-
1
-
-
0020909064
-
On breaking generalized knapsack publick key cryptosystems
-
ACM
-
L. M. Adleman. On breaking generalized knapsack publick key cryptosystems. In Proc.of15th STOC, pages 402-412, ACM, 1983.
-
(1983)
Proc.of15th STOC
, pp. 402-412
-
-
Adleman, L.M.1
-
3
-
-
0029719917
-
Generating hard instances of lattice problems
-
ACM, Available at [39] at TR96-007
-
M. Ajtai. Generating hard instances of lattice problems. In Proc. of 28th STOC, pages 99-108. ACM, 1996. Available at [39] at TR96-007.
-
(1996)
Proc. of 28th STOC
, pp. 99-108
-
-
Ajtai, M.1
-
4
-
-
0031644084
-
2 is NP-hard for randomized reductions
-
ACM, Available at [39] as TR97-047
-
2 is NP-hard for randomized reductions. In Proc. of 30th STOC. ACM, 1998. Available at [39] as TR97-047.
-
(1998)
Proc. of 30th STOC
-
-
Ajtai, M.1
-
5
-
-
0030679849
-
A public-key cryptosystem with worst-case/average-case equivalence
-
ACM, Available at [39] at TR96-065
-
M. Ajtai and C. Dwork. A public-key cryptosystem with worst-case/average-case equivalence. In Proc.of29th STOC, pages 284-293. ACM, 1997. Available at [39] at TR96-065.
-
(1997)
Proc.of29th STOC
, pp. 284-293
-
-
Ajtai, M.1
Dwork, C.2
-
6
-
-
0031119485
-
The hardness of approximate optima in lattices, codes, and systems of linear equations
-
S. Arora, L. Babai, J. Stern, and Z. Sweedyk. The hardness of approximate optima in lattices, codes, and systems of linear equations. Journal of Computer and System Sciences, 54(2): 317-331, 1997.
-
(1997)
Journal of Computer and System Sciences
, vol.54
, Issue.2
, pp. 317-331
-
-
Arora, S.1
Babai, L.2
Stern, J.3
Sweedyk, Z.4
-
7
-
-
51249173801
-
On Lovász lattice reduction and the nearest lattice point problem
-
L. Babai. On Lovász lattice reduction and the nearest lattice point problem. Combinatorica, 6: 1-13, 1986.
-
(1986)
Combinatorica
, vol.6
, pp. 1-13
-
-
Babai, L.1
-
8
-
-
85042939576
-
"Pseudo-random" number generation within cryptographic algorithms: The DSS case
-
volume 1294 of LNCS. IACR, Springer-Verlag
-
M. Bellare, S. Goldwasser, and D. Micciancio. "Pseudo-random" number generation within cryptographic algorithms: The DSS case. In Proc. of Crypto '97, volume 1294 of LNCS. IACR, Springer-Verlag, 1997.
-
(1997)
Proc. of Crypto '97
-
-
Bellare, M.1
Goldwasser, S.2
Micciancio, D.3
-
9
-
-
21744448309
-
On the security of the KMOV public key cryptosystem
-
volume 1294 of LNCS, IACR, Springer-Verlag
-
D. Bleichenbacher. On the security of the KMOV public key cryptosystem. In Proc. of Crypto’97, volume 1294 of LNCS. IACR, Springer-Verlag, 1997.
-
(1997)
Proc. of Crypto’97
-
-
Bleichenbacher, D.1
-
10
-
-
0002796489
-
Noisy polynomial interpolation and noisy Chinese remaindering
-
LNCS. IACR, Springer-Verlag
-
D. Bleichenbacher and P. Q. Nguyen. Noisy polynomial interpolation and noisy Chinese remaindering. In Proc. of Eurocrypt’2000, LNCS. IACR, Springer-Verlag, 2000.
-
(2000)
Proc. of Eurocrypt’2000
-
-
Bleichenbacher, D.1
Nguyen, P.Q.2
-
11
-
-
0032653013
-
On the complexity of computing short linearly independent vectors and short bases in a lattice
-
ACM
-
J. Blömer and J.-P. Seifert. On the complexity of computing short linearly independent vectors and short bases in a lattice. In Proc. of 31st STOC. ACM, 1999.
-
(1999)
Proc. of 31st STOC
-
-
Blömer, J.1
Seifert, J.-P.2
-
12
-
-
0002970951
-
The decision Di e-Hellman problem
-
volume 1423 of LNCS. Springer-Verlag
-
D. Boneh. The decision Di e-Hellman problem. In Algorithmic Number Theory Proc. of ANTS-III, volume 1423 of LNCS. Springer-Verlag, 1998.
