메뉴 건너뛰기




Volumn 3028, Issue , 2004, Pages

Probabilistic and statistical methods in cryptology an introduction by selected topics

(1)  Neuenschwander, Daniel a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 33645597409     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (3)

References (68)
  • 1
    • 0012527140 scopus 로고    scopus 로고
    • Manuscript Department of Computer Science and Engineering, Indian Institute of Technology Kanpur
    • 1 (2003). PRIMES is in P. Manuscript Department of Computer Science and Engineering, Indian Institute of Technology Kanpur. Available on the Internet under www.cse.iitk.ac.in/news/ prlmality.html.
    • (2003) Primes is in P
    • Agrawal, M.1    Kayal, N.2    Saxena, N.3
  • 2
    • 0001523971 scopus 로고
    • A diffusion limit for a class of randomly growing binary trees
    • Aldous, D., Shields, P. (1988). A Diffusion Limit for a Class of Randomly Growing Binary Trees. Prob. Theory Rel. Fields 79, 509-542.
    • (1988) Prob. Theory Rel. Fields , vol.79 , pp. 509-542
    • Aldous, D.1    Shields, P.2
  • 5
    • 0007228521 scopus 로고    scopus 로고
    • Distribution of the number of visits of a random walk
    • Baron, M., Rukhin, A. L. (1999). Distribution of the Number of Visits of a Random Walk. Comm. Statist. - Stochastic Models 15(3), 593-597.
    • (1999) Comm. Statist. - Stochastic Models , vol.15 , Issue.3 , pp. 593-597
    • Baron, M.1    Rukhin, A.L.2
  • 8
    • 85032871901 scopus 로고
    • On the complexity of pseudo-random sequences or: If you can describe a sequence it can't be random
    • Quisquater, J.-J., Vandwalle, J. (ed.). Adv. Crypt. EUROCRYPT '89. Springer, Berlin
    • Beth, T., Dai, Z.-D. (1990). On the Complexity of Pseudo-Random Sequences or: If You Can Describe a Sequence It Can't Be Random. In: Quisquater, J.-J., Vandwalle, J. (ed.). Adv. Crypt. EUROCRYPT '89. Lecture Notes in Computer Science 434. Springer, Berlin, 533-543.
    • (1990) Lecture Notes in Computer Science , vol.434 , pp. 533-543
    • Beth, T.1    Dai, Z.-D.2
  • 9
    • 5844278255 scopus 로고
    • Auflage. Vieweg, Braunschweig
    • Beutelspacher, A. (1993). Kryptologie. 3. Auflage. Vieweg, Braunschweig.
    • (1993) Kryptologie , vol.3
    • Beutelspacher, A.1
  • 10
    • 0026397734 scopus 로고
    • Differential cryptanalysis of des-like cryptosystems
    • Biham, E., Shamir, A. (1991). Differential Cryptanalysis of DES-like Cryptosystems. J. Cryptology 4(l),3-72.
    • (1991) J. Cryptology , vol.4 , Issue.1 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 11
    • 0000971136 scopus 로고
    • Asymptotic distributions of two goodness of fit criteria
    • Billingsley, P. (1956). Asymptotic Distributions of Two Goodness of Fit Criteria. Ann. Math. Statist. 27, 1123-1129.
    • (1956) Ann. Math. Statist. , vol.27 , pp. 1123-1129
    • Billingsley, P.1
  • 12
    • 0033185033 scopus 로고    scopus 로고
    • The linear complexity of the self-shrinking generator
    • Blackburn, S. R. (1999). The Linear Complexity of the Self-Shrinking Generator. IEEE Trans. Inf. Theory 45(6), 2073-2076.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.6 , pp. 2073-2076
    • Blackburn, S.R.1
  • 13
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • Blum, M., Micali, S. (1984). How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM J. Computing 13(4), 850-864.
