-
1
-
-
0012527140
-
-
Manuscript Department of Computer Science and Engineering, Indian Institute of Technology Kanpur
-
1 (2003). PRIMES is in P. Manuscript Department of Computer Science and Engineering, Indian Institute of Technology Kanpur. Available on the Internet under www.cse.iitk.ac.in/news/ prlmality.html.
-
(2003)
Primes is in P
-
-
Agrawal, M.1
Kayal, N.2
Saxena, N.3
-
2
-
-
0001523971
-
A diffusion limit for a class of randomly growing binary trees
-
Aldous, D., Shields, P. (1988). A Diffusion Limit for a Class of Randomly Growing Binary Trees. Prob. Theory Rel. Fields 79, 509-542.
-
(1988)
Prob. Theory Rel. Fields
, vol.79
, pp. 509-542
-
-
Aldous, D.1
Shields, P.2
-
3
-
-
35048898021
-
-
Special NIST Publication, NIST, Gaithersburg MD
-
Banks, D., Dray, J., Leigh, S., Levenson, M., Nechvatal, J., Rukhin, A. L., Smid, M., Soto, J., Vangel, M., Vo, S. (2000). A Statistical Test Suite for the Validation of Cryptographic Random Number Generators. Special NIST Publication, NIST, Gaithersburg MD.
-
(2000)
A Statistical Test Suite for the Validation of Cryptographic Random Number Generators
-
-
Banks, D.1
Dray, J.2
Leigh, S.3
Levenson, M.4
Nechvatal, J.5
Rukhin, A.L.6
Smid, M.7
Soto, J.8
Vangel, M.9
Vo, S.10
-
4
-
-
0004133549
-
-
Clarendon Press, Oxford
-
Barbour, A. D., HoIst, L., Janson, S. (1992). Poisson Approximation. Clarendon Press, Oxford.
-
(1992)
Poisson Approximation
-
-
Barbour, A.D.1
Hoist, L.2
Janson, S.3
-
5
-
-
0007228521
-
Distribution of the number of visits of a random walk
-
Baron, M., Rukhin, A. L. (1999). Distribution of the Number of Visits of a Random Walk. Comm. Statist. - Stochastic Models 15(3), 593-597.
-
(1999)
Comm. Statist. - Stochastic Models
, vol.15
, Issue.3
, pp. 593-597
-
-
Baron, M.1
Rukhin, A.L.2
-
8
-
-
85032871901
-
On the complexity of pseudo-random sequences or: If you can describe a sequence it can't be random
-
Quisquater, J.-J., Vandwalle, J. (ed.). Adv. Crypt. EUROCRYPT '89. Springer, Berlin
-
Beth, T., Dai, Z.-D. (1990). On the Complexity of Pseudo-Random Sequences or: If You Can Describe a Sequence It Can't Be Random. In: Quisquater, J.-J., Vandwalle, J. (ed.). Adv. Crypt. EUROCRYPT '89. Lecture Notes in Computer Science 434. Springer, Berlin, 533-543.
-
(1990)
Lecture Notes in Computer Science
, vol.434
, pp. 533-543
-
-
Beth, T.1
Dai, Z.-D.2
-
9
-
-
5844278255
-
-
Auflage. Vieweg, Braunschweig
-
Beutelspacher, A. (1993). Kryptologie. 3. Auflage. Vieweg, Braunschweig.
-
(1993)
Kryptologie
, vol.3
-
-
Beutelspacher, A.1
-
10
-
-
0026397734
-
Differential cryptanalysis of des-like cryptosystems
-
Biham, E., Shamir, A. (1991). Differential Cryptanalysis of DES-like Cryptosystems. J. Cryptology 4(l),3-72.
-
(1991)
J. Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
11
-
-
0000971136
-
Asymptotic distributions of two goodness of fit criteria
-
Billingsley, P. (1956). Asymptotic Distributions of Two Goodness of Fit Criteria. Ann. Math. Statist. 27, 1123-1129.
-
(1956)
Ann. Math. Statist.
