-
1
-
-
38749147177
-
Generating hard instances of lattice problems
-
Preliminary version in STOC
-
M. AJTAI (2004). Generating hard instances of lattice problems. Complexity of Computations and Proofs, Quaderni di Matematica 13, 1-32. Preliminary version in STOC 1996.
-
(1996)
Complexity of Computations and Proofs, Quaderni di Matematica
, vol.13
, pp. 1-32
-
-
AJTAI, M.1
-
3
-
-
0030679849
-
A public-key cryptosystem with worst-case/averagecase equivalence
-
ACM, El Paso, Texas, USA
-
M. AJTAI & C. DWORK (1997). A public-key cryptosystem with worst-case/averagecase equivalence. In Proceedings of the Twenty-ninth Annual ACM Symposium on Theory of Computing - STOC '97, 284-293. ACM, El Paso, Texas, USA.
-
(1997)
Proceedings of the Twenty-ninth Annual ACM Symposium on Theory of Computing - STOC '97
, pp. 284-293
-
-
AJTAI, M.1
DWORK, C.2
-
4
-
-
0034826416
-
A sieve algorithm for the shortest lattice vector problem
-
ACM, Heraklion, Crete, Greece
-
M. AJTAI, R. KUMAR & D. SIVAKUMAR (2001). A sieve algorithm for the shortest lattice vector problem. In Proceedings of the Thirty-third Annual ACM Symposium on Theory of Computing - STOC 2001, 266-275. ACM, Heraklion, Crete, Greece.
-
(2001)
Proceedings of the Thirty-third Annual ACM Symposium on Theory of Computing - STOC 2001
, pp. 266-275
-
-
AJTAI, M.1
KUMAR, R.2
SIVAKUMAR, D.3
-
5
-
-
0012619431
-
Compact knapsacks are polynomially solvable
-
Preliminary version in CRYPTO
-
H. R. AMIRAZIZI, E. D. KARNIN & J. M. REYNERI (1983). Compact knapsacks are polynomially solvable. ACM SIGACT News 15, 20-22. Preliminary version in CRYPTO 1981.
-
(1981)
ACM SIGACT News
, vol.15
, pp. 20-22
-
-
AMIRAZIZI, H.R.1
KARNIN, E.D.2
REYNERI, J.M.3
-
6
-
-
0031119485
-
-
S. ARORA, L. BABAI, J. STERN & E. Z. SWEEDYK (1997). The hardness of approximate optima in lattices, codes, and systems of linear equations. Journal of Computer and System Sciences 54(2), 317-331. Preliminary version in FOCS 1993.
-
S. ARORA, L. BABAI, J. STERN & E. Z. SWEEDYK (1997). The hardness of approximate optima in lattices, codes, and systems of linear equations. Journal of Computer and System Sciences 54(2), 317-331. Preliminary version in FOCS 1993.
-
-
-
-
7
-
-
51249173801
-
On Lovasz' lattice reduction and the nearest lattice point problem
-
Preliminary version in STAGS
-
L. BABAI (1986). On Lovasz' lattice reduction and the nearest lattice point problem. Combinatorica 6(1), 1-13. Preliminary version in STAGS 1985.
-
(1985)
Combinatorica
, vol.6
, Issue.1
, pp. 1-13
-
-
BABAI, L.1
-
8
-
-
0032653013
-
On the complexity of computing short linearly independent vectors and short bases in a lattice
-
ACM, Atlanta, Georgia, USA
-
J. BLOMER & J.-P. SEIFERT (1999). On the complexity of computing short linearly independent vectors and short bases in a lattice. In Proceedings of the Thirty-first Annual ACM Symposium on Theory of Computing - STOC '99, 711-720. ACM, Atlanta, Georgia, USA.
-
(1999)
Proceedings of the Thirty-first Annual ACM Symposium on Theory of Computing - STOC '99
, pp. 711-720
-
-
BLOMER, J.1
SEIFERT, J.-P.2
-
9
-
-
85034633063
-
Breaking iterated knapsacks
-
Advances in Cryptology Proceedings of CRYPTO '84, G. R. BLAKLEY & D. CHAUM, editors, of, Springer-Verlag, Santa Barbara, California, USA
-
E. F. BRICKELL (1984). Breaking iterated knapsacks. In Advances in Cryptology Proceedings of CRYPTO '84, G. R. BLAKLEY & D. CHAUM, editors, volume 196 of Lecture Notes in Computer Science, 342-358. Springer-Verlag, Santa Barbara, California, USA.