-
(1998)
Algorithmic Number Theory Proc. of ANTS-III
-
-
Boneh, D.1
-
13
-
-
0000552770
-
Twenty years of attacks on the RSA cryptosystem
-
D. Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS, 46(2): 203-213, 1999.
-
(1999)
Notices of the AMS
, vol.46
, Issue.2
, pp. 203-213
-
-
Boneh, D.1
-
14
-
-
0033706605
-
Finding smooth integers in short intervals using CRT decoding
-
ACM
-
D. Boneh. Finding smooth integers in short intervals using CRT decoding. In Proc. of 32nd STOC. ACM, 2000.
-
(2000)
Proc. of 32nd STOC
-
-
Boneh, D.1
-
15
-
-
84957672468
-
0.292
-
volume 1592 of LNCS, IACR, Springer-Verlag
-
0.292. In Proc. of Eurocrypt '99, volume 1592 of LNCS, pages 1-11, IACR, Springer-Verlag, 1999.
-
(1999)
Proc. of Eurocrypt '99
, pp. 1-11
-
-
Boneh, D.1
Durfee, G.2
-
16
-
-
84947735905
-
An attack on RSA given a small fraction of the private key bits
-
volume 1514 of LNCS, Springer-Verlag
-
D. Boneh, G. Durfee, and Y. Frankel. An attack on RSA given a small fraction of the private key bits. In Proc. of Asiacrypt '98, volume 1514 of LNCS, pages 25-34, Springer-Verlag, 1998.
-
(1998)
Proc. of Asiacrypt '98
, pp. 25-34
-
-
Boneh, D.1
Durfee, G.2
Frankel, Y.3
-
18
-
-
0008878919
-
Hardness of computing the most significant bits of secret keys in di e-hellman and related schemes
-
LNCS. IACR, Springer-Verlag
-
D. Boneh and R. Venkatesan. Hardness of computing the most significant bits of secret keys in di e-hellman and related schemes. In Proc. of Crypto’96, LNCS. IACR, Springer-Verlag, 1996.
-
(1996)
Proc. of Crypto’96
-
-
Boneh, D.1
Venkatesan, R.2
-
19
-
-
11344291487
-
Breaking RSA may not be equivalent to factoring
-
volume 1233 of LNCS, IACR, Springer-Verlag
-
D. Boneh and R. Venkatesan. Breaking RSA may not be equivalent to factoring. In Proc. of Eurocrypt '98, volume 1233 of LNCS. IACR, Springer-Verlag, 1998.
-
(1998)
Proc. of Eurocrypt '98
-
-
Boneh, D.1
Venkatesan, R.2
-
20
-
-
84957610823
-
Speeding up discrete log and factoring based schemes via precomputations
-
volume 1403 of LNCS, IACR, Springer-Verlag
-
V. Boyko, M. Peinado, and R. Venkatesan. Speeding up discrete log and factoring based schemes via precomputations. In Proc. of Eurocrypt '98, volume 1403 of LNCS, pages 221-235, IACR, Springer-Verlag, 1998.
-
(1998)
Proc. of Eurocrypt '98
, pp. 221-235
-
-
Boyko, V.1
Peinado, M.2
Venkatesan, R.3
-
21
-
-
33746796635
-
Solving low density knapsacks
-
Plenum Press
-
E. F. Brickell. Solving low density knapsacks. In Proc. of Crypto '83. Plenum Press, 1984.
-
(1984)
Proc. of Crypto '83
-
-
Brickell, E.F.1
-
22
-
-
0004393344
-
Breaking iterated knapsacks
-
volume 196 of LNCS, Springer-Verlag
-
E. F. Brickell. Breaking iterated knapsacks. In Proc. of Crypto '84, volume 196 of LNCS. Springer-Verlag, 1985.
-
(1985)
Proc. of Crypto '84
-
-
Brickell, E.F.1
-
23
-
-
0042470638
-
Cryptanalysis: A survey of recent results
-
IEEE Press
-
E. F. Brickell and A. M. Odlyzko. Cryptanalysis: A survey of recent results. In Contemporary Cryptology, pages 501-540, IEEE Press, 1991.
-
(1991)
Contemporary Cryptology
, pp. 501-540
-
-
Brickell, E.F.1
Odlyzko, A.M.2
-
24
-
-
84946876978
-
Some recent progress on the complexity of lattice problems
-
Available at [39] as TR99-006
-
J.-Y. Cai. Some recent progress on the complexity of lattice problems. In Proc. of FCRC, 1999. Available at [39] as TR99-006.
