메뉴 건너뛰기




Volumn 2851, Issue , 2003, Pages 240-251

Analysis of the insecurity of ECMQV with partially known nonces

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; AUTHENTICATION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 35248856015     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/10958513_19     Document Type: Article
Times cited : (8)

References (16)
  • 1
    • 51249173801 scopus 로고
    • On Lovàsz lattice reduction and the nearest lattice point problem
    • L. Babai. On Lovàsz lattice reduction and the nearest lattice point problem. Combinatoria, 6, 1-13, 1986.
    • (1986) Combinatoria , vol.6 , pp. 1-13
    • Babai, L.1
  • 2
    • 84957672468 scopus 로고    scopus 로고
    • 0.292
    • Advances in Cryptology - EuroCrypt '99
    • 0.292, In Advances in Cryptology - EuroCrypt '99, Springer LNCS 1592, 1-11, 1999.
    • (1999) Springer LNCS , vol.1592 , pp. 1-11
    • Boneh, D.1    Durfee, G.2
  • 3
    • 84946840551 scopus 로고    scopus 로고
    • The Modular Inversion Hidden Number Problem
    • Advances in Cryptology - AsiaCrypt 2001
    • D. Boneh, S. Halevi and N. Howgrave-Graham. The Modular Inversion Hidden Number Problem. In Advances in Cryptology - AsiaCrypt 2001, LNCS 2248, 36-51, 2001
    • (2001) LNCS , vol.2248 , pp. 36-51
    • Boneh, D.1    Halevi, S.2    Howgrave-Graham, N.3
  • 4
    • 84955621986 scopus 로고    scopus 로고
    • Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes
    • Advances in Cryptology - CRYPTO '96
    • D. Boneh and R. Venkatesan. Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes. In Advances in Cryptology - CRYPTO '96, Springer LNCS 1109, 129-142, 1996.
    • (1996) Springer LNCS , vol.1109 , pp. 129-142
    • Boneh, D.1    Venkatesan, R.2
  • 5
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    • D. Coppersmith. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. of Cryptology, 10, 233-260, 1997.
    • (1997) J. of Cryptology , vol.10 , pp. 233-260
    • Coppersmith, D.1
  • 8
    • 34250244723 scopus 로고
    • Factoring polynomials with rational coefficients
    • A.L. Lenstra, H.W. Lenstra, Jr., and L. Lovász. Factoring polynomials with rational coefficients. Math Ann., 261, 515-534, 1982.
    • (1982) Math Ann. , vol.261 , pp. 515-534
    • Lenstra, A.L.1    Lenstra Jr., H.W.2    Lovász, L.3
  • 9
    • 0018019325 scopus 로고
    • Hiding information and signatures in trapdoor knapsacks
    • September
    • R. Merkle, M. Hellman. Hiding information and signatures in trapdoor knapsacks. IEEE Trans. Inform. Theory, IT-24:525-530, September 1978.
    • (1978) IEEE Trans. Inform. Theory , vol.IT-24 , pp. 525-530
    • Merkle, R.1    Hellman, M.2
  • 10
    • 33746391879 scopus 로고    scopus 로고
    • The insecurity of the Digital Signature Algorithm with partially known nonces
    • P.Q. Nguyen and I.E. Shparlinski. The insecurity of the Digital Signature Algorithm with partially known nonces. J. Cryptology, 15, 151-176, 2002.
    • (2002) J. Cryptology , vol.15 , pp. 151-176
    • Nguyen, P.Q.1    Shparlinski, I.E.2
  • 11
    • 0141889703 scopus 로고    scopus 로고
    • The insecurity of the elliptic curve Digital Signature Algorithm with partially known nonces
    • P.Q. Nguyen and I.E. Shparlinski. The insecurity of the elliptic curve Digital Signature Algorithm with partially known nonces. To appear Designs, Codes and Cryptography.
    • Designs, Codes and Cryptography
    • Nguyen, P.Q.1    Shparlinski, I.E.2
  • 12
    • 33846870481 scopus 로고    scopus 로고
    • Lattice reduction in cryptology: An update
    • Algorithmic Number Theory - ANTS-IV
    • P.Q. Nguyen and J. Stern. Lattice reduction in cryptology: An update. In Algorithmic Number Theory - ANTS-IV, Springer LNCS 1838, 85-112, 2000.
    • (2000) Springer LNCS , vol.1838 , pp. 85-112
    • Nguyen, P.Q.1    Stern, J.2
  • 13
    • 84966238549 scopus 로고
    • Monte Carlo methods for index computation (mod p)
    • J.M. Pollard. Monte Carlo methods for index computation (mod p). Math. Comp., 32, 918-924, 1978.
    • (1978) Math. Comp. , vol.32 , pp. 918-924
    • Pollard, J.M.1
  • 14
    • 33846200465 scopus 로고
    • Lattice basis reduction: Improved practical algorithms and solving subset sum problems
    • C.P. Schnorr and M. Euchner. Lattice basis reduction: Improved practical algorithms and solving subset sum problems. Math. Programming, 66, 181-199, 1994.
    • (1994) Math. Programming , vol.66 , pp. 181-199
    • Schnorr, C.P.1    Euchner, M.2
  • 15
    • 0020250504 scopus 로고
    • A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem
    • IEEE
    • A. Shamir. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem. In proc. of 23rd FOCS, pages 145-152. IEEE, 1982
    • (1982) Proc. of 23rd FOCS , pp. 145-152
    • Shamir, A.1
  • 16
    • 0000955648 scopus 로고
    • Solving exponential diophantine equations using lattice basis reduction algorithms
    • B.M.M. de Weger. Solving exponential diophantine equations using lattice basis reduction algorithms. J. Number Theory, 26, 325-367, 1987.
    • (1987) J. Number Theory , vol.26 , pp. 325-367
    • De Weger, B.M.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.