-
1
-
-
0023985196
-
RSA and Rabin functions: Certain parts are as hard as the whole
-
W. Alexi, B. Chor, O. Goldreich and C. P. Schnorr, 'RSA and Rabin functions: Certain parts are as hard as the whole', SIAM Journal on Computing, 17 (1988), 194-209.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 194-209
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.P.4
-
2
-
-
84880296900
-
On the unpredictability of bits of the elliptic curve Diffie-Hellman scheme
-
Springer-Verlag, Berlin
-
D. Boneh and I. E. Shparlinski, 'On the unpredictability of bits of the elliptic curve Diffie-Hellman scheme', Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 2139 (2001), 201-212.
-
(2001)
Lect. Notes in Comp. Sci.
, vol.2139
, pp. 201-212
-
-
Boneh, D.1
Shparlinski, I.E.2
-
3
-
-
84955621986
-
Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes
-
Springer-Verlag, Berlin
-
D. Boneh and R. Venkatesan, 'Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes', Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1109 (1996), 129-142.
-
(1996)
Lect. Notes in Comp. Sci.
, vol.1109
, pp. 129-142
-
-
Boneh, D.1
Venkatesan, R.2
-
4
-
-
35248880831
-
-
Draft 4
-
Consortium for Efficient Embedded Security, Efficient Embedded Security Standard #1, Draft 4. Available from http://www.ceesstandards.org.
-
Efficient Embedded Security Standard #1
-
-
-
5
-
-
84945126587
-
Key recovery and message attack on NTRU-composite
-
Springer-Verlag, Berlin
-
C. Gentry, 'Key recovery and message attack on NTRU-composite', Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 2045 (2001), 182-194.
-
(2001)
Lect. Notes in Comp. Sci.
, vol.2045
, pp. 182-194
-
-
Gentry, C.1
-
6
-
-
27644489812
-
Complexity bounds on general hardcore predicates
-
M. Goldman, M. Näslund and A. Russell, 'Complexity bounds on general hardcore predicates', J. Cryptology, 14 (2001), 177-195.
-
(2001)
J. Cryptology
, vol.14
, pp. 177-195
-
-
Goldman, M.1
Näslund, M.2
Russell, A.3
-
8
-
-
0000991555
-
A survey of hard core functions
-
Singapore 1999, Birkhäuser
-
M. I. González Vasco and M. Näslund, 'A survey of hard core functions', Proc. Workshop on Cryptography and Computational Number Theory, Singapore 1999, Birkhäuser, 2001, 227-256.
-
(2001)
Proc. Workshop on Cryptography and Computational Number Theory
, pp. 227-256
-
-
González Vasco, M.I.1
Näslund, M.2
-
9
-
-
0001170206
-
On the security of Diffie-Hellman bits
-
Singapore 1999, Birkhauser
-
M. I. González Vasco and I. E. Shparlinski, 'On the security of Diffie-Hellman bits', Proc. Workshop on Cryptography and Computational Number Theory, Singapore 1999, Birkhauser, 2001, 257-268.
-
(2001)
Proc. Workshop on Cryptography and Computational Number Theory
, pp. 257-268
-
-
González Vasco, M.I.1
Shparlinski, I.E.2
-
10
-
-
0036003397
-
Security of the most significant bits of the Shamir message passing scheme
-
M. I. Gonzalez Vasco and I. E. Shparlinski, 'Security of the most significant bits of the Shamir message passing scheme', Math. Comp., 71 (2002), 333-342.
-
(2002)
Math. Comp.
, vol.71
, pp. 333-342
-
-
Gonzalez Vasco, M.I.1
Shparlinski, I.E.2
-
11
-
-
84947581524
-
The security of individual RSA and discrete log bits
-
to appear
-
J. Håstad and M. Näslund, 'The security of individual RSA and discrete log bits', J. of the ACM, (to appear).
-
J. of the ACM
-
-
Håstad, J.1
Näslund, M.2
-
12
-
-
84947808606
-
NTRU: A ring based public key cryptosystem
-
Springer-Verlag, Berlin
-
J. Hoffstein, J. Pipher and J. H. Silverman, 'NTRU: A ring based public key cryptosystem', Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1433 (1998), 267-288.
-
(1998)
Lect. Notes in Comp. Sci.
, vol.1433
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.H.3
-
13
-
-
3543081982
-
Optimizations for NTRU
-
Walter de Gruyter
-
J. Hoffstein and J. H. Silverman, 'Optimizations for NTRU', Proc. the Conf. on Public Key Cryptography and Computational Number Theory, Warsaw, 2000, Walter de Gruyter, 2001, 77-88.
-
(2001)
Proc. the Conf. on Public Key Cryptography and Computational Number Theory, Warsaw, 2000
, pp. 77-88
-
-
Hoffstein, J.1
Silverman, J.H.2
-
14
-
-
84958800381
-
Hidden number problem with hidden multipliers, timed-release crypto and noisy exponentiation
-
to appear
-
N. A. Howgrave-Graham, P. Q. Nguyen and I. E. Shparlinski, 'Hidden number problem with hidden multipliers, timed-release crypto and noisy exponentiation', Math. Comp., (to appear).
-
Math. Comp.
-
-
Howgrave-Graham, N.A.1
Nguyen, P.Q.2
Shparlinski, I.E.3
-
15
-
-
84937417839
-
The hidden number problem with the trace and bit security of XTR and LUC
-
Springer-Verlag, Berlin
-
W.-C. W. Li, M. Näslund and I. E. Shparlinski, 'The hidden number problem with the trace and bit security of XTR and LUC', Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 2442 (2002), 433-448.
-
(2002)
Lect. Notes in Comp. Sci.
, vol.2442
, pp. 433-448
-
-
Li, W.-C.W.1
Näslund, M.2
Shparlinski, I.E.3
-
16
-
-
84937406876
-
Analysis and improvements of NTRU encryption paddings
-
Springer-Verlag, Berlin
-
P. Q. Nguyen and D. Pointcheval, 'Analysis and improvements of NTRU encryption paddings', Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 2442 (2002, 210-225.
-
(2002)
Lect. Notes in Comp. Sci.
, vol.2442
, pp. 210-225
-
-
Nguyen, P.Q.1
Pointcheval, D.2
-
17
-
-
0039157475
-
Security of almost all discrete log bits
-
Univ. of Trier
-
C. P. Schnorr, 'Security of almost all discrete log bits', Electronic Colloq. on Comp. Compl., Univ. of Trier, TR98-033 (1998), 1-13.
-
(1998)
Electronic Colloq. on Comp. Compl.
, vol.TR98-033
, pp. 1-13
-
-
Schnorr, C.P.1
|