-
(1999)
Proc. of FCRC
-
-
Cai, J.-Y.1
-
25
-
-
84946876979
-
The complexity of some lattice problems
-
LNCS. Springer-Verlag, In these proceedings
-
J.-Y. Cai. The complexity of some lattice problems. In Proc. of ANTS-IV, LNCS. Springer-Verlag, 2000. In these proceedings.
-
(2000)
Proc. of ANTS-IV
-
-
Cai, J.-Y.1
-
27
-
-
0031377422
-
An improved worst-case to average-case connection for lattice problems
-
IEEE
-
J.-Y. Cai and A. P. Nerurkar. An improved worst-case to average-case connection for lattice problems. In Proc.of38th FOCS, pages 468-477, IEEE, 1997.
-
(1997)
Proc.of38th FOCS
, pp. 468-477
-
-
Cai, J.-Y.1
Nerurkar, A.P.2
-
28
-
-
84946876980
-
Factorization of 512-bit RSA key using the number field sieve
-
LNCS. IACR, Springer-Verlag, 2000. Factorization announced in August
-
S. Cavallar, B. Dodson, A. K. Lenstra, W. Lioen, P. L. Montgomery, B. Murphy, H. te Riele, K. Aardal, J. Gilchrist, G. Guillerm, P. Leyland, J. Marchand, F. Morain, A. Muett, C. Putnam, C. Putnam, and P. Zimmermann. Factorization of 512-bit RSA key using the number field sieve. In Proc. of Eurocrypt’2000, LNCS. IACR, Springer-Verlag, 2000. Factorization announced in August, 1999.
-
(1999)
Proc. of Eurocrypt’2000
-
-
Cavallar, S.1
Dodson, B.2
Lenstra, A.K.3
Lioen, W.4
Montgomery, P.L.5
Murphy, B.6
te Riele, H.7
Aardal, K.8
Gilchrist, J.9
Guillerm, G.10
Leyland, P.11
Marchand, J.12
Morain, F.13
Muett, A.14
Putnam, C.15
Putnam, C.16
Zimmermann, P.17
-
29
-
-
0024079003
-
A knapsack-type public key cryptosystem based on arithmetic in finite fields
-
B. Chor and R.L. Rivest. A knapsack-type public key cryptosystem based on arithmetic in finite fields. IEEE Trans. Inform. Theory, 34, 1988.
-
(1988)
IEEE Trans. Inform. Theory
, vol.34
-
-
Chor, B.1
Rivest, R.L.2
-
32
-
-
0001494997
-
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
-
Revised version of two articles of Eurocrypt '96
-
D. Coppersmith. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. of Cryptology, 10(4): 233-260, 1997. Revised version of two articles of Eurocrypt '96.
-
(1997)
J. of Cryptology
, vol.10
, Issue.4
, pp. 233-260
-
-
Coppersmith, D.1
-
34
-
-
0000951613
-
Improved low-density subset sum algorithms
-
M.J. Coster, A. Joux, B.A. LaMacchia, A.M. Odlyzko, C.-P. Schnorr, and J. Stern. Improved low-density subset sum algorithms. Comput. Complexity, 2: 111-128, 1992.
-
(1992)
Comput. Complexity
, vol.2
, pp. 111-128
-
-
Coster, M.J.1
Joux, A.2
LaMacchia, B.A.3
Odlyzko, A.M.4
Schnorr, C.-P.5
Stern, J.6
-
35
-
-
35248827367
-
The effectiveness of lattice attacks against low-exponent RSA
-
volume 1431 of LNCS, Springer-Verlag
-
C. Coupé, P. Nguyen, and J. Stern. The effectiveness of lattice attacks against low-exponent RSA. In Proc. of PKC’99, volume 1431 of LNCS. Springer-Verlag, 1999.
-
(1999)
Proc. of PKC’99
-
-
Coupé, C.1
Nguyen, P.2
Stern, J.3
-
36
-
-
0017018484
-
New directions in cryptography
-
Nov
-
W. Die and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22: 644-654, Nov 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 644-654
-
-
Die, W.1
Hellman, M.E.2
-
38
-
-
0032306712
-
Approximating CVP to within almost-polynomial factors is NP-hard
-
IEEE, Available at [39] at TR98-048
-
I. Dinur, G. Kindler, and S. Safra. Approximating CVP to within almost-polynomial factors is NP-hard. In Proc. of 39th FOCS, pages 99-109. IEEE, 1998. Available at [39] at TR98-048.
