메뉴 건너뛰기




Volumn 1838, Issue , 2000, Pages 85-112

Lattice reduction in cryptology: An update

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NUMBER THEORY;

EID: 33846870481     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/10722028_4     Document Type: Conference Paper
Times cited : (76)

References (114)
  • 1
    • 0020909064 scopus 로고
    • On breaking generalized knapsack publick key cryptosystems
    • ACM
    • L. M. Adleman. On breaking generalized knapsack publick key cryptosystems. In Proc.of15th STOC, pages 402-412, ACM, 1983.
    • (1983) Proc.of15th STOC , pp. 402-412
    • Adleman, L.M.1
  • 3
    • 0029719917 scopus 로고    scopus 로고
    • Generating hard instances of lattice problems
    • ACM, Available at [39] at TR96-007
    • M. Ajtai. Generating hard instances of lattice problems. In Proc. of 28th STOC, pages 99-108. ACM, 1996. Available at [39] at TR96-007.
    • (1996) Proc. of 28th STOC , pp. 99-108
    • Ajtai, M.1
  • 4
    • 0031644084 scopus 로고    scopus 로고
    • 2 is NP-hard for randomized reductions
    • ACM, Available at [39] as TR97-047
    • 2 is NP-hard for randomized reductions. In Proc. of 30th STOC. ACM, 1998. Available at [39] as TR97-047.
    • (1998) Proc. of 30th STOC
    • Ajtai, M.1
  • 5
    • 0030679849 scopus 로고    scopus 로고
    • A public-key cryptosystem with worst-case/average-case equivalence
    • ACM, Available at [39] at TR96-065
    • M. Ajtai and C. Dwork. A public-key cryptosystem with worst-case/average-case equivalence. In Proc.of29th STOC, pages 284-293. ACM, 1997. Available at [39] at TR96-065.
    • (1997) Proc.of29th STOC , pp. 284-293
    • Ajtai, M.1    Dwork, C.2
  • 6
    • 0031119485 scopus 로고    scopus 로고
    • The hardness of approximate optima in lattices, codes, and systems of linear equations
    • S. Arora, L. Babai, J. Stern, and Z. Sweedyk. The hardness of approximate optima in lattices, codes, and systems of linear equations. Journal of Computer and System Sciences, 54(2): 317-331, 1997.
    • (1997) Journal of Computer and System Sciences , vol.54 , Issue.2 , pp. 317-331
    • Arora, S.1    Babai, L.2    Stern, J.3    Sweedyk, Z.4
  • 7
    • 51249173801 scopus 로고
    • On Lovász lattice reduction and the nearest lattice point problem
    • L. Babai. On Lovász lattice reduction and the nearest lattice point problem. Combinatorica, 6: 1-13, 1986.
    • (1986) Combinatorica , vol.6 , pp. 1-13
    • Babai, L.1
  • 8
    • 85042939576 scopus 로고    scopus 로고
    • "Pseudo-random" number generation within cryptographic algorithms: The DSS case
    • volume 1294 of LNCS. IACR, Springer-Verlag
    • M. Bellare, S. Goldwasser, and D. Micciancio. "Pseudo-random" number generation within cryptographic algorithms: The DSS case. In Proc. of Crypto '97, volume 1294 of LNCS. IACR, Springer-Verlag, 1997.
    • (1997) Proc. of Crypto '97
    • Bellare, M.1    Goldwasser, S.2    Micciancio, D.3
  • 9
    • 21744448309 scopus 로고    scopus 로고
    • On the security of the KMOV public key cryptosystem
    • volume 1294 of LNCS, IACR, Springer-Verlag
    • D. Bleichenbacher. On the security of the KMOV public key cryptosystem. In Proc. of Crypto’97, volume 1294 of LNCS. IACR, Springer-Verlag, 1997.
    • (1997) Proc. of Crypto’97
    • Bleichenbacher, D.1
  • 10
    • 0002796489 scopus 로고    scopus 로고
    • Noisy polynomial interpolation and noisy Chinese remaindering
    • LNCS. IACR, Springer-Verlag
    • D. Bleichenbacher and P. Q. Nguyen. Noisy polynomial interpolation and noisy Chinese remaindering. In Proc. of Eurocrypt’2000, LNCS. IACR, Springer-Verlag, 2000.
    • (2000) Proc. of Eurocrypt’2000
    • Bleichenbacher, D.1    Nguyen, P.Q.2
  • 11
    • 0032653013 scopus 로고    scopus 로고
    • On the complexity of computing short linearly independent vectors and short bases in a lattice
    • ACM
    • J. Blömer and J.-P. Seifert. On the complexity of computing short linearly independent vectors and short bases in a lattice. In Proc. of 31st STOC. ACM, 1999.
