-
2
-
-
0029719917
-
Generating Hard Instances of Lattice Problems, Proceedings 28th Annual ACM Symposium on Theory of Computing
-
TR96-007
-
M. Ajtai, Generating Hard Instances of Lattice Problems, Proceedings 28th Annual ACM Symposium on Theory of Computing, 1996, pp. 99-108 Electronic Colloquium on Computational Complexity TR96-007, http://www.eccc.uni-trier.de/eccc-local/Lists/TR-1996.html
-
(1996)
Electronic Colloquium on Computational Complexity
, pp. 99-108
-
-
Ajtai, M.1
-
3
-
-
84947782045
-
-
discussion with the author
-
M. Ajtai, discussion with the author, 1996
-
(1996)
-
-
Ajtai, M.1
-
4
-
-
0030679849
-
A Public-Key Cryptosystem with Average-Case/Worst-Case Equivalence
-
Electronic Colloquium on Computational Complexity TR96-065
-
M. Ajtai, C. Dwork, A Public-Key Cryptosystem with Average-Case/Worst-Case Equivalence, Proceedings 29th Annual ACM Symposium on Theory of Computing, 1997; see also Electronic Colloquium on Computational Complexity TR96-065, http://www.eccc.uni-trier.de/eccc-local/Lists/TR-1996.html
-
(1997)
Proceedings 29Th Annual ACM Symposium on Theory of Computing
-
-
Ajtai, M.1
Dwork, C.2
-
5
-
-
51249173801
-
On Lovasz’ Lattice Reduction and the Nearest Lattice Point Problem
-
L. Babai, On Lovasz’ Lattice Reduction and the Nearest Lattice Point Problem, Combinatorica. 6(1), 1986, pp. 1-13
-
(1986)
Combinatorica
, vol.6
, Issue.1
, pp. 1-13
-
-
Babai, L.1
-
6
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences of PseudoRandom Bits
-
M. Blum and S. Micali, How to Generate Cryptographically Strong Sequences of PseudoRandom Bits, SIAM J. Computing 13, 1984, pp. 850-864
-
(1984)
SIAM J. Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
9
-
-
0000148836
-
Finding a Small Root of a Univariate Modular Equation
-
D. Coppersmith, Finding a Small Root of a Univariate Modular Equation, Proc. EVRO-CRYPT’96
-
Proc. EVRO-CRYPT’96
-
-
Coppersmith, D.1
-
15
-
-
84947789128
-
Eliminating the Decryption Error in the Ajtai-Dwork Cryptosystem
-
appear
-
O. Goldreich, S. Goldwasser, and S. Halevi, Eliminating the Decryption Error in the Ajtai-Dwork Cryptosystem, to appear, Proc. CRYPTO'97
-
Proc. CRYPTO'97
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
17
-
-
0023985465
-
A “Paradoxical” Solution to the Signature Problem
-
S. Goldwasser, S. Micali, and R. Rivest, A “Paradoxical” Solution to the Signature Problem, SIAM J. Computing IT, 1988, pp. 281-308
-
(1988)
SIAM J. Computing IT
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
18
-
-
0003207514
-
Geometric Algorithms and Combinatorial Optimization
-
M. Grotschel, Lovasz, A. Schrijver, Geometric Algorithms and Combinatorial Optimization, Springer, Algorithms and Combinatorics 2, 1988
-
(1988)
Springer, Algorithms and Combinatorics
, vol.2
-
-
Grotschel, M.1
Lovasz, A.S.2
-
20
-
-
0023985175
-
Solving Simultaneous Modular Equations of Low Degree
-
J. Hastad, Solving Simultaneous Modular Equations of Low Degree, SIAM J, Computing 17(2), pp.336-341, 1988
-
(1988)
SIAM J, Computing
, vol.17
, Issue.2
, pp. 336-341
-
-
Hastad, J.1
-
21
-
-
0001143795
-
Efficient Cryptographic Schemes Provably as Secure as Subset Sum
-
R. Impagliazzo and M. Naor, Efficient Cryptographic Schemes Provably as Secure as Subset Sum, J. Cryptology 9, pp. 199-216, 1996
-
(1996)
J. Cryptology
, vol.9
, pp. 199-216
-
-
Impagliazzo, R.1
Naor, M.2
-
22
-
-
0021936756
-
Solving low-density subset sum problems
-
An earlier version appeared in Proc. 24th Annual Symposium on Foundations of Computer Science
-
J.C. Lagarias, A.M. Odlyzko, Solving low-density subset sum problems, Journal of the Association for Computing Machinery 32 pp. 229-246, 1985. An earlier version appeared in Proc. 24th Annual Symposium on Foundations of Computer Science, 1983
-
(1985)
Journal of the Association for Computing Machinery
, vol.32
, pp. 229-246
-
-
Lagarias, J.C.1
Odlyzko, A.M.2
|