, vol.27
, pp. 1123-1129
-
-
Billingsley, P.1
-
12
-
-
0033185033
-
The linear complexity of the self-shrinking generator
-
Blackburn, S. R. (1999). The Linear Complexity of the Self-Shrinking Generator. IEEE Trans. Inf. Theory 45(6), 2073-2076.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.6
, pp. 2073-2076
-
-
Blackburn, S.R.1
-
13
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
Blum, M., Micali, S. (1984). How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM J. Computing 13(4), 850-864.
-
(1984)
SIAM J. Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
14
-
-
0000552770
-
Twenty years of attacks on the rsa cryptosystem
-
Boneh, D. (1999). Twenty Years of Attacks on the RSA Cryptosystem. Notices Am. Math. Soc. 46(2), 203-213.
-
(1999)
Notices Am. Math. Soc.
, vol.46
, Issue.2
, pp. 203-213
-
-
Boneh, D.1
-
15
-
-
84957634529
-
Breaking RSA may not be equivalent to factoring
-
Nyberg, K. (ed.). Adv. Crypt. EUROCRYPT'98. Springer, Berlin
-
Boneh, D., Venkatesan, R. (1998). Breaking RSA May Not Be Equivalent to Factoring. In: Nyberg, K. (ed.). Adv. Crypt. EUROCRYPT'98. Lecture Notes in Computer Science 1403. Springer, Berlin, 59-71.
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 59-71
-
-
Boneh, D.1
Venkatesan, R.2
-
16
-
-
1642627481
-
New results on the randomness of visual cryptography schemes
-
Lam, K.-Y. et al. (ed.). Prog. Comput. Sci. Appl. Log. 20, Birkhäuser, Basel
-
de Bonis, A., de Santis, A (2001). New Results on the Randomness of Visual Cryptography Schemes. In: Lam, K.-Y. et al. (ed.). Cryptography and Computational Number Theory. Prog. Comput. Sci. Appl. Log. 20, Birkhäuser, Basel, 187-201.
-
(2001)
Cryptography and Computational Number Theory
, pp. 187-201
-
-
De Bonis, A.1
De Santis, A.2
-
17
-
-
35048904093
-
Primes in P: Ein durchbruch fur "Jedermann
-
Bornemann, F. (2002). Primes in P: Ein Durchbruch fur "Jedermann". DMV Mittelungen 4-2002, 14-21.
-
(2002)
DMV Mittelungen
, vol.4-2002
, pp. 14-21
-
-
Bornemann, F.1
-
18
-
-
0346796759
-
Cryptography, statistics, and psudorandomness I
-
Brands, S, Gill, R. (1995). Cryptography, Statistics, and Psudorandomness I. Prob. Math. Stat. 15, 101-114.
-
(1995)
Prob. Math. Stat.
, vol.15
, pp. 101-114
-
-
Brands, S.1
Gill, R.2
-
19
-
-
0347427283
-
Cryptography, statistics, and psudorandomness II
-
Brands, S, Gill, R. (1996). Cryptography, Statistics, and Psudorandomness II. Prob. Math. Stat. 16(1), 1-17.
-
(1996)
Prob. Math. Stat.
, vol.16
, Issue.1
, pp. 1-17
-
-
Brands, S.1
Gill, R.2
-
20
-
-
0024770739
-
A short proof of the xiao-massey lemma
-
Brynielsson, L. (1989). A Short Proof of the Xiao-Massey Lemma. IEEE Trans. Inf. Theory 35(6), 1344.
-
(1989)
IEEE Trans. Inf. Theory
, vol.35
, Issue.6
, pp. 1344
-
-
Brynielsson, L.1
-
22
-
-
0005385598
-
A generalized birthday attack
-
Günther, G. G. (ed.). Adv. Crypt. EUROCRYPT'88. Springer, Berlin
-
Campana, M., Cohen, R., Girault, M. (1988). A Generalized Birthday Attack. In: Günther, G. G. (ed.). Adv. Crypt. EUROCRYPT'88. Lecture Notes in Computer Science 330. Springer, Berlin, 129-156.