    • (1999) Proc. of 31st STOC
    • Blömer, J.1    Seifert, J.-P.2
  • 12
    • 0002970951 scopus 로고    scopus 로고
    • The decision Di e-Hellman problem
    • volume 1423 of LNCS. Springer-Verlag
    • D. Boneh. The decision Di e-Hellman problem. In Algorithmic Number Theory Proc. of ANTS-III, volume 1423 of LNCS. Springer-Verlag, 1998.
    • (1998) Algorithmic Number Theory Proc. of ANTS-III
    • Boneh, D.1
  • 13
    • 0000552770 scopus 로고    scopus 로고
    • Twenty years of attacks on the RSA cryptosystem
    • D. Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS, 46(2): 203-213, 1999.
    • (1999) Notices of the AMS , vol.46 , Issue.2 , pp. 203-213
    • Boneh, D.1
  • 14
    • 0033706605 scopus 로고    scopus 로고
    • Finding smooth integers in short intervals using CRT decoding
    • ACM
    • D. Boneh. Finding smooth integers in short intervals using CRT decoding. In Proc. of 32nd STOC. ACM, 2000.
    • (2000) Proc. of 32nd STOC
    • Boneh, D.1
  • 15
    • 84957672468 scopus 로고    scopus 로고
    • 0.292
    • volume 1592 of LNCS, IACR, Springer-Verlag
    • 0.292. In Proc. of Eurocrypt '99, volume 1592 of LNCS, pages 1-11, IACR, Springer-Verlag, 1999.
    • (1999) Proc. of Eurocrypt '99 , pp. 1-11
    • Boneh, D.1    Durfee, G.2
  • 16
    • 84947735905 scopus 로고    scopus 로고
    • An attack on RSA given a small fraction of the private key bits
    • volume 1514 of LNCS, Springer-Verlag
    • D. Boneh, G. Durfee, and Y. Frankel. An attack on RSA given a small fraction of the private key bits. In Proc. of Asiacrypt '98, volume 1514 of LNCS, pages 25-34, Springer-Verlag, 1998.
    • (1998) Proc. of Asiacrypt '98 , pp. 25-34
    • Boneh, D.1    Durfee, G.2    Frankel, Y.3
  • 18
    • 0008878919 scopus 로고    scopus 로고
    • Hardness of computing the most significant bits of secret keys in di e-hellman and related schemes
    • LNCS. IACR, Springer-Verlag
    • D. Boneh and R. Venkatesan. Hardness of computing the most significant bits of secret keys in di e-hellman and related schemes. In Proc. of Crypto’96, LNCS. IACR, Springer-Verlag, 1996.
    • (1996) Proc. of Crypto’96
    • Boneh, D.1    Venkatesan, R.2
  • 19
    • 11344291487 scopus 로고    scopus 로고
    • Breaking RSA may not be equivalent to factoring
    • volume 1233 of LNCS, IACR, Springer-Verlag
    • D. Boneh and R. Venkatesan. Breaking RSA may not be equivalent to factoring. In Proc. of Eurocrypt '98, volume 1233 of LNCS. IACR, Springer-Verlag, 1998.
    • (1998) Proc. of Eurocrypt '98
    • Boneh, D.1    Venkatesan, R.2
  • 20
    • 84957610823 scopus 로고    scopus 로고
    • Speeding up discrete log and factoring based schemes via precomputations
    • volume 1403 of LNCS, IACR, Springer-Verlag
    • V. Boyko, M. Peinado, and R. Venkatesan. Speeding up discrete log and factoring based schemes via precomputations. In Proc. of Eurocrypt '98, volume 1403 of LNCS, pages 221-235, IACR, Springer-Verlag, 1998.
    • (1998) Proc. of Eurocrypt '98 , pp. 221-235
    • Boyko, V.1    Peinado, M.2    Venkatesan, R.3
  • 21
    • 33746796635 scopus 로고
    • Solving low density knapsacks
    • Plenum Press
    • E. F. Brickell. Solving low density knapsacks. In Proc. of Crypto '83. Plenum Press, 1984.
    • (1984) Proc. of Crypto '83
    • Brickell, E.F.1
  • 22
    • 0004393344 scopus 로고
    • Breaking iterated knapsacks
    • volume 196 of LNCS, Springer-Verlag
    • E. F. Brickell. Breaking iterated knapsacks. In Proc. of Crypto '84, volume 196 of LNCS. Springer-Verlag, 1985.
