Sci. , pp. 421-426
    • Stern, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.