    • (1984) SIAM J. Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 14
    • 0000552770 scopus 로고    scopus 로고
    • Twenty years of attacks on the rsa cryptosystem
    • Boneh, D. (1999). Twenty Years of Attacks on the RSA Cryptosystem. Notices Am. Math. Soc. 46(2), 203-213.
    • (1999) Notices Am. Math. Soc. , vol.46 , Issue.2 , pp. 203-213
    • Boneh, D.1
  • 15
    • 84957634529 scopus 로고    scopus 로고
    • Breaking RSA may not be equivalent to factoring
    • Nyberg, K. (ed.). Adv. Crypt. EUROCRYPT'98. Springer, Berlin
    • Boneh, D., Venkatesan, R. (1998). Breaking RSA May Not Be Equivalent to Factoring. In: Nyberg, K. (ed.). Adv. Crypt. EUROCRYPT'98. Lecture Notes in Computer Science 1403. Springer, Berlin, 59-71.
    • (1998) Lecture Notes in Computer Science , vol.1403 , pp. 59-71
    • Boneh, D.1    Venkatesan, R.2
  • 16
    • 1642627481 scopus 로고    scopus 로고
    • New results on the randomness of visual cryptography schemes
    • Lam, K.-Y. et al. (ed.). Prog. Comput. Sci. Appl. Log. 20, Birkhäuser, Basel
    • de Bonis, A., de Santis, A (2001). New Results on the Randomness of Visual Cryptography Schemes. In: Lam, K.-Y. et al. (ed.). Cryptography and Computational Number Theory. Prog. Comput. Sci. Appl. Log. 20, Birkhäuser, Basel, 187-201.
    • (2001) Cryptography and Computational Number Theory , pp. 187-201
    • De Bonis, A.1    De Santis, A.2
  • 17
    • 35048904093 scopus 로고    scopus 로고
    • Primes in P: Ein durchbruch fur "Jedermann
    • Bornemann, F. (2002). Primes in P: Ein Durchbruch fur "Jedermann". DMV Mittelungen 4-2002, 14-21.
    • (2002) DMV Mittelungen , vol.4-2002 , pp. 14-21
    • Bornemann, F.1
  • 18
    • 0346796759 scopus 로고
    • Cryptography, statistics, and psudorandomness I
    • Brands, S, Gill, R. (1995). Cryptography, Statistics, and Psudorandomness I. Prob. Math. Stat. 15, 101-114.
    • (1995) Prob. Math. Stat. , vol.15 , pp. 101-114
    • Brands, S.1    Gill, R.2
  • 19
    • 0347427283 scopus 로고    scopus 로고
    • Cryptography, statistics, and psudorandomness II
    • Brands, S, Gill, R. (1996). Cryptography, Statistics, and Psudorandomness II. Prob. Math. Stat. 16(1), 1-17.
    • (1996) Prob. Math. Stat. , vol.16 , Issue.1 , pp. 1-17
    • Brands, S.1    Gill, R.2
  • 20
    • 0024770739 scopus 로고
    • A short proof of the xiao-massey lemma
    • Brynielsson, L. (1989). A Short Proof of the Xiao-Massey Lemma. IEEE Trans. Inf. Theory 35(6), 1344.
    • (1989) IEEE Trans. Inf. Theory , vol.35 , Issue.6 , pp. 1344
    • Brynielsson, L.1
  • 22
    • 0005385598 scopus 로고
    • A generalized birthday attack
    • Günther, G. G. (ed.). Adv. Crypt. EUROCRYPT'88. Springer, Berlin
    • Campana, M., Cohen, R., Girault, M. (1988). A Generalized Birthday Attack. In: Günther, G. G. (ed.). Adv. Crypt. EUROCRYPT'88. Lecture Notes in Computer Science 330. Springer, Berlin, 129-156.
    • (1988) Lecture Notes in Computer Science , vol.330 , pp. 129-156
    • Campana, M.1    Cohen, R.2    Girault, M.3
  • 23
    • 0000924324 scopus 로고    scopus 로고
    • On certain exponential sums and the distribution of diffie-hellman triples
    • Canetti, R., Friedlander, J., Shparlinski, I. (1999). On certain Exponential Sums and the Distribution of Diffie-Hellman Triples. J. London Math. Soc. (2) 59, 799-812.