-
(1988)
Lecture Notes in Computer Science
, vol.330
, pp. 129-156
-
-
Campana, M.1
Cohen, R.2
Girault, M.3
-
23
-
-
0000924324
-
On certain exponential sums and the distribution of diffie-hellman triples
-
Canetti, R., Friedlander, J., Shparlinski, I. (1999). On certain Exponential Sums and the Distribution of Diffie-Hellman Triples. J. London Math. Soc. (2) 59, 799-812.
-
(1999)
J. London Math. Soc.
, vol.59
, Issue.2
, pp. 799-812
-
-
Canetti, R.1
Friedlander, J.2
Shparlinski, I.3
-
24
-
-
35048882969
-
-
Course Notes, University of Bern (CH)
-
Carnal, H. (1993). Informationstheorie. Course Notes, University of Bern (CH).
-
(1993)
Informationstheorie
-
-
Carnal, H.1
-
25
-
-
85030473541
-
On a fast correlation attack on certain stream ciphers
-
Davies, D. W. (ed.). EUROCRYPT91. Springer, Berlin
-
Chepyzhov, V., Smeets, B. (1991). On a Fast Correlation Attack on certain Stream Ciphers. In: Davies, D. W. (ed.). EUROCRYPT91. Lecture Notes in Computer Science 547. Springer, Berlin, 176-185.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 176-185
-
-
Chepyzhov, V.1
Smeets, B.2
-
27
-
-
84974670663
-
The shrinking generator
-
Stinson, D. R. (ed.). Adv. Crypt. CRYPTO'93. Springer, Berlin
-
Coppersmith, D., Krawczyk, H., Mansour, Y. (1994). The Shrinking Generator. In: Stinson, D. R. (ed.). Adv. Crypt. CRYPTO'93. Lecture Notes in Computer Science 773. Springer, Berlin, 22-39.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 22-39
-
-
Coppersmith, D.1
Krawczyk, H.2
Mansour, Y.3
-
28
-
-
84949220600
-
An accurate evalutation of maurer's universal test. in: Selected areas in cryptography
-
Springer, Berlin
-
Coron, J. S., Naccache, D. (1999). An Accurate Evalutation of Maurer's Universal Test. In: Selected Areas in Cryptography. Lecture Notes in Computer Science 1556. Springer, Berlin, 57-71.
-
(1999)
Lecture Notes in Computer Science
, vol.1556
, pp. 57-71
-
-
Coron, J.S.1
Naccache, D.2
-
30
-
-
84966230027
-
Average case error estimates for the strong probable prime test
-
Darmgård, I. B., Landrock, P., Pomerance, C. (1993). Average Case Error Estimates for the Strong Probable Prime Test. Math, of Computation 61(203), 177-194.
-
(1993)
Math. of Computation
, vol.61
, Issue.203
, pp. 177-194
-
-
Darmgård, I.B.1
Landrock, P.2
Pomerance, C.3
-
34
-
-
0027306732
-
A uniform-complexity treatment of encryption and zero-knowledge
-
Goldreich, O. (1993). A Uniform-Complexity Treatment of Encryption and Zero-Knowledge. J. Cryptology 6(1), 21-53.
-
(1993)
J. Cryptology
, vol.6
, Issue.1
, pp. 21-53
-
-
Goldreich, O.1
-
35
-
-
0001170206
-
On the security of diffiehellman bits
-
Lam, K.-Y. et al. (ed.). Prog. Comput. Sci. Appl. Log. 20, Birkhäuser, Basel
-
Gonzales Vasco, M. I., Shparlinski, I. E. (2001)- On the Security of DiffieHellman Bits. In: Lam, K.-Y. et al. (ed.). Cryptography and Computational Number Theory. Prog. Comput. Sci. Appl. Log. 20, Birkhäuser, Basel, 257-268.
