-
1
-
-
84948951675
-
Noisy polynomial interpolation and noisy Chinese remaindering
-
D. Bleichenbacher and P. Q. Nguyen, ‘Noisy polynomial interpolation and noisy Chinese remaindering’, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1807 (2000), 53–69.
-
(2000)
Lect. Notes in Comp. Sci., Springer-Verlag, Berlin
, vol.1807
, pp. 53-69
-
-
Bleichenbacher, D.1
Nguyen, P.Q.2
-
2
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. Blum and S. Micali, ‘How to generate cryptographically strong sequences of pseudo-random bits’, SIAM J. Comp., 13 (1984), 850–864.
-
(1984)
SIAM J. Comp.
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
3
-
-
84955604812
-
Algorithms for Black-Box Fields and their Application to Cryptography
-
Springer-Verlag, Berlin
-
D. Boneh and R. J. Lipton, ‘Algorithms for Black-Box Fields and their Application to Cryptography’, in Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1109 (1996), 283–297.
-
(1996)
Lect. Notes in Comp. Sci.
, vol.1109
, pp. 283-297
-
-
Boneh, D.1
Lipton, R.J.2
-
4
-
-
84955621986
-
Hardness of computing the most significant bits of secret keys in Diffie–Hellman and related schemes
-
Springer-Verlag, Berlin
-
D. Boneh and R. Venkatesan, ‘Hardness of computing the most significant bits of secret keys in Diffie–Hellman and related schemes’, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1109 (1996), 129–142.
-
(1996)
Lect. Notes in Comp. Sci.
, vol.1109
, pp. 129-142
-
-
Boneh, D.1
Venkatesan, R.2
-
5
-
-
0030781798
-
Rounding in lattices and its cryptographic applications
-
ACM, NY
-
D. Boneh and R. Venkatesan, ‘Rounding in lattices and its cryptographic applications’, Proc. 8th Annual ACM-SIAM Symp. on Discr. Algorithms, ACM, NY, 1997, 675–681.
-
(1997)
Proc. 8Th Annual ACM-SIAM Symp. On Discr. Algorithms
, pp. 675-681
-
-
Boneh, D.1
Venkatesan, R.2
-
6
-
-
38249035530
-
Determinants and ranks of random matrices over ZZm
-
R. P. Brent and B. D. McKay ‘Determinants and ranks of random matrices over ZZm’, Discr. Math., 66 (1987), 123–137.
-
(1987)
Discr. Math.
, vol.66
, pp. 123-137
-
-
Brent, R.P.1
McKay, B.D.2
-
7
-
-
84880910493
-
The insecurity of some DSAlike signature schemes with partially known nonces
-
Boston, MA, Springer-Verlag, Berlin, (to appear
-
E. El Mahassni, P. Q. Nguyen and I. E. Shparlinski, ‘The insecurity of some DSAlike signature schemes with partially known nonces’, Proc. Workshop on Lattices and Cryptography, Boston, MA, 2001, Springer-Verlag, Berlin, (to appear)
-
(2001)
Proc. Workshop on Lattices and Cryptography
-
-
El Mahassni, E.1
Nguyen, P.Q.2
Shparlinski, I.E.3
-
8
-
-
0348246836
-
On the density of normal bases in finite fields
-
G. S. Frandsen, ‘On the density of normal bases in finite fields’, Finite Fields and Their Appl., 6 (2000), 23–38.
-
(2000)
Finite Fields and Their Appl.
, vol.6
, pp. 23-38
-
-
Frandsen, G.S.1
-
11
-
-
84968492649
-
Constructing normal bases in finite fields
-
J. von zur Gathen and M. Giesbrecht, ‘Constructing normal bases in finite fields’, J. Symbol. Comp., 10 (1990), 547–570.
-
J. Symbol. Comp.
, vol.10
, Issue.1990
, pp. 547-570
-
-
Von Zur Gathen, J.1
Giesbrecht, M.2
-
13
-
-
0024868772
-
A Hard Core Predicate for any One Way Function
-
O. Goldreich and L. A. Levin, ‘A Hard Core Predicate for any One Way Function’, in Proc., 21st ACM STOC, 1989, 25–32.
-
(1989)
Proc., 21St ACM STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
14
-
-
0029489416
-
Learning polynomials with queries: The highly noisy case
-
IEEE Computer Society Press, Los Alamitos, CA
-
O. Goldreich and R. Rubinfeld and M. Sudan, ‘Learning polynomials with queries: the highly noisy case’, Proc. of the 36th Annual Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1995, 294–303.
