메뉴 건너뛰기




Volumn 1295, Issue , 1997, Pages 44-51

Positive applications of lattices to cryptography

Author keywords

[No Author keywords available]

Indexed keywords

NUMBER THEORY; PUBLIC KEY CRYPTOGRAPHY;

EID: 38349062340     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0029948     Document Type: Conference Paper
Times cited : (7)

References (26)
  • 2
    • 0029719917 scopus 로고    scopus 로고
    • Generating Hard Instances of Lattice Problems, Proceedings 28th Annual ACM Symposium on Theory of Computing
    • TR96-007
    • M. Ajtai, Generating Hard Instances of Lattice Problems, Proceedings 28th Annual ACM Symposium on Theory of Computing, 1996, pp. 99-108 Electronic Colloquium on Computational Complexity TR96-007, http://www.eccc.uni-trier.de/eccc-local/Lists/TR-1996.html
    • (1996) Electronic Colloquium on Computational Complexity , pp. 99-108
    • Ajtai, M.1
  • 3
    • 84947782045 scopus 로고    scopus 로고
    • discussion with the author
    • M. Ajtai, discussion with the author, 1996
    • (1996)
    • Ajtai, M.1
  • 4
    • 0030679849 scopus 로고    scopus 로고
    • A Public-Key Cryptosystem with Average-Case/Worst-Case Equivalence
    • Electronic Colloquium on Computational Complexity TR96-065
    • M. Ajtai, C. Dwork, A Public-Key Cryptosystem with Average-Case/Worst-Case Equivalence, Proceedings 29th Annual ACM Symposium on Theory of Computing, 1997; see also Electronic Colloquium on Computational Complexity TR96-065, http://www.eccc.uni-trier.de/eccc-local/Lists/TR-1996.html
    • (1997) Proceedings 29Th Annual ACM Symposium on Theory of Computing
    • Ajtai, M.1    Dwork, C.2
  • 5
    • 51249173801 scopus 로고
    • On Lovasz’ Lattice Reduction and the Nearest Lattice Point Problem
    • L. Babai, On Lovasz’ Lattice Reduction and the Nearest Lattice Point Problem, Combinatorica. 6(1), 1986, pp. 1-13
    • (1986) Combinatorica , vol.6 , Issue.1 , pp. 1-13
    • Babai, L.1
  • 6
    • 0021522644 scopus 로고
    • How to Generate Cryptographically Strong Sequences of PseudoRandom Bits
    • M. Blum and S. Micali, How to Generate Cryptographically Strong Sequences of PseudoRandom Bits, SIAM J. Computing 13, 1984, pp. 850-864
    • (1984) SIAM J. Computing , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 9
    • 0000148836 scopus 로고    scopus 로고
    • Finding a Small Root of a Univariate Modular Equation
    • D. Coppersmith, Finding a Small Root of a Univariate Modular Equation, Proc. EVRO-CRYPT’96
    • Proc. EVRO-CRYPT’96
    • Coppersmith, D.1
  • 15
    • 84947789128 scopus 로고    scopus 로고
    • Eliminating the Decryption Error in the Ajtai-Dwork Cryptosystem
    • appear
    • O. Goldreich, S. Goldwasser, and S. Halevi, Eliminating the Decryption Error in the Ajtai-Dwork Cryptosystem, to appear, Proc. CRYPTO'97
    • Proc. CRYPTO'97
    • Goldreich, O.1    Goldwasser, S.2    Halevi, S.3
  • 17
    • 0023985465 scopus 로고
    • A “Paradoxical” Solution to the Signature Problem
    • S. Goldwasser, S. Micali, and R. Rivest, A “Paradoxical” Solution to the Signature Problem, SIAM J. Computing IT, 1988, pp. 281-308
    • (1988) SIAM J. Computing IT , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 20
    • 0023985175 scopus 로고
    • Solving Simultaneous Modular Equations of Low Degree
    • J. Hastad, Solving Simultaneous Modular Equations of Low Degree, SIAM J, Computing 17(2), pp.336-341, 1988
    • (1988) SIAM J, Computing , vol.17 , Issue.2 , pp. 336-341
    • Hastad, J.1
  • 21
    • 0001143795 scopus 로고    scopus 로고
    • Efficient Cryptographic Schemes Provably as Secure as Subset Sum
    • R. Impagliazzo and M. Naor, Efficient Cryptographic Schemes Provably as Secure as Subset Sum, J. Cryptology 9, pp. 199-216, 1996
    • (1996) J. Cryptology , vol.9 , pp. 199-216
    • Impagliazzo, R.1    Naor, M.2
  • 22
    • 0021936756 scopus 로고
    • Solving low-density subset sum problems
    • An earlier version appeared in Proc. 24th Annual Symposium on Foundations of Computer Science
    • J.C. Lagarias, A.M. Odlyzko, Solving low-density subset sum problems, Journal of the Association for Computing Machinery 32 pp. 229-246, 1985. An earlier version appeared in Proc. 24th Annual Symposium on Foundations of Computer Science, 1983
    • (1985) Journal of the Association for Computing Machinery , vol.32 , pp. 229-246
    • Lagarias, J.C.1    Odlyzko, A.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.