    • (1999) J. London Math. Soc. , vol.59 , Issue.2 , pp. 799-812
    • Canetti, R.1    Friedlander, J.2    Shparlinski, I.3
  • 24
    • 35048882969 scopus 로고
    • Course Notes, University of Bern (CH)
    • Carnal, H. (1993). Informationstheorie. Course Notes, University of Bern (CH).
    • (1993) Informationstheorie
    • Carnal, H.1
  • 25
    • 85030473541 scopus 로고
    • On a fast correlation attack on certain stream ciphers
    • Davies, D. W. (ed.). EUROCRYPT91. Springer, Berlin
    • Chepyzhov, V., Smeets, B. (1991). On a Fast Correlation Attack on certain Stream Ciphers. In: Davies, D. W. (ed.). EUROCRYPT91. Lecture Notes in Computer Science 547. Springer, Berlin, 176-185.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 176-185
    • Chepyzhov, V.1    Smeets, B.2
  • 27
    • 84974670663 scopus 로고
    • The shrinking generator
    • Stinson, D. R. (ed.). Adv. Crypt. CRYPTO'93. Springer, Berlin
    • Coppersmith, D., Krawczyk, H., Mansour, Y. (1994). The Shrinking Generator. In: Stinson, D. R. (ed.). Adv. Crypt. CRYPTO'93. Lecture Notes in Computer Science 773. Springer, Berlin, 22-39.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 22-39
    • Coppersmith, D.1    Krawczyk, H.2    Mansour, Y.3
  • 28
    • 84949220600 scopus 로고    scopus 로고
    • An accurate evalutation of maurer's universal test. in: Selected areas in cryptography
    • Springer, Berlin
    • Coron, J. S., Naccache, D. (1999). An Accurate Evalutation of Maurer's Universal Test. In: Selected Areas in Cryptography. Lecture Notes in Computer Science 1556. Springer, Berlin, 57-71.
    • (1999) Lecture Notes in Computer Science , vol.1556 , pp. 57-71
    • Coron, J.S.1    Naccache, D.2
  • 30
    • 84966230027 scopus 로고
    • Average case error estimates for the strong probable prime test
    • Darmgård, I. B., Landrock, P., Pomerance, C. (1993). Average Case Error Estimates for the Strong Probable Prime Test. Math, of Computation 61(203), 177-194.
    • (1993) Math. of Computation , vol.61 , Issue.203 , pp. 177-194
    • Darmgård, I.B.1    Landrock, P.2    Pomerance, C.3
  • 32
  • 34
    • 0027306732 scopus 로고
    • A uniform-complexity treatment of encryption and zero-knowledge
    • Goldreich, O. (1993). A Uniform-Complexity Treatment of Encryption and Zero-Knowledge. J. Cryptology 6(1), 21-53.
    • (1993) J. Cryptology , vol.6 , Issue.1 , pp. 21-53
    • Goldreich, O.1
  • 35
    • 0001170206 scopus 로고    scopus 로고
    • On the security of diffiehellman bits
    • Lam, K.-Y. et al. (ed.). Prog. Comput. Sci. Appl. Log. 20, Birkhäuser, Basel
    • Gonzales Vasco, M. I., Shparlinski, I. E. (2001)- On the Security of DiffieHellman Bits. In: Lam, K.-Y. et al. (ed.). Cryptography and Computational Number Theory. Prog. Comput. Sci. Appl. Log. 20, Birkhäuser, Basel, 257-268.
    • (2001) Cryptography and Computational Number Theory , pp. 257-268
    • Gonzales Vasco, M.I.1    Shparlinski, I.E.2
  • 36
    • 84959581633 scopus 로고
    • The serial test for sampling numbers and other tests for randomness
    • Good, I. J. (1953). The Serial Test for Sampling Numbers and Other Tests for Randomness. Proc. Cam. Phil. Soc. 49, 276-284.