-
(1998)
Proc. of 39th FOCS
, pp. 99-109
-
-
Dinur, I.1
Kindler, G.2
Safra, S.3
-
41
-
-
84961378797
-
Tensor-based trapdoors for CVP and their application to public key cryptography
-
volume 1746 of LNCS, Springer-Verlag
-
R. Fischlin and J.-P. Seifert. Tensor-based trapdoors for CVP and their application to public key cryptography. In Cryptography and Coding, volume 1746 of LNCS, pages 244-257, Springer-Verlag, 1999.
-
(1999)
Cryptography and Coding
, pp. 244-257
-
-
Fischlin, R.1
Seifert, J.-P.2
-
42
-
-
0008203229
-
On the lagarias-odlyzko algorithm for the subset sum problem
-
A. M. Frieze. On the lagarias-odlyzko algorithm for the subset sum problem. SIAM J. Comput, 15(2): 536-539, 1986.
-
(1986)
SIAM J. Comput
, vol.15
, Issue.2
, pp. 536-539
-
-
Frieze, A.M.1
-
43
-
-
0024682725
-
Succinct certificates for almost all subset sum problems
-
M. L. Furst and R. Kannan. Succinct certificates for almost all subset sum problems. SIAM J. Comput, 18(3): 550-558, 1989.
-
(1989)
SIAM J. Comput
, vol.18
, Issue.3
, pp. 550-558
-
-
Furst, M.L.1
Kannan, R.2
-
45
-
-
84946876982
-
Cryptanalysis of countermeasures proposed for repairing ISO 9796-1
-
LNCS. IACR, Springer-Verlag
-
M. Girault and J.-F. Misarsky. Cryptanalysis of countermeasures proposed for repairing ISO 9796-1. In Proc. of Eurocrypt’2000, LNCS. IACR, Springer-Verlag, 2000.
-
(2000)
Proc. of Eurocrypt’2000
-
-
Girault, M.1
Misarsky, J.-F.2
-
46
-
-
0003268150
-
On the limits of non-approximability of lattice problems
-
ACM, Available at [39] as TR97-031
-
O. Goldreich and S. Goldwasser. On the limits of non-approximability of lattice problems. In Proc.of30th STOC. ACM, 1998. Available at [39] as TR97-031.
-
(1998)
Proc.of30th STOC
-
-
Goldreich, O.1
Goldwasser, S.2
-
47
-
-
84946876983
-
-
Challenges for the GGH cryptosystem
-
O. Goldreich, S. Goldwasser, and S. Halevi. Challenges for the GGH cryptosystem. Available at http://theory.lcs.mit.edu/~shaih/challenge.html.
-
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
48
-
-
84958598719
-
Eliminating decryption errors in the Ajtai-Dwork cryptosystem
-
volume 1294 of LNCS, IACR, Springer-Verlag, Available at [39] as TR97-018
-
O. Goldreich, S. Goldwasser, and S. Halevi. Eliminating decryption errors in the Ajtai-Dwork cryptosystem. In Proc. of Crypto’97, volume 1294 of LNCS, pages 105-111. IACR, Springer-Verlag, 1997. Available at [39] as TR97-018.
-
(1997)
Proc. of Crypto’97
, pp. 105-111
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
49
-
-
84958655849
-
Public-key cryptosystems from lattice reduction problems
-
volume 1294 of LNCS, IACR, Springer-Verlag, Available at [39] as TR96-056
-
O. Goldreich, S. Goldwasser, and S. Halevi. Public-key cryptosystems from lattice reduction problems. In Proc. of Crypto '97, volume 1294 of LNCS, pages 112-131. IACR, Springer-Verlag, 1997. Available at [39] as TR96-056.
-
(1997)
Proc. of Crypto '97
, pp. 112-131
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
51
-
-
84946876984
-
On the security of Di e-Hellman bits
-
K.-Y. Lam, I. E. Shparlinski, H. Wang, and C. Xing, editors, Birkhauser
-
M. I. González Vasco and I. E. Shparlinski. On the security of Di e-Hellman bits. In K.-Y. Lam, I. E. Shparlinski, H. Wang, and C. Xing, editors, Proc. Workshop on Cryptography and Comp. Number Theory (CCNT’99). Birkhauser, 2000.
-
(2000)
Proc. Workshop on Cryptography and Comp. Number Theory (CCNT’99)
-
-
González Vasco, M.I.1
Shparlinski, I.E.2
-
54
-
-
0023985175
-
Solving simultaneous modular equations of low degree
-
April, Early version in Proc. of Crypto '85
-
J. Håstad. Solving simultaneous modular equations of low degree. SIAM J. Comput., 17(2): 336-341, April 1988. Early version in Proc. of Crypto '85.