-
(2001)
Cryptography and Computational Number Theory
, pp. 257-268
-
-
Gonzales Vasco, M.I.1
Shparlinski, I.E.2
-
36
-
-
84959581633
-
The serial test for sampling numbers and other tests for randomness
-
Good, I. J. (1953). The Serial Test for Sampling Numbers and Other Tests for Randomness. Proc. Cam. Phil. Soc. 49, 276-284.
-
(1953)
Proc. Cam. Phil. Soc.
, vol.49
, pp. 276-284
-
-
Good, I.J.1
-
37
-
-
0002118066
-
On the serial test for random sequence
-
Good, I. J. (1957). On the Serial Test for Random Sequence. Ann. Math. Statist. 23, 262-264.
-
(1957)
Ann. Math. Statist.
, vol.23
, pp. 262-264
-
-
Good, I.J.1
-
38
-
-
23944467987
-
A probable prime test with very high confidence for n = 3 mod. 4
-
Müller, S. (2003). A Probable Prime Test with very high Confidence for n = 3 mod. 4, J. Cryptotogy 16(2), 117-139.
-
(2003)
J. Cryptotogy
, vol.16
, Issue.2
, pp. 117-139
-
-
Müller, S.1
-
39
-
-
35048863926
-
Achieving optimal fairness from biased coinflips
-
Lam, K.-Y. et al. (ed.). Birkhäuser, Basel
-
Näslund, M., Russell, A. (2001). Achieving Optimal Fairness from Biased Coinflips. In: Lam, K.-Y. et al. (ed.). Cryptography and Computational Number Theory. Birkhäuser, Basel, 303-330.
-
(2001)
Cryptography and Computational Number Theory
, pp. 303-330
-
-
Näslund, M.1
Russell, A.2
-
40
-
-
35048827907
-
A limit theorem in cryptology: The asymptotic distribution of additive characteristics of random permutations of (ZZ/qZZ)
-
Berkes, I. et al. (ed.). Proceedings of the 1999 Balatonlelle Conference. Budapest
-
Neuenschwander, D. (2002). A Limit Theorem in Cryptology: The Asymptotic Distribution of Additive Characteristics of Random Permutations of (ZZ/qZZ). In: Berkes, I. et al. (ed.). Limit Theofems in Probability and Statistics II. Proceedings of the 1999 Balatonlelle Conference. Budapest, 437-442.
-
(2002)
Limit Theofems in Probability and Statistics II
, pp. 437-442
-
-
Neuenschwander, D.1
-
41
-
-
0347093590
-
Generating random numbers of prescribed distribution using physical sources
-
Neuenschwander, D., Zeuner, H. M. (2003). Generating Random Numbers of Prescribed Distribution Using Physical Sources. Stat. and Comp. 13(1), 5-11.
-
(2003)
Stat. and Comp.
, vol.13
, Issue.1
, pp. 5-11
-
-
Neuenschwander, D.1
Zeuner, H.M.2
-
42
-
-
0038579951
-
Various techniques used in connection with random digits
-
Pegamont Press, Elmsford NY
-
von Neumann, J. (1963). Various Techniques Used in Connection with Random Digits. In: von Neumann's Collected Works Vol. 5. Pegamont Press, Elmsford NY, 768-770.
-
(1963)
Von Neumann's Collected Works
, vol.5
, pp. 768-770
-
-
Von Neumann, J.1
-
43
-
-
0347463303
-
Basic radioactive randoms
-
Nisley, E. (1990). Basic Radioactive Randoms. Circuit Cellar Ink, 58-68.
-
(1990)
Circuit Cellar Ink
, pp. 58-68
-
-
Nisley, E.1
-
44
-
-
0029272122
-
On the distribution of characteristics in bijective mappings
-
O'Connor, L. (1995). On the Distribution of Characteristics in Bijective Mappings. J. Crpytology 8, 67-86.
-
(1995)
J. Crpytology
, vol.8
, pp. 67-86
-
-
O'Connor, L.1
-
45
-
-
0041335000
-
22nd zero of the riemann zeta function
-
Lapidus, M. L. et al. (ed.). Dynamical, spectral, and arithmetic zeta functions.