-
(1984)
Lecture Notes in Computer Science
, vol.196
, pp. 342-358
-
-
BRICKELL, E.F.1
-
10
-
-
0031377422
-
An improved worst-case to average-case connection for lattice problems (extended abstract)
-
IEEE, Miami Beach, Florida, USA
-
J.-Y. CAI & A. P. NERURKAR (1997). An improved worst-case to average-case connection for lattice problems (extended abstract). In Proceedings of the 38th Annual Symposium on Foundations of Computer Science - FOCS '97, 468-477. IEEE, Miami Beach, Florida, USA.
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science - FOCS '97
, pp. 468-477
-
-
CAI, J.-Y.1
NERURKAR, A.P.2
-
11
-
-
0024079003
-
A knapsack-type public key cryptosystem based on arithmetic in finite fields
-
Preliminary version in CRYPTO
-
B. CHOR & R. RIVEST (1988). A knapsack-type public key cryptosystem based on arithmetic in finite fields. IEEE Transactions in Information Theory 34, 901-909. Preliminary version in CRYPTO 1984.
-
(1984)
IEEE Transactions in Information Theory
, vol.34
, pp. 901-909
-
-
CHOR, B.1
RIVEST, R.2
-
12
-
-
0000951613
-
-
M. J. COSTER, A. JOUX, B. A. LAMACCHIA, A. M. ODLYZKO, C.-P. SCHNORR & J. STERN (1992). Improved low-density subset sum algorithms. Computational Complexity 2(2), 111-128. Preliminary versions in Eurocrypt 1991 and FCT 1991.
-
M. J. COSTER, A. JOUX, B. A. LAMACCHIA, A. M. ODLYZKO, C.-P. SCHNORR & J. STERN (1992). Improved low-density subset sum algorithms. Computational Complexity 2(2), 111-128. Preliminary versions in Eurocrypt 1991 and FCT 1991.
-
-
-
-
13
-
-
28144437148
-
Cryptanalysis of a public key system based on Diophantine equations
-
T. W. CUSICK (1995). Cryptanalysis of a public key system based on Diophantine equations. Information Processing Letters 56(2), 73-75.
-
(1995)
Information Processing Letters
, vol.56
, Issue.2
, pp. 73-75
-
-
CUSICK, T.W.1
-
14
-
-
33745545274
-
On the existence of statistically hiding bit commitment schemes and fail-stop signatures
-
Preliminary version in CRYPTO
-
I. DAMGÅRD, T. P. PEDERSEN & B. PFITZMANN (1997). On the existence of statistically hiding bit commitment schemes and fail-stop signatures. Journal of Cryptology 10(3), 163-194. Preliminary version in CRYPTO 1993.
-
(1993)
Journal of Cryptology
, vol.10
, Issue.3
, pp. 163-194
-
-
DAMGÅRD, I.1
PEDERSEN, T.P.2
PFITZMANN, B.3
-
15
-
-
0141655066
-
Approximating CVP to within almost-polynomial factors is NP-hard
-
Preliminary version in FOCS
-
I. DINUR, G. KINDLER, R. RAZ & S. SAFRA (2003). Approximating CVP to within almost-polynomial factors is NP-hard. Combinatorica 23(2), 205-243. Preliminary version in FOCS 1998.
-
(1998)
Combinatorica
, vol.23
, Issue.2
, pp. 205-243
-
-
DINUR, I.1
KINDLER, G.2
RAZ, R.3
SAFRA, S.4
-
16
-
-
38749097309
-
-
P. VAN EMDE BOAS (1981). Another NP-complete problem and the complexity of computing short vectors in a lattice. Technical Report 81-04, Mathematische Instituut, Universiry of Amsterdam. Available on-line at URL http://turing.wins.uva.nl/~peter/.