    • (1985) Proc. of Crypto '84
    • Brickell, E.F.1
  • 23
    • 0042470638 scopus 로고
    • Cryptanalysis: A survey of recent results
    • IEEE Press
    • E. F. Brickell and A. M. Odlyzko. Cryptanalysis: A survey of recent results. In Contemporary Cryptology, pages 501-540, IEEE Press, 1991.
    • (1991) Contemporary Cryptology , pp. 501-540
    • Brickell, E.F.1    Odlyzko, A.M.2
  • 24
    • 84946876978 scopus 로고    scopus 로고
    • Some recent progress on the complexity of lattice problems
    • Available at [39] as TR99-006
    • J.-Y. Cai. Some recent progress on the complexity of lattice problems. In Proc. of FCRC, 1999. Available at [39] as TR99-006.
    • (1999) Proc. of FCRC
    • Cai, J.-Y.1
  • 25
    • 84946876979 scopus 로고    scopus 로고
    • The complexity of some lattice problems
    • LNCS. Springer-Verlag, In these proceedings
    • J.-Y. Cai. The complexity of some lattice problems. In Proc. of ANTS-IV, LNCS. Springer-Verlag, 2000. In these proceedings.
    • (2000) Proc. of ANTS-IV
    • Cai, J.-Y.1
  • 26
  • 27
    • 0031377422 scopus 로고    scopus 로고
    • An improved worst-case to average-case connection for lattice problems
    • IEEE
    • J.-Y. Cai and A. P. Nerurkar. An improved worst-case to average-case connection for lattice problems. In Proc.of38th FOCS, pages 468-477, IEEE, 1997.
    • (1997) Proc.of38th FOCS , pp. 468-477
    • Cai, J.-Y.1    Nerurkar, A.P.2
  • 29
    • 0024079003 scopus 로고
    • A knapsack-type public key cryptosystem based on arithmetic in finite fields
    • B. Chor and R.L. Rivest. A knapsack-type public key cryptosystem based on arithmetic in finite fields. IEEE Trans. Inform. Theory, 34, 1988.
    • (1988) IEEE Trans. Inform. Theory , vol.34
    • Chor, B.1    Rivest, R.L.2
  • 32
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    • Revised version of two articles of Eurocrypt '96
    • D. Coppersmith. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. of Cryptology, 10(4): 233-260, 1997. Revised version of two articles of Eurocrypt '96.
    • (1997) J. of Cryptology , vol.10 , Issue.4 , pp. 233-260
    • Coppersmith, D.1
  • 35
    • 35248827367 scopus 로고    scopus 로고
    • The effectiveness of lattice attacks against low-exponent RSA
    • volume 1431 of LNCS, Springer-Verlag
    • C. Coupé, P. Nguyen, and J. Stern. The effectiveness of lattice attacks against low-exponent RSA. In Proc. of PKC’99, volume 1431 of LNCS. Springer-Verlag, 1999.
    • (1999) Proc. of PKC’99
    • Coupé, C.1    Nguyen, P.2    Stern, J.3
  • 36
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov
    • W. Die and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22: 644-654, Nov 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , pp. 644-654
    • Die, W.1    Hellman, M.E.2
  • 38
    • 0032306712 scopus 로고    scopus 로고
    • Approximating CVP to within almost-polynomial factors is NP-hard
    • IEEE, Available at [39] at TR98-048
    • I. Dinur, G. Kindler, and S. Safra. Approximating CVP to within almost-polynomial factors is NP-hard. In Proc. of 39th FOCS, pages 99-109. IEEE, 1998. Available at [39] at TR98-048.
    • (1998) Proc. of 39th FOCS , pp. 99-109
    • Dinur, I.1    Kindler, G.2    Safra, S.3
  • 41
    • 84961378797 scopus 로고    scopus 로고
    • Tensor-based trapdoors for CVP and their application to public key cryptography
    • volume 1746 of LNCS, Springer-Verlag
    • R. Fischlin and J.-P. Seifert. Tensor-based trapdoors for CVP and their application to public key cryptography. In Cryptography and Coding, volume 1746 of LNCS, pages 244-257, Springer-Verlag, 1999.
    • (1999) Cryptography and Coding , pp. 244-257
    • Fischlin, R.1    Seifert, J.-P.2
  • 42
    • 0008203229 scopus 로고
    • On the lagarias-odlyzko algorithm for the subset sum problem
    • A. M. Frieze. On the lagarias-odlyzko algorithm for the subset sum problem. SIAM J. Comput, 15(2): 536-539, 1986.