-
22nd Zero of the Riemann Zeta Function. In: Lapidus, M. L. et al. (ed.). Dynamical, spectral, and arithmetic zeta functions. Contemp. Math. 290, 139-144.
-
(2001)
Contemp. Math.
, vol.290
, pp. 139-144
-
-
Odlyzko, A.M.1
-
46
-
-
84947733936
-
Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
-
Boy, B., Okamot, E. (ed.). Progr. Crypt. INDOCRYPT 2000. Springer, Berlin
-
Okeya, K., Sakurai, K. (2000). Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. In: Boy, B., Okamot, E. (ed.). Progr. Crypt. INDOCRYPT 2000. Lecture Notes in Computer Science 1977. Springer, Berlin,178-190.
-
(2000)
Lecture Notes in Computer Science
, vol.1977
, pp. 178-190
-
-
Okeya, K.1
Sakurai, K.2
-
48
-
-
84947756322
-
On the incomparability of entropy and marginal guesswork in brute-force attacks
-
Boy, B., Okamot, E. (ed.). Progr. Crypt. INDOCRYPT 2000. Springer, Berlin
-
Pliam, J. O. (2000). On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks. In: Boy, B., Okamot, E. (ed.). Progr. Crypt. INDOCRYPT 2000. Lecture Notes in Computer Science 1977. Springer, Berlin, 67-79.
-
(2000)
Lecture Notes in Computer Science
, vol.1977
, pp. 67-79
-
-
Pliam, J.O.1
-
49
-
-
0022102506
-
Shift-register synthesis (modulo m)
-
Reeds, J. A., Sloane, N. J. A. (1985). Shift-register Synthesis (modulo m). SIAM J. Comput. 14(3), 505-513.
-
(1985)
SIAM J. Comput.
, vol.14
, Issue.3
, pp. 505-513
-
-
Reeds, J.A.1
Sloane, N.J.A.2
-
51
-
-
0346832510
-
PURAN 2: Ein zufallsgenerator zur erzeugung von quasiidelaen zufallszahlen aus elektronischem rauschen
-
Richter, M. (1993). PURAN 2: Ein Zufallsgenerator zur Erzeugung von quasiidelaen Zufallszahlen aus elektronischem Rauschen. Informatik aktuell 41, 49-62.
-
(1993)
Informatik Aktuell
, vol.41
, pp. 49-62
-
-
Richter, M.1
-
53
-
-
0034341923
-
Approximate entropy for testing randomness
-
Rukhin, A. L. (2000a). Approximate Entropy for Testing Randomness. J. Appl. Prob. 37, 88-100.
-
(2000)
J. Appl. Prob.
, vol.37
, pp. 88-100
-
-
Rukhin, A.L.1
-
54
-
-
0034747573
-
Testing randomness: A suite of statistical procdures
-
Rukhin, A. L. (2000b). Testing Randomness: A Suite of Statistical Procdures. Theory Probab. Appl. 45(1), 111-132.
-
(2000)
Theory Probab. Appl.
, vol.45
, Issue.1
, pp. 111-132
-
-
Rukhin, A.L.1
-
55
-
-
68549092451
-
A timing attack against RSA with the chinese remainder theorem
-
Koc, C. K., Paar, C. (ed.). Cryptographic Hardware and Embedded Systems. Springer, Berlin
-
Schindler, W. (2000). A Timing Attack Against RSA with the Chinese Remainder Theorem. In: Koc, C. K., Paar, C. (ed.). Cryptographic Hardware and Embedded Systems. Lecture Notes in Computer Science 1965. Springer, Berlin, 109-124.
-
(2000)
Lecture Notes in Computer Science
, vol.1965
, pp. 109-124
-
-
Schindler, W.1
-
56
-
-
84983436061
-
Optimized timing attacks against public key cryptosystems
-
Schindler, W. (2002a). Optimized Timing Attacks Against Public Key Cryptosystems. Statistics and Decisions 20, 191-210.
