메뉴 건너뛰기




Volumn 2286, Issue , 2002, Pages 105-117

The hidden number problem in extension fields and its applications

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SCIENCE; MOBILE SECURITY; POLYNOMIAL APPROXIMATION; POLYNOMIALS;

EID: 31444434751     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (38)
  • 2
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • M. Blum and S. Micali, ‘How to generate cryptographically strong sequences of pseudo-random bits’, SIAM J. Comp., 13 (1984), 850–864.
    • (1984) SIAM J. Comp. , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 3
    • 84955604812 scopus 로고    scopus 로고
    • Algorithms for Black-Box Fields and their Application to Cryptography
    • Springer-Verlag, Berlin
    • D. Boneh and R. J. Lipton, ‘Algorithms for Black-Box Fields and their Application to Cryptography’, in Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1109 (1996), 283–297.
    • (1996) Lect. Notes in Comp. Sci. , vol.1109 , pp. 283-297
    • Boneh, D.1    Lipton, R.J.2
  • 4
    • 84955621986 scopus 로고    scopus 로고
    • Hardness of computing the most significant bits of secret keys in Diffie–Hellman and related schemes
    • Springer-Verlag, Berlin
    • D. Boneh and R. Venkatesan, ‘Hardness of computing the most significant bits of secret keys in Diffie–Hellman and related schemes’, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1109 (1996), 129–142.
    • (1996) Lect. Notes in Comp. Sci. , vol.1109 , pp. 129-142
    • Boneh, D.1    Venkatesan, R.2
  • 6
    • 38249035530 scopus 로고
    • Determinants and ranks of random matrices over ZZm
    • R. P. Brent and B. D. McKay ‘Determinants and ranks of random matrices over ZZm’, Discr. Math., 66 (1987), 123–137.
    • (1987) Discr. Math. , vol.66 , pp. 123-137
    • Brent, R.P.1    McKay, B.D.2
  • 7
    • 84880910493 scopus 로고    scopus 로고
    • The insecurity of some DSAlike signature schemes with partially known nonces
    • Boston, MA, Springer-Verlag, Berlin, (to appear
    • E. El Mahassni, P. Q. Nguyen and I. E. Shparlinski, ‘The insecurity of some DSAlike signature schemes with partially known nonces’, Proc. Workshop on Lattices and Cryptography, Boston, MA, 2001, Springer-Verlag, Berlin, (to appear)
    • (2001) Proc. Workshop on Lattices and Cryptography
    • El Mahassni, E.1    Nguyen, P.Q.2    Shparlinski, I.E.3
  • 8
    • 0348246836 scopus 로고    scopus 로고
    • On the density of normal bases in finite fields
    • G. S. Frandsen, ‘On the density of normal bases in finite fields’, Finite Fields and Their Appl., 6 (2000), 23–38.
    • (2000) Finite Fields and Their Appl. , vol.6 , pp. 23-38
    • Frandsen, G.S.1
  • 11
    • 84968492649 scopus 로고    scopus 로고
    • Constructing normal bases in finite fields
    • J. von zur Gathen and M. Giesbrecht, ‘Constructing normal bases in finite fields’, J. Symbol. Comp., 10 (1990), 547–570.
    • J. Symbol. Comp. , vol.10 , Issue.1990 , pp. 547-570
    • Von Zur Gathen, J.1    Giesbrecht, M.2
  • 13
    • 0024868772 scopus 로고
    • A Hard Core Predicate for any One Way Function
    • O. Goldreich and L. A. Levin, ‘A Hard Core Predicate for any One Way Function’, in Proc., 21st ACM STOC, 1989, 25–32.
    • (1989) Proc., 21St ACM STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.A.2
  • 15
    • 84937413823 scopus 로고    scopus 로고
    • The complexity of computing hard core predicates
    • Springer-Verlag, Berlin
    • M. Goldmann and M. Näslund, ‘The complexity of computing hard core predicates’, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1294 (1997), 1–15.
    • (1997) Lect. Notes in Comp. Sci. , vol.1294 , pp. 1-15
    • Goldmann, M.1    Näslund, M.2
  • 16
    • 27644489812 scopus 로고    scopus 로고
    • Russell ‘Complexity bounds on general hard-core predicates’
    • M. Goldman, M. Näslund and A. Russell ‘Complexity bounds on general hard-core predicates’, J. Cryptology, 14 (2001), 177–195.
    • (2001) J. Cryptology , vol.14 , pp. 177-195
    • Goldman, M.1    Näslund, M.2
  • 19
    • 0036003397 scopus 로고    scopus 로고
    • Security of the most significant bits of the Shamir message passing scheme
    • M. I. González Vasco and I. E. Shparlinski, ‘Security of the most significant bits of the Shamir message passing scheme’, Math. Comp., 71 (2002), 333–342.
    • (2002) Math. Comp. , vol.71 , pp. 333-342
    • González Vasco, M.I.1    Shparlinski, I.E.2
  • 20
    • 84955569997 scopus 로고    scopus 로고
    • Universal hash functions from exponential sums over finite fields and Galois rings
    • Springer-Verlag, Berlin
    • T. Helleseth and T. Johansson, ‘Universal hash functions from exponential sums over finite fields and Galois rings’, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 921 (1996), 31–44.
