-
1
-
-
51249173801
-
On Lovàsz lattice reduction and the nearest lattice point problem
-
L. Babai. On Lovàsz lattice reduction and the nearest lattice point problem. Combinatoria, 6, 1-13, 1986.
-
(1986)
Combinatoria
, vol.6
, pp. 1-13
-
-
Babai, L.1
-
2
-
-
84957672468
-
0.292
-
Advances in Cryptology - EuroCrypt '99
-
0.292, In Advances in Cryptology - EuroCrypt '99, Springer LNCS 1592, 1-11, 1999.
-
(1999)
Springer LNCS
, vol.1592
, pp. 1-11
-
-
Boneh, D.1
Durfee, G.2
-
3
-
-
84946840551
-
The Modular Inversion Hidden Number Problem
-
Advances in Cryptology - AsiaCrypt 2001
-
D. Boneh, S. Halevi and N. Howgrave-Graham. The Modular Inversion Hidden Number Problem. In Advances in Cryptology - AsiaCrypt 2001, LNCS 2248, 36-51, 2001
-
(2001)
LNCS
, vol.2248
, pp. 36-51
-
-
Boneh, D.1
Halevi, S.2
Howgrave-Graham, N.3
-
4
-
-
84955621986
-
Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes
-
Advances in Cryptology - CRYPTO '96
-
D. Boneh and R. Venkatesan. Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes. In Advances in Cryptology - CRYPTO '96, Springer LNCS 1109, 129-142, 1996.
-
(1996)
Springer LNCS
, vol.1109
, pp. 129-142
-
-
Boneh, D.1
Venkatesan, R.2
-
5
-
-
0001494997
-
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
-
D. Coppersmith. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. of Cryptology, 10, 233-260, 1997.
-
(1997)
J. of Cryptology
, vol.10
, pp. 233-260
-
-
Coppersmith, D.1
-
7
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
L. Law, A. Menezes, M. Qu, J. Solinas and S. Vanstone. An efficient protocol for authenticated key agreement. To appear Designs, Codes and Cryptography
-
Designs, Codes and Cryptography
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
8
-
-
34250244723
-
Factoring polynomials with rational coefficients
-
A.L. Lenstra, H.W. Lenstra, Jr., and L. Lovász. Factoring polynomials with rational coefficients. Math Ann., 261, 515-534, 1982.
-
(1982)
Math Ann.
, vol.261
, pp. 515-534
-
-
Lenstra, A.L.1
Lenstra Jr., H.W.2
Lovász, L.3
-
9
-
-
0018019325
-
Hiding information and signatures in trapdoor knapsacks
-
September
-
R. Merkle, M. Hellman. Hiding information and signatures in trapdoor knapsacks. IEEE Trans. Inform. Theory, IT-24:525-530, September 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.IT-24
, pp. 525-530
-
-
Merkle, R.1
Hellman, M.2
-
10
-
-
33746391879
-
The insecurity of the Digital Signature Algorithm with partially known nonces
-
P.Q. Nguyen and I.E. Shparlinski. The insecurity of the Digital Signature Algorithm with partially known nonces. J. Cryptology, 15, 151-176, 2002.
-
(2002)
J. Cryptology
, vol.15
, pp. 151-176
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
-
11
-
-
0141889703
-
The insecurity of the elliptic curve Digital Signature Algorithm with partially known nonces
-
P.Q. Nguyen and I.E. Shparlinski. The insecurity of the elliptic curve Digital Signature Algorithm with partially known nonces. To appear Designs, Codes and Cryptography.
-
Designs, Codes and Cryptography
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
-
12
-
-
33846870481
-
Lattice reduction in cryptology: An update
-
Algorithmic Number Theory - ANTS-IV
-
P.Q. Nguyen and J. Stern. Lattice reduction in cryptology: An update. In Algorithmic Number Theory - ANTS-IV, Springer LNCS 1838, 85-112, 2000.
-
(2000)
Springer LNCS
, vol.1838
, pp. 85-112
-
-
Nguyen, P.Q.1
Stern, J.2
-
13
-
-
84966238549
-
Monte Carlo methods for index computation (mod p)
-
J.M. Pollard. Monte Carlo methods for index computation (mod p). Math. Comp., 32, 918-924, 1978.
-
(1978)
Math. Comp.
, vol.32
, pp. 918-924
-
-
Pollard, J.M.1
-
14
-
-
33846200465
-
Lattice basis reduction: Improved practical algorithms and solving subset sum problems
-
C.P. Schnorr and M. Euchner. Lattice basis reduction: Improved practical algorithms and solving subset sum problems. Math. Programming, 66, 181-199, 1994.
-
(1994)
Math. Programming
, vol.66
, pp. 181-199
-
-
Schnorr, C.P.1
Euchner, M.2
-
15
-
-
0020250504
-
A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem
-
IEEE
-
A. Shamir. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem. In proc. of 23rd FOCS, pages 145-152. IEEE, 1982
-
(1982)
Proc. of 23rd FOCS
, pp. 145-152
-
-
Shamir, A.1
-
16
-
-
0000955648
-
Solving exponential diophantine equations using lattice basis reduction algorithms
-
B.M.M. de Weger. Solving exponential diophantine equations using lattice basis reduction algorithms. J. Number Theory, 26, 325-367, 1987.
-
(1987)
J. Number Theory
, vol.26
, pp. 325-367
-
-
De Weger, B.M.M.1
|