    • (1953) Proc. Cam. Phil. Soc. , vol.49 , pp. 276-284
    • Good, I.J.1
  • 37
    • 0002118066 scopus 로고
    • On the serial test for random sequence
    • Good, I. J. (1957). On the Serial Test for Random Sequence. Ann. Math. Statist. 23, 262-264.
    • (1957) Ann. Math. Statist. , vol.23 , pp. 262-264
    • Good, I.J.1
  • 38
    • 23944467987 scopus 로고    scopus 로고
    • A probable prime test with very high confidence for n = 3 mod. 4
    • Müller, S. (2003). A Probable Prime Test with very high Confidence for n = 3 mod. 4, J. Cryptotogy 16(2), 117-139.
    • (2003) J. Cryptotogy , vol.16 , Issue.2 , pp. 117-139
    • Müller, S.1
  • 39
    • 35048863926 scopus 로고    scopus 로고
    • Achieving optimal fairness from biased coinflips
    • Lam, K.-Y. et al. (ed.). Birkhäuser, Basel
    • Näslund, M., Russell, A. (2001). Achieving Optimal Fairness from Biased Coinflips. In: Lam, K.-Y. et al. (ed.). Cryptography and Computational Number Theory. Birkhäuser, Basel, 303-330.
    • (2001) Cryptography and Computational Number Theory , pp. 303-330
    • Näslund, M.1    Russell, A.2
  • 40
    • 35048827907 scopus 로고    scopus 로고
    • A limit theorem in cryptology: The asymptotic distribution of additive characteristics of random permutations of (ZZ/qZZ)
    • Berkes, I. et al. (ed.). Proceedings of the 1999 Balatonlelle Conference. Budapest
    • Neuenschwander, D. (2002). A Limit Theorem in Cryptology: The Asymptotic Distribution of Additive Characteristics of Random Permutations of (ZZ/qZZ). In: Berkes, I. et al. (ed.). Limit Theofems in Probability and Statistics II. Proceedings of the 1999 Balatonlelle Conference. Budapest, 437-442.
    • (2002) Limit Theofems in Probability and Statistics II , pp. 437-442
    • Neuenschwander, D.1
  • 41
    • 0347093590 scopus 로고    scopus 로고
    • Generating random numbers of prescribed distribution using physical sources
    • Neuenschwander, D., Zeuner, H. M. (2003). Generating Random Numbers of Prescribed Distribution Using Physical Sources. Stat. and Comp. 13(1), 5-11.
    • (2003) Stat. and Comp. , vol.13 , Issue.1 , pp. 5-11
    • Neuenschwander, D.1    Zeuner, H.M.2
  • 42
    • 0038579951 scopus 로고
    • Various techniques used in connection with random digits
    • Pegamont Press, Elmsford NY
    • von Neumann, J. (1963). Various Techniques Used in Connection with Random Digits. In: von Neumann's Collected Works Vol. 5. Pegamont Press, Elmsford NY, 768-770.
    • (1963) Von Neumann's Collected Works , vol.5 , pp. 768-770
    • Von Neumann, J.1
  • 43
    • 0347463303 scopus 로고
    • Basic radioactive randoms
    • Nisley, E. (1990). Basic Radioactive Randoms. Circuit Cellar Ink, 58-68.
    • (1990) Circuit Cellar Ink , pp. 58-68
    • Nisley, E.1
  • 44
    • 0029272122 scopus 로고
    • On the distribution of characteristics in bijective mappings
    • O'Connor, L. (1995). On the Distribution of Characteristics in Bijective Mappings. J. Crpytology 8, 67-86.
    • (1995) J. Crpytology , vol.8 , pp. 67-86
    • O'Connor, L.1
  • 45
    • 0041335000 scopus 로고    scopus 로고
    • 22nd zero of the riemann zeta function
    • Lapidus, M. L. et al. (ed.). Dynamical, spectral, and arithmetic zeta functions.