-
(2002)
Statistics and Decisions
, vol.20
, pp. 191-210
-
-
Schindler, W.1
-
57
-
-
84958960266
-
A combined timing and power attack
-
Paillier, P., Naccache, D. (ed.). Public Key Cryptography 2002. Springer, Berlin
-
Schindler, W. (2002b). A Combined Timing and Power Attack. In: Paillier, P., Naccache, D. (ed.). Public Key Cryptography 2002. Lecture Notes in Computer Science 2274. Springer, Berlin, 263-279.
-
(2002)
Lecture Notes in Computer Science
, vol.2274
, pp. 263-279
-
-
Schindler, W.1
-
58
-
-
33645591077
-
More detail for a combined timing and power attack against implementations of RSA
-
Paterson, K. G. (ed.). Cryptography and Coding - IMA 2003. Springer, Berlin
-
Schindler, W., Walter, C. (2003). More Detail for a Combined Timing and Power Attack against Implementations of RSA. In: Paterson, K. G. (ed.). Cryptography and Coding - IMA 2003. Lecture Notes in Computer Science 2898. Springer, Berlin, 245-263.
-
(2003)
Lecture Notes in Computer Science
, vol.2898
, pp. 245-263
-
-
Schindler, W.1
Walter, C.2
-
60
-
-
0027607399
-
Universal tests for nonuniform distributions
-
Schrift, A. W., Shamir, A. (1993). Universal Tests for Nonuniform Distributions. J. Cryptology 6, 119-133.
-
(1993)
J. Cryptology
, vol.6
, pp. 119-133
-
-
Schrift, A.W.1
Shamir, A.2
-
61
-
-
84937574527
-
Using fewer qubits in shor's factorization algorithm via simultaneous diophantine approximation
-
Naccache, D. (ed.). Topics in Cryptology. CT-RSA 2001. Springer, Berlin
-
Seifert, J.-P. (2001). Using Fewer Qubits in Shor's Factorization Algorithm Via Simultaneous Diophantine Approximation. In: Naccache, D. (ed.). Topics in Cryptology. CT-RSA 2001. Lecture Notes in Computer Science 2020. Springer, Berlin, 319-327.
-
(2001)
Lecture Notes in Computer Science
, vol.2020
, pp. 319-327
-
-
Seifert, J.-P.1
-
62
-
-
0021489155
-
Correlation immunity of nonlinear combining functions for cryptographic applications
-
Siegenthaler, T. (1984). Correlation Immunity of Nonlinear Combining Functions for Cryptographic Applications. IEEE Trans. Inf. Theory IT-30(5), 776780.
-
(1984)
IEEE Trans. Inf. Theory
, vol.IT-30
, Issue.5
, pp. 776-780
-
-
Siegenthaler, T.1
-
63
-
-
35048839286
-
-
Swiss Army Bern
-
Swiss Army (1981). Kryptologen-Handbuch. Bern.
-
(1981)
Kryptologen-Handbuch
-
-
-
66
-
-
35048890617
-
-
Ph. D. Thesis University of Giessen. Mittelungen aus dem Math. Seminar Giessen, Selbstverlag des Math. Instituts.
-
Walther, U. (1999). Verschlüsselungssysteme auf Basis endlicher Geometrien. Ph. D. Thesis University of Giessen. Mittelungen aus dem Math. Seminar Giessen, Heft 236, Selbstverlag des Math. Instituts.
-
(1999)
Verschlüsselungssysteme Auf Basis Endlicher Geometrien.
, Issue.236
-
-
Walther, U.1
-
67
-
-
0019080452
-
A modification of the usa public-key encryption procedure
-
Williams, H. C. (1980). A Modification of the USA Public-Key Encryption Procedure. IEEE Trans. Inf. Theory 26, 726-729.
-
(1980)
IEEE Trans. Inf. Theory
, vol.26
, pp. 726-729
-
-
Williams, H.C.1
|