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 336-341
-
-
Håstad, J.1
-
55
-
-
24944510964
-
Extraits de lettres de M. Hermite à M. Jacobi sur di érents objets de la théorie des nombres, deuxième lettre
-
Also in the first volume of Hermite’s complete works (Gauthier-Villars)
-
C. Hermite. Extraits de lettres de M. Hermite à M. Jacobi sur di érents objets de la théorie des nombres, deuxième lettre. J. Reine Angew. Math., 40: 279-290, 1850. Also in the first volume of Hermite’s complete works (Gauthier-Villars).
-
(1850)
J. Reine Angew. Math
, vol.40
, pp. 279-290
-
-
Hermite, C.1
-
56
-
-
84947808606
-
NTRU: A ring based public key cryptosystem
-
volume 1423 of LNCS, Springer-Verlag
-
J. Hoffstein, J. Pipher, and J.H. Silverman. NTRU: a ring based public key cryptosystem. In Proc. of ANTS III, volume 1423 of LNCS, pages 267-288. Springer-Verlag, 1998. Additional information at http://www.ntru.com.
-
(1998)
Proc. of ANTS III
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.H.3
-
57
-
-
84949226531
-
Finding small roots of univariate modular equations revisited
-
volume 1355 of LNCS, Springer-Verlag
-
N. A. Howgrave-Graham. Finding small roots of univariate modular equations revisited. In Cryptography and Coding, volume 1355 of LNCS, pages 131-142, Springer-Verlag, 1997.
-
(1997)
Cryptography and Coding
, pp. 131-142
-
-
Howgrave-Graham, N.A.1
-
61
-
-
0001134554
-
Lattice reduction: A toolbox for the cryptanalyst
-
A. Joux and J. Stern. Lattice reduction: A toolbox for the cryptanalyst. J. of Cryptology, 11: 161-185, 1998.
-
(1998)
J. of Cryptology
, vol.11
, pp. 161-185
-
-
Joux, A.1
Stern, J.2
-
62
-
-
84957627960
-
On finding small solutions of modular multivariate polynomial equations
-
volume 1403 of LNCS, IACR, Springer-Verlag
-
C. S. Jutla. On finding small solutions of modular multivariate polynomial equations. In Proc. of Eurocrypt '98, volume 1403 of LNCS, pages 158-170, IACR, Springer-Verlag, 1998.
-
(1998)
Proc. of Eurocrypt '98
, pp. 158-170
-
-
Jutla, C.S.1
-
63
-
-
0020936543
-
Improved algorithms for integer programming and related lattice problems
-
ACM
-
R. Kannan. Improved algorithms for integer programming and related lattice problems. In Proc.of15th STOC, pages 193-206, ACM, 1983.
-
(1983)
Proc.of15th STOC
, pp. 193-206
-
-
Kannan, R.1
-
65
-
-
0000126406
-
Minkowski’s convex body theorem and integer programming
-
R. Kannan. Minkowski’s convex body theorem and integer programming. Math. Oper. Res., 12(3): 415-440, 1987.
-
(1987)
Math. Oper. Res
, vol.12
, Issue.3
, pp. 415-440
-
-
Kannan, R.1
-
66
-
-
0033896372
-
Finding the closest lattice vector when it’s unusually close
-
ACM-SIAM
-
P. Klein. Finding the closest lattice vector when it’s unusually close. In Proc. of SODA '2000. ACM-SIAM, 2000.
-
(2000)
Proc. of SODA '2000
-
-
Klein, P.1
-
67
-
-
0003262982
-
Surles formes quadratiques positives ternaires
-
A. Korkine and G. Zolotare. Surles formes quadratiques positives ternaires. Math. Ann., 5: 581-583, 1872.
-
(1872)
Math. Ann
, vol.5
, pp. 581-583
-
-
Korkine, A.1
Zolotare, G.2
-
68
-
-
0000836432
-
Surles formes quadratiques
-
A. Korkine and G. Zolotare. Surles formes quadratiques. Math. Ann., 6: 336-389, 1873.
-
(1873)
Math. Ann
, vol.6
, pp. 336-389
-
-
Korkine, A.1
Zolotare, G.2
-
69
-
-
0039254648
-
Point lattices
-
R. Graham, M. Grötschel, and L. Lovász, editors, volume 1, chapter 19. Elsevier
-
J. C. Lagarias. Point lattices. In R. Graham, M. Grötschel, and L. Lovász, editors, Handbook of Combinatorics, volume 1, chapter 19. Elsevier, 1995.