    • (1996) Lect. Notes in Comp. Sci. , vol.921 , pp. 31-44
    • Helleseth, T.1    Johansson, T.2
  • 22
    • 0035589436 scopus 로고    scopus 로고
    • Singularity probabilities for random matrices over finite fields
    • J. Kahn and J. Komlós, ‘Singularity probabilities for random matrices over finite fields’, Combinatorics, Probability and Computing, 10 (2001), 137–157.
    • (2001) Combinatorics, Probability and Computing , vol.10 , pp. 137-157
    • Kahn, J.1    Komlós, J.2
  • 23
    • 0030570123 scopus 로고    scopus 로고
    • On some approximation problems concerning sparse polynomials over finite fields
    • M. Karpinski and I. E. Shparlinski, ‘On some approximation problems concerning sparse polynomials over finite fields’, Theor. Comp. Sci., 157 (1996), 259–266.
    • (1996) Theor. Comp. Sci. , vol.157 , pp. 259-266
    • Karpinski, M.1    Shparlinski, I.E.2
  • 24
    • 0003956970 scopus 로고
    • Addison-Wesley, MA
    • S. Lang, Algebra, Addison-Wesley, MA, 1965.
    • (1965) Algebra
    • Lang, S.1
  • 27
    • 0025750430 scopus 로고
    • Efficient, perfect polynomial random number generators
    • S. Micali and C. P. Schnorr, ‘Efficient, perfect polynomial random number generators’, J. Cryptology, 3 (1991), 157–172.
    • (1991) J. Cryptology , vol.3 , pp. 157-172
    • Micali, S.1    Schnorr, C.P.2
  • 28
    • 84957368152 scopus 로고
    • Universal hash functions & hard core bits
    • Springer-Verlag, Berlin
    • M. Näslund, ‘Universal hash functions & hard core bits’, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 921 (1995), 356–366.
    • (1995) Lect. Notes in Comp. Sci. , vol.921 , pp. 356-366
    • Näslund, M.1
  • 29
    • 84955597936 scopus 로고    scopus 로고
    • All bits in ax+b are hard
    • Springer-Verlag, Berlin
    • M. Näslund, ‘All bits in ax+b are hard’, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1109 (1996), 114–128.
    • (1996) Lect. Notes in Comp. Sci. , vol.1109 , pp. 114-128
    • Näslund, M.1
  • 30
    • 84937438200 scopus 로고    scopus 로고
    • Hard core functions: Survey and new results
    • M. Näslund and A. Russell, ‘Hard core functions: Survey and new results’, Proc. of NordSec’99, 1999, 305–322.
    • (1999) Proc. Of NordSec’99 , pp. 305-322
    • Näslund, M.1    Russell, A.2
  • 31
    • 0141898671 scopus 로고    scopus 로고
    • The dark side of the Hidden Number Problem: Lattice attacks on DSA
    • Singapore 1999, Birkhäuser
    • P. Nguyen, ‘The dark side of the Hidden Number Problem: Lattice attacks on DSA’, Proc. Workshop on Cryptography and Computational Number Theory, Singapore 1999, Birkhäuser, 2001, 321–330.
    • (2001) Proc. Workshop on Cryptography and Computational Number Theory , pp. 321-330
    • Nguyen, P.1
  • 32
    • 84937492304 scopus 로고    scopus 로고
    • The insecurity of the Digital Signature Algorithm with partially known nonces
    • (to appear)
    • P. Nguyen and I. E. Shparlinski, ‘The insecurity of the Digital Signature Algorithm with partially known nonces’, J. Cryptology, (to appear)
    • J. Cryptology
    • Nguyen, P.1    Shparlinski, I.E.2
  • 34
    • 0027641367 scopus 로고
    • Local randomness in polynomial random number and random function generators
    • H. Niederreiter and C. P. Schnorr, ‘Local randomness in polynomial random number and random function generators’, SIAM J. Comp., 13 (1993), 684–694.
    • (1993) SIAM J. Comp. , vol.13 , pp. 684-694
    • Niederreiter, H.1    Schnorr, C.P.2
  • 35
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • Springer-Verlag, Berlin
    • V. Shoup, ‘Lower bounds for discrete logarithms and related problems’, in Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1233 (1997), 256–266.
    • (1997) Lect. Notes in Comp. Sci. , vol.1233 , pp. 256-266
    • Shoup, V.1
  • 36
    • 0034830272 scopus 로고    scopus 로고
    • Sparse polynomial approximation in finite fields
    • Crete, Greece, July 6-8
    • I. E. Shparlinski, ‘Sparse polynomial approximation in finite fields’, Proc. 33rd ACM Symp. on Theory of Comput., Crete, Greece, July 6-8, 2001, 209–215.
    • (2001) Proc. 33Rd ACM Symp. On Theory of Comput. , pp. 209-215
    • Shparlinski, I.E.1
  • 37
    • 84974695972 scopus 로고    scopus 로고
    • On the generalised hidden number problem and bit security of XTR
    • Springer-Verlag, Berlin
    • I. E. Shparlinski, ‘On the generalised hidden number problem and bit security of XTR’, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 2227 (2001), 268–277.
    • (2001) Lect. Notes in Comp. Sci , vol.2227 , pp. 268-277
    • Shparlinski, I.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.