    • (1986) SIAM J. Comput , vol.15 , Issue.2 , pp. 536-539
    • Frieze, A.M.1
  • 43
    • 0024682725 scopus 로고
    • Succinct certificates for almost all subset sum problems
    • M. L. Furst and R. Kannan. Succinct certificates for almost all subset sum problems. SIAM J. Comput, 18(3): 550-558, 1989.
    • (1989) SIAM J. Comput , vol.18 , Issue.3 , pp. 550-558
    • Furst, M.L.1    Kannan, R.2
  • 45
    • 84946876982 scopus 로고    scopus 로고
    • Cryptanalysis of countermeasures proposed for repairing ISO 9796-1
    • LNCS. IACR, Springer-Verlag
    • M. Girault and J.-F. Misarsky. Cryptanalysis of countermeasures proposed for repairing ISO 9796-1. In Proc. of Eurocrypt’2000, LNCS. IACR, Springer-Verlag, 2000.
    • (2000) Proc. of Eurocrypt’2000
    • Girault, M.1    Misarsky, J.-F.2
  • 46
    • 0003268150 scopus 로고    scopus 로고
    • On the limits of non-approximability of lattice problems
    • ACM, Available at [39] as TR97-031
    • O. Goldreich and S. Goldwasser. On the limits of non-approximability of lattice problems. In Proc.of30th STOC. ACM, 1998. Available at [39] as TR97-031.
    • (1998) Proc.of30th STOC
    • Goldreich, O.1    Goldwasser, S.2
  • 47
    • 84946876983 scopus 로고    scopus 로고
    • Challenges for the GGH cryptosystem
    • O. Goldreich, S. Goldwasser, and S. Halevi. Challenges for the GGH cryptosystem. Available at http://theory.lcs.mit.edu/~shaih/challenge.html.
    • Goldreich, O.1    Goldwasser, S.2    Halevi, S.3
  • 48
    • 84958598719 scopus 로고    scopus 로고
    • Eliminating decryption errors in the Ajtai-Dwork cryptosystem
    • volume 1294 of LNCS, IACR, Springer-Verlag, Available at [39] as TR97-018
    • O. Goldreich, S. Goldwasser, and S. Halevi. Eliminating decryption errors in the Ajtai-Dwork cryptosystem. In Proc. of Crypto’97, volume 1294 of LNCS, pages 105-111. IACR, Springer-Verlag, 1997. Available at [39] as TR97-018.
    • (1997) Proc. of Crypto’97 , pp. 105-111
    • Goldreich, O.1    Goldwasser, S.2    Halevi, S.3
  • 49
    • 84958655849 scopus 로고    scopus 로고
    • Public-key cryptosystems from lattice reduction problems
    • volume 1294 of LNCS, IACR, Springer-Verlag, Available at [39] as TR96-056
    • O. Goldreich, S. Goldwasser, and S. Halevi. Public-key cryptosystems from lattice reduction problems. In Proc. of Crypto '97, volume 1294 of LNCS, pages 112-131. IACR, Springer-Verlag, 1997. Available at [39] as TR96-056.
    • (1997) Proc. of Crypto '97 , pp. 112-131
    • Goldreich, O.1    Goldwasser, S.2    Halevi, S.3
  • 54
    • 0023985175 scopus 로고
    • Solving simultaneous modular equations of low degree
    • April, Early version in Proc. of Crypto '85
    • J. Håstad. Solving simultaneous modular equations of low degree. SIAM J. Comput., 17(2): 336-341, April 1988. Early version in Proc. of Crypto '85.
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 336-341
    • Håstad, J.1
  • 55
    • 24944510964 scopus 로고
    • Extraits de lettres de M. Hermite à M. Jacobi sur di érents objets de la théorie des nombres, deuxième lettre
    • Also in the first volume of Hermite’s complete works (Gauthier-Villars)
    • C. Hermite. Extraits de lettres de M. Hermite à M. Jacobi sur di érents objets de la théorie des nombres, deuxième lettre. J. Reine Angew. Math., 40: 279-290, 1850. Also in the first volume of Hermite’s complete works (Gauthier-Villars).
    • (1850) J. Reine Angew. Math , vol.40 , pp. 279-290
    • Hermite, C.1
  • 56
    • 84947808606 scopus 로고    scopus 로고
    • NTRU: A ring based public key cryptosystem
    • volume 1423 of LNCS, Springer-Verlag
    • J. Hoffstein, J. Pipher, and J.H. Silverman. NTRU: a ring based public key cryptosystem. In Proc. of ANTS III, volume 1423 of LNCS, pages 267-288. Springer-Verlag, 1998. Additional information at http://www.ntru.com.