    • 22nd Zero of the Riemann Zeta Function. In: Lapidus, M. L. et al. (ed.). Dynamical, spectral, and arithmetic zeta functions. Contemp. Math. 290, 139-144.
    • (2001) Contemp. Math. , vol.290 , pp. 139-144
    • Odlyzko, A.M.1
  • 46
    • 84947733936 scopus 로고    scopus 로고
    • Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
    • Boy, B., Okamot, E. (ed.). Progr. Crypt. INDOCRYPT 2000. Springer, Berlin
    • Okeya, K., Sakurai, K. (2000). Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. In: Boy, B., Okamot, E. (ed.). Progr. Crypt. INDOCRYPT 2000. Lecture Notes in Computer Science 1977. Springer, Berlin,178-190.
    • (2000) Lecture Notes in Computer Science , vol.1977 , pp. 178-190
    • Okeya, K.1    Sakurai, K.2
  • 48
    • 84947756322 scopus 로고    scopus 로고
    • On the incomparability of entropy and marginal guesswork in brute-force attacks
    • Boy, B., Okamot, E. (ed.). Progr. Crypt. INDOCRYPT 2000. Springer, Berlin
    • Pliam, J. O. (2000). On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks. In: Boy, B., Okamot, E. (ed.). Progr. Crypt. INDOCRYPT 2000. Lecture Notes in Computer Science 1977. Springer, Berlin, 67-79.
    • (2000) Lecture Notes in Computer Science , vol.1977 , pp. 67-79
    • Pliam, J.O.1
  • 49
    • 0022102506 scopus 로고
    • Shift-register synthesis (modulo m)
    • Reeds, J. A., Sloane, N. J. A. (1985). Shift-register Synthesis (modulo m). SIAM J. Comput. 14(3), 505-513.
    • (1985) SIAM J. Comput. , vol.14 , Issue.3 , pp. 505-513
    • Reeds, J.A.1    Sloane, N.J.A.2
  • 51
    • 0346832510 scopus 로고
    • PURAN 2: Ein zufallsgenerator zur erzeugung von quasiidelaen zufallszahlen aus elektronischem rauschen
    • Richter, M. (1993). PURAN 2: Ein Zufallsgenerator zur Erzeugung von quasiidelaen Zufallszahlen aus elektronischem Rauschen. Informatik aktuell 41, 49-62.
    • (1993) Informatik Aktuell , vol.41 , pp. 49-62
    • Richter, M.1
  • 53
    • 0034341923 scopus 로고    scopus 로고
    • Approximate entropy for testing randomness
    • Rukhin, A. L. (2000a). Approximate Entropy for Testing Randomness. J. Appl. Prob. 37, 88-100.
    • (2000) J. Appl. Prob. , vol.37 , pp. 88-100
    • Rukhin, A.L.1
  • 54
    • 0034747573 scopus 로고    scopus 로고
    • Testing randomness: A suite of statistical procdures
    • Rukhin, A. L. (2000b). Testing Randomness: A Suite of Statistical Procdures. Theory Probab. Appl. 45(1), 111-132.
    • (2000) Theory Probab. Appl. , vol.45 , Issue.1 , pp. 111-132
    • Rukhin, A.L.1
  • 55
    • 68549092451 scopus 로고    scopus 로고
    • A timing attack against RSA with the chinese remainder theorem
    • Koc, C. K., Paar, C. (ed.). Cryptographic Hardware and Embedded Systems. Springer, Berlin
    • Schindler, W. (2000). A Timing Attack Against RSA with the Chinese Remainder Theorem. In: Koc, C. K., Paar, C. (ed.). Cryptographic Hardware and Embedded Systems. Lecture Notes in Computer Science 1965. Springer, Berlin, 109-124.
    • (2000) Lecture Notes in Computer Science , vol.1965 , pp. 109-124
    • Schindler, W.1
  • 56
    • 84983436061 scopus 로고    scopus 로고
    • Optimized timing attacks against public key cryptosystems
    • Schindler, W. (2002a). Optimized Timing Attacks Against Public Key Cryptosystems. Statistics and Decisions 20, 191-210.