-
(1995)
Handbook of Combinatorics
-
-
Lagarias, J.C.1
-
73
-
-
34250244723
-
Factoring polynomials with rational coefficients
-
A. K. Lenstra, H. W. Lenstra, Jr., and L. Lovász. Factoring polynomials with rational coefficients. Mathematische Ann., 261: 513-534, 1982.
-
(1982)
Mathematische Ann
, vol.261
, pp. 513-534
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Lovász, L.3
-
74
-
-
0020845921
-
Integer programming with a fixed number of variables
-
H. W. Lenstra, Jr. Integer programming with a fixed number of variables. Math. Oper. Res., 8(4): 538-548, 1983.
-
(1983)
Math. Oper. Res
, vol.8
, Issue.4
, pp. 538-548
-
-
Lenstra, H.W.1
-
77
-
-
0005018185
-
Lattice points in high-dimensional spheres
-
J. E. Mazo and A. M. Odlyzko. Lattice points in high-dimensional spheres. Monatsh. Math., 110: 47-61, 1990.
-
(1990)
Monatsh. Math
, vol.110
, pp. 47-61
-
-
Mazo, J.E.1
Odlyzko, A.M.2
-
80
-
-
0018019325
-
Hiding information and signatures in trapdoor knapsacks
-
September
-
R. Merkle and M. Hellman. Hiding information and signatures in trapdoor knapsacks. IEEE Trans. Inform. Theory, IT-24: 525-530, September 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.IT-24
, pp. 525-530
-
-
Merkle, R.1
Hellman, M.2
-
82
-
-
0002823619
-
The shortest vector problem is NP-hard to approximate within some constant
-
IEEE, Available at [39] at TR98-016
-
D. Micciancio. The shortest vector problem is NP-hard to approximate within some constant. In Proc. of 39th FOCS. IEEE, 1998. Available at [39] at TR98-016.
-
(1998)
Proc. of 39th FOCS
-
-
Micciancio, D.1
-
86
-
-
21744441311
-
A multiplicative attack using LLL algorithm on RSA signatures with redundancy
-
volume 1294 of LNCS, IACR, Springer-Verlag
-
J.-F. Misarsky. A multiplicative attack using LLL algorithm on RSA signatures with redundancy. In Proc. of Crypto '97, volume 1294 of LNCS, pages 221-234, IACR, Springer-Verlag, 1997.
-
(1997)
Proc. of Crypto '97
, pp. 221-234
-
-
Misarsky, J.-F.1
-
87
-
-
0011469175
-
Square roots of products of algebraic numbers
-
Walter Gautschi, editor, Proc. of Symposia in Applied Mathematics, American Mathematical Society
-
P. L. Montgomery. Square roots of products of algebraic numbers. In Walter Gautschi, editor, Mathematics of Computation 1943-1993: a Half-Century of Computational Mathematics, Proc. of Symposia in Applied Mathematics, pages 567-571, American Mathematical Society, 1994.
-
(1994)
Mathematics of Computation 1943-1993: a Half-Century of Computational Mathematics
, pp. 567-571
-
-
Montgomery, P.L.1
-
89
-
-
84946876987
-
A Montgomery-like square root for the number field sieve
-
volume 1423 of LNCS, Springer-Verlag
-
P. Nguyen. A Montgomery-like square root for the number field sieve. In Proc. of ANTS-III, volume 1423 of LNCS. Springer-Verlag, 1998.
-
(1998)
Proc. of ANTS-III
-
-
Nguyen, P.1
-
90
-
-
84957089305
-
Cryptanalysis of the Goldreich-Goldwasser-Halevi cryptosystem from Crypto '97
-
volume 1666 of LNCS, IACR, Springer-Verlag
-
P. Nguyen. Cryptanalysis of the Goldreich-Goldwasser-Halevi cryptosystem from Crypto '97. In Proc. of Crypto’99, volume 1666 of LNCS, pages 288-304, IACR, Springer-Verlag, 1999.
-
(1999)
Proc. of Crypto’99
, pp. 288-304
-
-
Nguyen, P.1
-
91
-
-
84958613113
-
Merkle-Hellman revisited: A cryptanalysis of the QuVanstone cryptosystem based on group factorizations
-
volume 1294 of LNCS, IACR, Springer-Verlag
-
P. Nguyen and J. Stern. Merkle-Hellman revisited: a cryptanalysis of the QuVanstone cryptosystem based on group factorizations. In Proc. of Crypto '97, volume 1294 of LNCS, pages 198-212, IACR, Springer-Verlag, 1997.