    • (1998) Proc. of ANTS III , pp. 267-288
    • Hoffstein, J.1    Pipher, J.2    Silverman, J.H.3
  • 57
    • 84949226531 scopus 로고    scopus 로고
    • Finding small roots of univariate modular equations revisited
    • volume 1355 of LNCS, Springer-Verlag
    • N. A. Howgrave-Graham. Finding small roots of univariate modular equations revisited. In Cryptography and Coding, volume 1355 of LNCS, pages 131-142, Springer-Verlag, 1997.
    • (1997) Cryptography and Coding , pp. 131-142
    • Howgrave-Graham, N.A.1
  • 61
    • 0001134554 scopus 로고    scopus 로고
    • Lattice reduction: A toolbox for the cryptanalyst
    • A. Joux and J. Stern. Lattice reduction: A toolbox for the cryptanalyst. J. of Cryptology, 11: 161-185, 1998.
    • (1998) J. of Cryptology , vol.11 , pp. 161-185
    • Joux, A.1    Stern, J.2
  • 62
    • 84957627960 scopus 로고    scopus 로고
    • On finding small solutions of modular multivariate polynomial equations
    • volume 1403 of LNCS, IACR, Springer-Verlag
    • C. S. Jutla. On finding small solutions of modular multivariate polynomial equations. In Proc. of Eurocrypt '98, volume 1403 of LNCS, pages 158-170, IACR, Springer-Verlag, 1998.
    • (1998) Proc. of Eurocrypt '98 , pp. 158-170
    • Jutla, C.S.1
  • 63
    • 0020936543 scopus 로고
    • Improved algorithms for integer programming and related lattice problems
    • ACM
    • R. Kannan. Improved algorithms for integer programming and related lattice problems. In Proc.of15th STOC, pages 193-206, ACM, 1983.
    • (1983) Proc.of15th STOC , pp. 193-206
    • Kannan, R.1
  • 65
    • 0000126406 scopus 로고
    • Minkowski’s convex body theorem and integer programming
    • R. Kannan. Minkowski’s convex body theorem and integer programming. Math. Oper. Res., 12(3): 415-440, 1987.
    • (1987) Math. Oper. Res , vol.12 , Issue.3 , pp. 415-440
    • Kannan, R.1
  • 66
    • 0033896372 scopus 로고    scopus 로고
    • Finding the closest lattice vector when it’s unusually close
    • ACM-SIAM
    • P. Klein. Finding the closest lattice vector when it’s unusually close. In Proc. of SODA '2000. ACM-SIAM, 2000.
    • (2000) Proc. of SODA '2000
    • Klein, P.1
  • 67
    • 0003262982 scopus 로고
    • Surles formes quadratiques positives ternaires
    • A. Korkine and G. Zolotare. Surles formes quadratiques positives ternaires. Math. Ann., 5: 581-583, 1872.
    • (1872) Math. Ann , vol.5 , pp. 581-583
    • Korkine, A.1    Zolotare, G.2
  • 68
    • 0000836432 scopus 로고
    • Surles formes quadratiques
    • A. Korkine and G. Zolotare. Surles formes quadratiques. Math. Ann., 6: 336-389, 1873.
    • (1873) Math. Ann , vol.6 , pp. 336-389
    • Korkine, A.1    Zolotare, G.2
  • 69
    • 0039254648 scopus 로고
    • Point lattices
    • R. Graham, M. Grötschel, and L. Lovász, editors, volume 1, chapter 19. Elsevier
    • J. C. Lagarias. Point lattices. In R. Graham, M. Grötschel, and L. Lovász, editors, Handbook of Combinatorics, volume 1, chapter 19. Elsevier, 1995.
    • (1995) Handbook of Combinatorics
    • Lagarias, J.C.1
  • 71
  • 73
    • 34250244723 scopus 로고
    • Factoring polynomials with rational coefficients
    • A. K. Lenstra, H. W. Lenstra, Jr., and L. Lovász. Factoring polynomials with rational coefficients. Mathematische Ann., 261: 513-534, 1982.
    • (1982) Mathematische Ann , vol.261 , pp. 513-534
    • Lenstra, A.K.1    Lenstra, H.W.2    Lovász, L.3
  • 74
    • 0020845921 scopus 로고
    • Integer programming with a fixed number of variables
    • H. W. Lenstra, Jr. Integer programming with a fixed number of variables. Math. Oper. Res., 8(4): 538-548, 1983.