-
P. VAN EMDE BOAS (1981). Another NP-complete problem and the complexity of computing short vectors in a lattice. Technical Report 81-04, Mathematische Instituut, Universiry of Amsterdam. Available on-line at URL http://turing.wins.uva.nl/~peter/.
-
-
-
-
17
-
-
2942748673
-
The inapproximability of lattice and coding problems with preprocessing
-
Preliminary version in CCC
-
U. FEIGE & D. MICCIANCIO (2004). The inapproximability of lattice and coding problems with preprocessing. Journal of Computer and System, Sciences 69(1), 45-67. Preliminary version in CCC 2002.
-
(2002)
Journal of Computer and System, Sciences
, vol.69
, Issue.1
, pp. 45-67
-
-
FEIGE, U.1
MICCIANCIO, D.2
-
18
-
-
24144500621
-
Solving medium-density subset sum problems in expected polynomial time
-
Proceedings of the 22nd Annual Symposium on Theoretical Aspects of Computer Science, STACS 2005, V. DIEKERT & B. DURAND, editors, of, Springer, Stuttgart, Germany
-
A. FLAXMAN & B. PRZYDATEK (2005). Solving medium-density subset sum problems in expected polynomial time. In Proceedings of the 22nd Annual Symposium on Theoretical Aspects of Computer Science - STACS 2005, V. DIEKERT & B. DURAND, editors, volume 3404 of Lecture Notes in Computer Science, 305-314. Springer, Stuttgart, Germany.
-
(2005)
Lecture Notes in Computer Science
, vol.3404
, pp. 305-314
-
-
FLAXMAN, A.1
PRZYDATEK, B.2
-
19
-
-
84947222499
-
Cryptanaiysis of the revised NTRU signature scheme
-
Advances in Cryptology, EUROCRYPT 2002, Proceedings of the Internarional Conference on the Theory and Application of Cryptographic Techniques, L. KNUDSEN, editor, of, Springer-Verlag, Amsterdam, The Netherlands
-
C. GENTRY & M. SZYDLO (2002). Cryptanaiysis of the revised NTRU signature scheme. In Advances in Cryptology - EUROCRYPT 2002, Proceedings of the Internarional Conference on the Theory and Application of Cryptographic Techniques, L. KNUDSEN, editor, volume 2332 of Lecture Notes in Computer Science, 299-320. Springer-Verlag, Amsterdam, The Netherlands.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 299-320
-
-
GENTRY, C.1
SZYDLO, M.2
-
20
-
-
38749100890
-
-
O. GOLDREICH, S. GOLDWASSER & S. HALEVI (1996). Collision-free hashing from lattice problems. Technical Report TR96-056, Electronic Colloquium on Computational Complexity (ECCC).
-
O. GOLDREICH, S. GOLDWASSER & S. HALEVI (1996). Collision-free hashing from lattice problems. Technical Report TR96-056, Electronic Colloquium on Computational Complexity (ECCC).
-
-
-
-
23
-
-
85014381599
-
A new trapdoor knapsack public-key cryptosystem
-
Advances in Cryptology, EUROCRYPT '84, Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques, T. BETH, N. COT & I. INGEMARSSON, editors, of, Springer-Verlag, Paris, France
-
R. M. F. GOODMAN & A. J. MCAULEY (1984). A new trapdoor knapsack public-key cryptosystem. In Advances in Cryptology - EUROCRYPT '84, Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques, T. BETH, N. COT & I. INGEMARSSON, editors, volume 209 of Lecture Notes in Computer Science, 150-158. Springer-Verlag, Paris, France.
-
(1984)
Lecture Notes in Computer Science
, vol.209
, pp. 150-158
-
-
GOODMAN, R.M.F.1
MCAULEY, A.J.2
-
24
-
-
23744485134
-
Maximum-likelihood decoding of Reed-Solomon codes is NP-hard
-
Preliminary version in SODA
-
V. GURUSWAMI & A. VARDY (2005). Maximum-likelihood decoding of Reed-Solomon codes is NP-hard. IEEE Trunsactions on Information Theory 51(7), 2249-2256. Preliminary version in SODA 2005.