-
(1995)
Proc. Of the 36Th Annual Symposium on Foundations Of Computer Science
, pp. 294-303
-
-
Goldreich, O.1
Rubinfeld, R.2
Sudan, M.3
-
15
-
-
84937413823
-
The complexity of computing hard core predicates
-
Springer-Verlag, Berlin
-
M. Goldmann and M. Näslund, ‘The complexity of computing hard core predicates’, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1294 (1997), 1–15.
-
(1997)
Lect. Notes in Comp. Sci.
, vol.1294
, pp. 1-15
-
-
Goldmann, M.1
Näslund, M.2
-
16
-
-
27644489812
-
Russell ‘Complexity bounds on general hard-core predicates’
-
M. Goldman, M. Näslund and A. Russell ‘Complexity bounds on general hard-core predicates’, J. Cryptology, 14 (2001), 177–195.
-
(2001)
J. Cryptology
, vol.14
, pp. 177-195
-
-
Goldman, M.1
Näslund, M.2
-
17
-
-
0000991555
-
A survey of hard core functions
-
Singapore 1999, Birkhäuser
-
M. I. González Vasco and M. Näslund, ‘A survey of hard core functions’, Proc. Workshop on Cryptography and Computational Number Theory, Singapore 1999, Birkhäuser, 2001, 227–256.
-
(2001)
Proc. Workshop on Cryptography and Computational Number Theory
, pp. 227-256
-
-
González Vasco, M.I.1
Näslund, M.2
-
18
-
-
0001170206
-
On the security of Diffie–Hellman bits
-
Singapore 1999, Birkhäuser
-
M. I. González Vasco and I. E. Shparlinski, ‘On the security of Diffie–Hellman bits’, Proc. Workshop on Cryptography and Computational Number Theory, Singapore 1999, Birkhäuser, 2001, 257–268.
-
(2001)
Proc. Workshop on Cryptography and Computational Number Theory
, pp. 257-268
-
-
González Vasco, M.I.1
Shparlinski, I.E.2
-
19
-
-
0036003397
-
Security of the most significant bits of the Shamir message passing scheme
-
M. I. González Vasco and I. E. Shparlinski, ‘Security of the most significant bits of the Shamir message passing scheme’, Math. Comp., 71 (2002), 333–342.
-
(2002)
Math. Comp.
, vol.71
, pp. 333-342
-
-
González Vasco, M.I.1
Shparlinski, I.E.2
-
20
-
-
84955569997
-
Universal hash functions from exponential sums over finite fields and Galois rings
-
Springer-Verlag, Berlin
-
T. Helleseth and T. Johansson, ‘Universal hash functions from exponential sums over finite fields and Galois rings’, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 921 (1996), 31–44.
-
(1996)
Lect. Notes in Comp. Sci.
, vol.921
, pp. 31-44
-
-
Helleseth, T.1
Johansson, T.2
-
21
-
-
0035427012
-
Lattice attacks on digital signature schemes
-
N. A. Howgrave-Graham and N. P. Smart, ‘Lattice attacks on digital signature schemes’, Designs, Codes and Cryptography, 23 (2001), 283–290.
-
(2001)
Designs, Codes and Cryptography
, vol.23
, pp. 283-290
-
-
Howgrave-Graham, N.A.1
Smart, N.P.2
-
22
-
-
0035589436
-
Singularity probabilities for random matrices over finite fields
-
J. Kahn and J. Komlós, ‘Singularity probabilities for random matrices over finite fields’, Combinatorics, Probability and Computing, 10 (2001), 137–157.
-
(2001)
Combinatorics, Probability and Computing
, vol.10
, pp. 137-157
-
-
Kahn, J.1
Komlós, J.2
-
23
-
-
0030570123
-
On some approximation problems concerning sparse polynomials over finite fields
-
M. Karpinski and I. E. Shparlinski, ‘On some approximation problems concerning sparse polynomials over finite fields’, Theor. Comp. Sci., 157 (1996), 259–266.
-
(1996)
Theor. Comp. Sci.