    • (1983) Math. Oper. Res , vol.8 , Issue.4 , pp. 538-548
    • Lenstra, H.W.1
  • 77
    • 0005018185 scopus 로고
    • Lattice points in high-dimensional spheres
    • J. E. Mazo and A. M. Odlyzko. Lattice points in high-dimensional spheres. Monatsh. Math., 110: 47-61, 1990.
    • (1990) Monatsh. Math , vol.110 , pp. 47-61
    • Mazo, J.E.1    Odlyzko, A.M.2
  • 80
    • 0018019325 scopus 로고
    • Hiding information and signatures in trapdoor knapsacks
    • September
    • R. Merkle and M. Hellman. Hiding information and signatures in trapdoor knapsacks. IEEE Trans. Inform. Theory, IT-24: 525-530, September 1978.
    • (1978) IEEE Trans. Inform. Theory , vol.IT-24 , pp. 525-530
    • Merkle, R.1    Hellman, M.2
  • 82
    • 0002823619 scopus 로고    scopus 로고
    • The shortest vector problem is NP-hard to approximate within some constant
    • IEEE, Available at [39] at TR98-016
    • D. Micciancio. The shortest vector problem is NP-hard to approximate within some constant. In Proc. of 39th FOCS. IEEE, 1998. Available at [39] at TR98-016.
    • (1998) Proc. of 39th FOCS
    • Micciancio, D.1
  • 86
    • 21744441311 scopus 로고    scopus 로고
    • A multiplicative attack using LLL algorithm on RSA signatures with redundancy
    • volume 1294 of LNCS, IACR, Springer-Verlag
    • J.-F. Misarsky. A multiplicative attack using LLL algorithm on RSA signatures with redundancy. In Proc. of Crypto '97, volume 1294 of LNCS, pages 221-234, IACR, Springer-Verlag, 1997.
    • (1997) Proc. of Crypto '97 , pp. 221-234
    • Misarsky, J.-F.1
  • 87
    • 0011469175 scopus 로고
    • Square roots of products of algebraic numbers
    • Walter Gautschi, editor, Proc. of Symposia in Applied Mathematics, American Mathematical Society
    • P. L. Montgomery. Square roots of products of algebraic numbers. In Walter Gautschi, editor, Mathematics of Computation 1943-1993: a Half-Century of Computational Mathematics, Proc. of Symposia in Applied Mathematics, pages 567-571, American Mathematical Society, 1994.
    • (1994) Mathematics of Computation 1943-1993: a Half-Century of Computational Mathematics , pp. 567-571
    • Montgomery, P.L.1
  • 89
    • 84946876987 scopus 로고    scopus 로고
    • A Montgomery-like square root for the number field sieve
    • volume 1423 of LNCS, Springer-Verlag
    • P. Nguyen. A Montgomery-like square root for the number field sieve. In Proc. of ANTS-III, volume 1423 of LNCS. Springer-Verlag, 1998.
    • (1998) Proc. of ANTS-III
    • Nguyen, P.1
  • 90
    • 84957089305 scopus 로고    scopus 로고
    • Cryptanalysis of the Goldreich-Goldwasser-Halevi cryptosystem from Crypto '97
    • volume 1666 of LNCS, IACR, Springer-Verlag
    • P. Nguyen. Cryptanalysis of the Goldreich-Goldwasser-Halevi cryptosystem from Crypto '97. In Proc. of Crypto’99, volume 1666 of LNCS, pages 288-304, IACR, Springer-Verlag, 1999.
    • (1999) Proc. of Crypto’99 , pp. 288-304
    • Nguyen, P.1
  • 91
    • 84958613113 scopus 로고    scopus 로고
    • Merkle-Hellman revisited: A cryptanalysis of the QuVanstone cryptosystem based on group factorizations
    • volume 1294 of LNCS, IACR, Springer-Verlag
    • P. Nguyen and J. Stern. Merkle-Hellman revisited: a cryptanalysis of the QuVanstone cryptosystem based on group factorizations. In Proc. of Crypto '97, volume 1294 of LNCS, pages 198-212, IACR, Springer-Verlag, 1997.
    • (1997) Proc. of Crypto '97 , pp. 198-212
    • Nguyen, P.1    Stern, J.2
  • 92
    • 33845601797 scopus 로고    scopus 로고
    • Cryptanalysis of a fast public key cryptosystem presented at SAC '97
    • volume 1556 of LNCS, Springer-Verlag
    • P. Nguyen and J. Stern. Cryptanalysis of a fast public key cryptosystem presented at SAC '97. In Selected Areas in Cryptography - Proc. of SAC '98, volume 1556 of LNCS. Springer-Verlag, 1998.