-
(1997)
Proc. of Crypto '97
, pp. 198-212
-
-
Nguyen, P.1
Stern, J.2
-
92
-
-
33845601797
-
Cryptanalysis of a fast public key cryptosystem presented at SAC '97
-
volume 1556 of LNCS, Springer-Verlag
-
P. Nguyen and J. Stern. Cryptanalysis of a fast public key cryptosystem presented at SAC '97. In Selected Areas in Cryptography - Proc. of SAC '98, volume 1556 of LNCS. Springer-Verlag, 1998.
-
(1998)
Selected Areas in Cryptography - Proc. of SAC '98
-
-
Nguyen, P.1
Stern, J.2
-
93
-
-
84957660976
-
Cryptanalysis of the Ajtai-Dwork cryptosystem
-
volume 1462 of LNCS, IACR, Springer-Verlag
-
P. Nguyen and J. Stern. Cryptanalysis of the Ajtai-Dwork cryptosystem. In Proc. of Crypto '98, volume 1462 of LNCS, pages 223-242, IACR, Springer-Verlag, 1998.
-
(1998)
Proc. of Crypto '98
, pp. 223-242
-
-
Nguyen, P.1
Stern, J.2
-
94
-
-
84947806031
-
The Béguin-Quisquater server-aided RSA protocol from Crypto '95 is not secure
-
volume 1514 of LNCS, Springer-Verlag
-
P. Nguyen and J. Stern. The Béguin-Quisquater server-aided RSA protocol from Crypto '95 is not secure. In Proc. of Asiacrypt '98, volume 1514 of LNCS, pages 372-379, Springer-Verlag, 1998.
-
(1998)
Proc. of Asiacrypt '98
, pp. 372-379
-
-
Nguyen, P.1
Stern, J.2
-
95
-
-
84957072857
-
The hardness of the hidden subset sum problem and its cryptographic implications
-
volume 1666 of LNCS, IACR, Springer-Verlag
-
P. Nguyen and J. Stern. The hardness of the hidden subset sum problem and its cryptographic implications. In Proc. of Crypto '99, volume 1666 of LNCS, pages 31-46, IACR, Springer-Verlag, 1999.
-
(1999)
Proc. of Crypto '99
, pp. 31-46
-
-
Nguyen, P.1
Stern, J.2
-
98
-
-
0141898671
-
The dark side of the hidden number problem: Lattice attacks on DSA
-
K.-Y. Lam, I. E. Shparlinski, H. Wang, and C. Xing, editors, Birkhauser
-
P. Q. Nguyen. The dark side of the hidden number problem: Lattice attacks on DSA. In K.-Y. Lam, I. E. Shparlinski, H. Wang, and C. Xing, editors, Proc. Workshop on Cryptography and Comp. Number Theory (CCNT’99). Birkhauser, 2000.
-
(2000)
Proc. Workshop on Cryptography and Comp. Number Theory (CCNT’99)
-
-
Nguyen, P.Q.1
-
99
-
-
0002114928
-
The rise and fall of knapsack cryptosystems
-
volume 42 of Proc. of Symposia in Applied Mathematics, A.M.S
-
A. M. Odlyzko. The rise and fall of knapsack cryptosystems. In Cryptology and Computational Number Theory, volume 42 of Proc. of Symposia in Applied Mathematics, pages 75-88. A.M.S., 1990.
-
(1990)
Cryptology and Computational Number Theory
, pp. 75-88
-
-
Odlyzko, A.M.1
-
100
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Comm. of the ACM, 21(2): 120-126, 1978.
-
(1978)
Comm. of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
101
-
-
0023532388
-
A hierarchy of polynomial lattice basis reduction algorithms
-
C. P. Schnorr. A hierarchy of polynomial lattice basis reduction algorithms. Theoretical Computer Science, 53: 201-224, 1987.
-
(1987)
Theoretical Computer Science
, vol.53
, pp. 201-224
-
-
Schnorr, C.P.1
-
102
-
-
38249029857
-
A more efficient algorithm for lattice basis reduction
-
C. P. Schnorr. A more efficient algorithm for lattice basis reduction. J. of algorithms, 9(1): 47-62, 1988.
-
(1988)
J. of algorithms
, vol.9
, Issue.1
, pp. 47-62
-
-
Schnorr, C.P.1
-
103
-
-
0008242214
-
Factoring integers and computing discrete logarithms via diophantine approximation
-
volume 547 of LNCS, IACR, Springer-Verlag
-
C. P. Schnorr. Factoring integers and computing discrete logarithms via diophantine approximation. In Proc. of Eurocrypt '91, volume 547 of LNCS, pages 171-181. IACR, Springer-Verlag, 1991.