, vol.157
, pp. 259-266
-
-
Karpinski, M.1
Shparlinski, I.E.2
-
24
-
-
0003956970
-
-
Addison-Wesley, MA
-
S. Lang, Algebra, Addison-Wesley, MA, 1965.
-
(1965)
Algebra
-
-
Lang, S.1
-
25
-
-
0020203086
-
On the power of straight-line algorithms over finite fields
-
A. Lempel, G. Seroussi and J. Ziv, ‘On the power of straight-line algorithms over finite fields’, IEEE Trans. on Information Theory, IT-28 (1982), 875–880.
-
(1982)
IEEE Trans. On Information Theory, IT-28
, pp. 875-880
-
-
Lempel, A.1
Seroussi, G.2
Ziv, J.3
-
27
-
-
0025750430
-
Efficient, perfect polynomial random number generators
-
S. Micali and C. P. Schnorr, ‘Efficient, perfect polynomial random number generators’, J. Cryptology, 3 (1991), 157–172.
-
(1991)
J. Cryptology
, vol.3
, pp. 157-172
-
-
Micali, S.1
Schnorr, C.P.2
-
28
-
-
84957368152
-
Universal hash functions & hard core bits
-
Springer-Verlag, Berlin
-
M. Näslund, ‘Universal hash functions & hard core bits’, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 921 (1995), 356–366.
-
(1995)
Lect. Notes in Comp. Sci.
, vol.921
, pp. 356-366
-
-
Näslund, M.1
-
29
-
-
84955597936
-
All bits in ax+b are hard
-
Springer-Verlag, Berlin
-
M. Näslund, ‘All bits in ax+b are hard’, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1109 (1996), 114–128.
-
(1996)
Lect. Notes in Comp. Sci.
, vol.1109
, pp. 114-128
-
-
Näslund, M.1
-
30
-
-
84937438200
-
Hard core functions: Survey and new results
-
M. Näslund and A. Russell, ‘Hard core functions: Survey and new results’, Proc. of NordSec’99, 1999, 305–322.
-
(1999)
Proc. Of NordSec’99
, pp. 305-322
-
-
Näslund, M.1
Russell, A.2
-
31
-
-
0141898671
-
The dark side of the Hidden Number Problem: Lattice attacks on DSA
-
Singapore 1999, Birkhäuser
-
P. Nguyen, ‘The dark side of the Hidden Number Problem: Lattice attacks on DSA’, Proc. Workshop on Cryptography and Computational Number Theory, Singapore 1999, Birkhäuser, 2001, 321–330.
-
(2001)
Proc. Workshop on Cryptography and Computational Number Theory
, pp. 321-330
-
-
Nguyen, P.1
-
32
-
-
84937492304
-
The insecurity of the Digital Signature Algorithm with partially known nonces
-
(to appear)
-
P. Nguyen and I. E. Shparlinski, ‘The insecurity of the Digital Signature Algorithm with partially known nonces’, J. Cryptology, (to appear)
-
J. Cryptology
-
-
Nguyen, P.1
Shparlinski, I.E.2
-
34
-
-
0027641367
-
Local randomness in polynomial random number and random function generators
-
H. Niederreiter and C. P. Schnorr, ‘Local randomness in polynomial random number and random function generators’, SIAM J. Comp., 13 (1993), 684–694.
-
(1993)
SIAM J. Comp.
, vol.13
, pp. 684-694
-
-
Niederreiter, H.1
Schnorr, C.P.2
-
35
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
Springer-Verlag, Berlin
-
V. Shoup, ‘Lower bounds for discrete logarithms and related problems’, in Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1233 (1997), 256–266.
-
(1997)
Lect. Notes in Comp. Sci.
, vol.1233
, pp. 256-266
-
-
Shoup, V.1
-
36
-
-
0034830272
-
Sparse polynomial approximation in finite fields
-
Crete, Greece, July 6-8
-
I. E. Shparlinski, ‘Sparse polynomial approximation in finite fields’, Proc. 33rd ACM Symp. on Theory of Comput., Crete, Greece, July 6-8, 2001, 209–215.
-
(2001)
Proc. 33Rd ACM Symp. On Theory of Comput.
, pp. 209-215
-
-
Shparlinski, I.E.1
-
37
-
-
84974695972
-
On the generalised hidden number problem and bit security of XTR
-
Springer-Verlag, Berlin
-
I. E. Shparlinski, ‘On the generalised hidden number problem and bit security of XTR’, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 2227 (2001), 268–277.
-
(2001)
Lect. Notes in Comp. Sci
, vol.2227
, pp. 268-277
-
-
Shparlinski, I.E.1
|