    • (1998) Selected Areas in Cryptography - Proc. of SAC '98
    • Nguyen, P.1    Stern, J.2
  • 93
    • 84957660976 scopus 로고    scopus 로고
    • Cryptanalysis of the Ajtai-Dwork cryptosystem
    • volume 1462 of LNCS, IACR, Springer-Verlag
    • P. Nguyen and J. Stern. Cryptanalysis of the Ajtai-Dwork cryptosystem. In Proc. of Crypto '98, volume 1462 of LNCS, pages 223-242, IACR, Springer-Verlag, 1998.
    • (1998) Proc. of Crypto '98 , pp. 223-242
    • Nguyen, P.1    Stern, J.2
  • 94
    • 84947806031 scopus 로고    scopus 로고
    • The Béguin-Quisquater server-aided RSA protocol from Crypto '95 is not secure
    • volume 1514 of LNCS, Springer-Verlag
    • P. Nguyen and J. Stern. The Béguin-Quisquater server-aided RSA protocol from Crypto '95 is not secure. In Proc. of Asiacrypt '98, volume 1514 of LNCS, pages 372-379, Springer-Verlag, 1998.
    • (1998) Proc. of Asiacrypt '98 , pp. 372-379
    • Nguyen, P.1    Stern, J.2
  • 95
    • 84957072857 scopus 로고    scopus 로고
    • The hardness of the hidden subset sum problem and its cryptographic implications
    • volume 1666 of LNCS, IACR, Springer-Verlag
    • P. Nguyen and J. Stern. The hardness of the hidden subset sum problem and its cryptographic implications. In Proc. of Crypto '99, volume 1666 of LNCS, pages 31-46, IACR, Springer-Verlag, 1999.
    • (1999) Proc. of Crypto '99 , pp. 31-46
    • Nguyen, P.1    Stern, J.2
  • 98
    • 0141898671 scopus 로고    scopus 로고
    • The dark side of the hidden number problem: Lattice attacks on DSA
    • K.-Y. Lam, I. E. Shparlinski, H. Wang, and C. Xing, editors, Birkhauser
    • P. Q. Nguyen. The dark side of the hidden number problem: Lattice attacks on DSA. In K.-Y. Lam, I. E. Shparlinski, H. Wang, and C. Xing, editors, Proc. Workshop on Cryptography and Comp. Number Theory (CCNT’99). Birkhauser, 2000.
    • (2000) Proc. Workshop on Cryptography and Comp. Number Theory (CCNT’99)
    • Nguyen, P.Q.1
  • 99
    • 0002114928 scopus 로고
    • The rise and fall of knapsack cryptosystems
    • volume 42 of Proc. of Symposia in Applied Mathematics, A.M.S
    • A. M. Odlyzko. The rise and fall of knapsack cryptosystems. In Cryptology and Computational Number Theory, volume 42 of Proc. of Symposia in Applied Mathematics, pages 75-88. A.M.S., 1990.
    • (1990) Cryptology and Computational Number Theory , pp. 75-88
    • Odlyzko, A.M.1
  • 100
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Comm. of the ACM, 21(2): 120-126, 1978.
    • (1978) Comm. of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 101
    • 0023532388 scopus 로고
    • A hierarchy of polynomial lattice basis reduction algorithms
    • C. P. Schnorr. A hierarchy of polynomial lattice basis reduction algorithms. Theoretical Computer Science, 53: 201-224, 1987.
    • (1987) Theoretical Computer Science , vol.53 , pp. 201-224
    • Schnorr, C.P.1
  • 102
    • 38249029857 scopus 로고
    • A more efficient algorithm for lattice basis reduction
    • C. P. Schnorr. A more efficient algorithm for lattice basis reduction. J. of algorithms, 9(1): 47-62, 1988.
    • (1988) J. of algorithms , vol.9 , Issue.1 , pp. 47-62
    • Schnorr, C.P.1
  • 103
    • 0008242214 scopus 로고
    • Factoring integers and computing discrete logarithms via diophantine approximation
    • volume 547 of LNCS, IACR, Springer-Verlag
    • C. P. Schnorr. Factoring integers and computing discrete logarithms via diophantine approximation. In Proc. of Eurocrypt '91, volume 547 of LNCS, pages 171-181. IACR, Springer-Verlag, 1991.