-
(1991)
Proc. of Eurocrypt '91
, pp. 171-181
-
-
Schnorr, C.P.1
-
104
-
-
33846200465
-
Lattice basis reduction: Improved practical algorithms and solving subset sum problems
-
C. P. Schnorr and M. Euchner. Lattice basis reduction: improved practical algorithms and solving subset sum problems. Math. Programming, 66: 181-199, 1994.
-
(1994)
Math. Programming
, vol.66
, pp. 181-199
-
-
Schnorr, C.P.1
Euchner, M.2
-
105
-
-
0009452048
-
Attacking the Chor-Rivest cryptosystem by improved lattice reduction
-
volume 921 of LNCS, IACR, Springer-Verlag
-
C. P. Schnorr and H. H. Hörner. Attacking the Chor-Rivest cryptosystem by improved lattice reduction. In Proc. of Eurocrypt '95, volume 921 of LNCS, pages 1-12. IACR, Springer-Verlag, 1995.
-
(1995)
Proc. of Eurocrypt '95
, pp. 1-12
-
-
Schnorr, C.P.1
Hörner, H.H.2
-
106
-
-
0020250504
-
A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem
-
IEEE
-
A. Shamir. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem. In Proc.of23rd FOCS, pages 145-152. IEEE, 1982.
-
(1982)
Proc.of23rd FOCS
, pp. 145-152
-
-
Shamir, A.1
-
107
-
-
84946876991
-
-
Number Theory C++ Library (NTL) version 3.9
-
V. Shoup. Number Theory C++ Library (NTL) version 3.9. Available at http://www.shoup.net/ntl/.
-
-
-
Shoup, V.1
-
109
-
-
4244009888
-
La réduction des réseaux: Autour de l’algorithme de Lenstra, Lenstra, Lovász
-
English translation in CWI Quaterly, 3(2): 95-120, 1990
-
B. Vallée. La réduction des réseaux: autour de l’algorithme de Lenstra, Lenstra, Lovász. RAIRO Inform. Th eor. Appl., 23(3): 345-376, 1989. English translation in CWI Quaterly, 3(2): 95-120, 1990.
-
(1989)
RAIRO Inform. Th eor. Appl
, vol.23
, Issue.3
, pp. 345-376
-
-
Vallée, B.1
-
110
-
-
0010250382
-
How to guess l-th roots modulo n by reducing lattice bases
-
volume 357 of LNCS, Springer-Verlag
-
B. Vallée, M. Girault, and P. Ton. How to guess l-th roots modulo n by reducing lattice bases. In Proc. of AAEEC-6, volume 357 of LNCS, pages 427-442. Springer-Verlag, 1988.
-
(1988)
Proc. of AAEEC-6
, pp. 427-442
-
-
Vallée, B.1
Girault, M.2
Ton, P.3
-
111
-
-
0029272081
-
Short RSA keys and their generation
-
S. A. Vanstone and R. J. Zuccherato. Short RSA keys and their generation. J. of Cryptology, 8(2): 101-114, 1995.
-
(1995)
J. of Cryptology
, vol.8
, Issue.2
, pp. 101-114
-
-
Vanstone, S.A.1
Zuccherato, R.J.2
-
112
-
-
84946876992
-
Cryptanalysis of the Chor-Rivest cryptosystem
-
volume 1462 of LNCS, Springer-Verlag, Appeared first at the "rump session" of Crypto '97
-
S. Vaudenay. Cryptanalysis of the Chor-Rivest cryptosystem. In Proc. of Crypto '98, volume 1462 of LNCS. Springer-Verlag, 1998. Appeared first at the "rump session" of Crypto '97.
-
(1998)
Proc. of Crypto '98
-
-
Vaudenay, S.1
-
113
-
-
1642282076
-
Certificates of recoverability with scalable recovery agent security
-
LNCS. Springer-Verlag
-
E. R. Verheul. Certificates of recoverability with scalable recovery agent security. In Proc. of PKC '2000, LNCS. Springer-Verlag, 2000.
-
(2000)
Proc. of PKC '2000
-
-
Verheul, E.R.1
-
114
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents
-
Theory
-
M. Wiener. Cryptanalysis of short RSA secret exponents. IEEE Trans. Inform. Theory, 36(3): 553-558, 1990.
-
(1990)
IEEE Trans. Inform
, vol.36
, Issue.3
, pp. 553-558
-
-
Wiener, M.1
|