    • (2002) Statistics and Decisions , vol.20 , pp. 191-210
    • Schindler, W.1
  • 57
    • 84958960266 scopus 로고    scopus 로고
    • A combined timing and power attack
    • Paillier, P., Naccache, D. (ed.). Public Key Cryptography 2002. Springer, Berlin
    • Schindler, W. (2002b). A Combined Timing and Power Attack. In: Paillier, P., Naccache, D. (ed.). Public Key Cryptography 2002. Lecture Notes in Computer Science 2274. Springer, Berlin, 263-279.
    • (2002) Lecture Notes in Computer Science , vol.2274 , pp. 263-279
    • Schindler, W.1
  • 58
    • 33645591077 scopus 로고    scopus 로고
    • More detail for a combined timing and power attack against implementations of RSA
    • Paterson, K. G. (ed.). Cryptography and Coding - IMA 2003. Springer, Berlin
    • Schindler, W., Walter, C. (2003). More Detail for a Combined Timing and Power Attack against Implementations of RSA. In: Paterson, K. G. (ed.). Cryptography and Coding - IMA 2003. Lecture Notes in Computer Science 2898. Springer, Berlin, 245-263.
    • (2003) Lecture Notes in Computer Science , vol.2898 , pp. 245-263
    • Schindler, W.1    Walter, C.2
  • 60
    • 0027607399 scopus 로고
    • Universal tests for nonuniform distributions
    • Schrift, A. W., Shamir, A. (1993). Universal Tests for Nonuniform Distributions. J. Cryptology 6, 119-133.
    • (1993) J. Cryptology , vol.6 , pp. 119-133
    • Schrift, A.W.1    Shamir, A.2
  • 61
    • 84937574527 scopus 로고    scopus 로고
    • Using fewer qubits in shor's factorization algorithm via simultaneous diophantine approximation
    • Naccache, D. (ed.). Topics in Cryptology. CT-RSA 2001. Springer, Berlin
    • Seifert, J.-P. (2001). Using Fewer Qubits in Shor's Factorization Algorithm Via Simultaneous Diophantine Approximation. In: Naccache, D. (ed.). Topics in Cryptology. CT-RSA 2001. Lecture Notes in Computer Science 2020. Springer, Berlin, 319-327.
    • (2001) Lecture Notes in Computer Science , vol.2020 , pp. 319-327
    • Seifert, J.-P.1
  • 62
    • 0021489155 scopus 로고
    • Correlation immunity of nonlinear combining functions for cryptographic applications
    • Siegenthaler, T. (1984). Correlation Immunity of Nonlinear Combining Functions for Cryptographic Applications. IEEE Trans. Inf. Theory IT-30(5), 776780.
    • (1984) IEEE Trans. Inf. Theory , vol.IT-30 , Issue.5 , pp. 776-780
    • Siegenthaler, T.1
  • 63
  • 66
    • 35048890617 scopus 로고    scopus 로고
    • Ph. D. Thesis University of Giessen. Mittelungen aus dem Math. Seminar Giessen, Selbstverlag des Math. Instituts.
    • Walther, U. (1999). Verschlüsselungssysteme auf Basis endlicher Geometrien. Ph. D. Thesis University of Giessen. Mittelungen aus dem Math. Seminar Giessen, Heft 236, Selbstverlag des Math. Instituts.
    • (1999) Verschlüsselungssysteme Auf Basis Endlicher Geometrien. , Issue.236
    • Walther, U.1
  • 67
    • 0019080452 scopus 로고
    • A modification of the usa public-key encryption procedure
    • Williams, H. C. (1980). A Modification of the USA Public-Key Encryption Procedure. IEEE Trans. Inf. Theory 26, 726-729.
    • (1980) IEEE Trans. Inf. Theory , vol.26 , pp. 726-729
    • Williams, H.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.