    • (1991) Proc. of Eurocrypt '91 , pp. 171-181
    • Schnorr, C.P.1
  • 104
    • 33846200465 scopus 로고
    • Lattice basis reduction: Improved practical algorithms and solving subset sum problems
    • C. P. Schnorr and M. Euchner. Lattice basis reduction: improved practical algorithms and solving subset sum problems. Math. Programming, 66: 181-199, 1994.
    • (1994) Math. Programming , vol.66 , pp. 181-199
    • Schnorr, C.P.1    Euchner, M.2
  • 105
    • 0009452048 scopus 로고
    • Attacking the Chor-Rivest cryptosystem by improved lattice reduction
    • volume 921 of LNCS, IACR, Springer-Verlag
    • C. P. Schnorr and H. H. Hörner. Attacking the Chor-Rivest cryptosystem by improved lattice reduction. In Proc. of Eurocrypt '95, volume 921 of LNCS, pages 1-12. IACR, Springer-Verlag, 1995.
    • (1995) Proc. of Eurocrypt '95 , pp. 1-12
    • Schnorr, C.P.1    Hörner, H.H.2
  • 106
    • 0020250504 scopus 로고
    • A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem
    • IEEE
    • A. Shamir. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem. In Proc.of23rd FOCS, pages 145-152. IEEE, 1982.
    • (1982) Proc.of23rd FOCS , pp. 145-152
    • Shamir, A.1
  • 107
    • 84946876991 scopus 로고    scopus 로고
    • Number Theory C++ Library (NTL) version 3.9
    • V. Shoup. Number Theory C++ Library (NTL) version 3.9. Available at http://www.shoup.net/ntl/.
    • Shoup, V.1
  • 109
    • 4244009888 scopus 로고
    • La réduction des réseaux: Autour de l’algorithme de Lenstra, Lenstra, Lovász
    • English translation in CWI Quaterly, 3(2): 95-120, 1990
    • B. Vallée. La réduction des réseaux: autour de l’algorithme de Lenstra, Lenstra, Lovász. RAIRO Inform. Th eor. Appl., 23(3): 345-376, 1989. English translation in CWI Quaterly, 3(2): 95-120, 1990.
    • (1989) RAIRO Inform. Th eor. Appl , vol.23 , Issue.3 , pp. 345-376
    • Vallée, B.1
  • 110
    • 0010250382 scopus 로고
    • How to guess l-th roots modulo n by reducing lattice bases
    • volume 357 of LNCS, Springer-Verlag
    • B. Vallée, M. Girault, and P. Ton. How to guess l-th roots modulo n by reducing lattice bases. In Proc. of AAEEC-6, volume 357 of LNCS, pages 427-442. Springer-Verlag, 1988.
    • (1988) Proc. of AAEEC-6 , pp. 427-442
    • Vallée, B.1    Girault, M.2    Ton, P.3
  • 111
    • 0029272081 scopus 로고
    • Short RSA keys and their generation
    • S. A. Vanstone and R. J. Zuccherato. Short RSA keys and their generation. J. of Cryptology, 8(2): 101-114, 1995.
    • (1995) J. of Cryptology , vol.8 , Issue.2 , pp. 101-114
    • Vanstone, S.A.1    Zuccherato, R.J.2
  • 112
    • 84946876992 scopus 로고    scopus 로고
    • Cryptanalysis of the Chor-Rivest cryptosystem
    • volume 1462 of LNCS, Springer-Verlag, Appeared first at the "rump session" of Crypto '97
    • S. Vaudenay. Cryptanalysis of the Chor-Rivest cryptosystem. In Proc. of Crypto '98, volume 1462 of LNCS. Springer-Verlag, 1998. Appeared first at the "rump session" of Crypto '97.
    • (1998) Proc. of Crypto '98
    • Vaudenay, S.1
  • 113
    • 1642282076 scopus 로고    scopus 로고
    • Certificates of recoverability with scalable recovery agent security
    • LNCS. Springer-Verlag
    • E. R. Verheul. Certificates of recoverability with scalable recovery agent security. In Proc. of PKC '2000, LNCS. Springer-Verlag, 2000.
    • (2000) Proc. of PKC '2000
    • Verheul, E.R.1
  • 114
    • 0025430939 scopus 로고
    • Cryptanalysis of short RSA secret exponents
    • Theory
    • M. Wiener. Cryptanalysis of short RSA secret exponents. IEEE Trans. Inform. Theory, 36(3): 553-558, 1990.
    • (1990) IEEE Trans. Inform , vol.36 , Issue.3 , pp. 553-558
    • Wiener, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.