-
(2005)
IEEE Trunsactions on Information Theory
, vol.51
, Issue.7
, pp. 2249-2256
-
-
GURUSWAMI, V.1
VARDY, A.2
-
25
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. HÅSTAD, R. IMPAGLIAZZO, L. A. LEVIN & M. LUBY (1999). A pseudorandom generator from any one-way function. SIAM Journal on Computing 28(4), 1364-1396.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
HÅSTAD, J.1
IMPAGLIAZZO, R.2
LEVIN, L.A.3
LUBY, M.4
-
26
-
-
84947808606
-
NTRU: A ring based public key cryptosystem
-
Algorithmic Number Theory: Third International Symposium, ANTS-III, J. P. BUHLER, editor, of, Springer, Portland, OR, USA
-
J. HOFFSTEIN, J. PLPHER & J. H. SILVERMAN (1998). NTRU: A ring based public key cryptosystem. In Algorithmic Number Theory: Third International Symposium - ANTS-III, J. P. BUHLER, editor, volume 1423 of Lecture Notes in Computer Science, 267-288. Springer, Portland, OR, USA.
-
(1998)
Lecture Notes in Computer Science
, vol.1423
, pp. 267-288
-
-
HOFFSTEIN, J.1
PLPHER, J.2
SILVERMAN, J.H.3
-
27
-
-
35048825270
-
A method to solve cyclotomic norm equations
-
Algorithmic Number Theory: 6th International Symposium, ANTS-VI, D. A. BUELL, editor, of, Springer, Burlington, VT, USA
-
N. HOWGRAVE-GRAHAM & M. SZYDLO (2004). A method to solve cyclotomic norm equations. In Algorithmic Number Theory: 6th International Symposium - ANTS-VI, D. A. BUELL, editor, volume 3076 of Lecture Notes in Computer Science, 272-279. Springer, Burlington, VT, USA.
-
(2004)
Lecture Notes in Computer Science
, vol.3076
, pp. 272-279
-
-
HOWGRAVE-GRAHAM, N.1
SZYDLO, M.2
-
28
-
-
0001143795
-
Efficient cryptographic schemes provably as secure as subset sum
-
R. IMPAGLIAZZO & M. NAOR (1996). Efficient cryptographic schemes provably as secure as subset sum. Journal of Cryptology 9(4), 199-216.
-
(1996)
Journal of Cryptology
, vol.9
, Issue.4
, pp. 199-216
-
-
IMPAGLIAZZO, R.1
NAOR, M.2
-
29
-
-
0024771884
-
How to recycle random bits
-
IEEE, Reseach Triangle Park, NC, USA
-
R. IMPAGLIAZZO & D. ZUCKERMAN (1989). How to recycle random bits. In Proceedings of the 30th Annual Symposium on Foundations of Computer Science - FOCS '89, 248-253. IEEE, Reseach Triangle Park, NC, USA.
-
(1989)
Proceedings of the 30th Annual Symposium on Foundations of Computer Science - FOCS '89
, pp. 248-253
-
-
IMPAGLIAZZO, R.1
ZUCKERMAN, D.2
-
30
-
-
21344479121
-
Cryptanalysis of another knapsack cryptosystem
-
Advances in Cryptology, Proceedings Asiacrypt 1991, H. IMAI, R. L. RIVEST & T. MATSUMOTO, editors, of, Springer-Verlag
-
A. JOUX & J. STERN (1993). Cryptanalysis of another knapsack cryptosystem. In Advances in Cryptology - Proceedings Asiacrypt 1991, H. IMAI, R. L. RIVEST & T. MATSUMOTO, editors, volume 739 of Lecture Notes in Computer Science, 470-476. Springer-Verlag.
-
(1993)
Lecture Notes in Computer Science
, vol.739
, pp. 470-476
-
-
JOUX, A.1
STERN, J.2
-
31
-
-
0001134554
-
Lattice reduction: A toolbox for the cryptanalyst
-
A. JOUX & J. STERN (1998). Lattice reduction: A toolbox for the cryptanalyst. Journal of Cryptology 11(3), 161-185.
-
(1998)
Journal of Cryptology
, vol.11
, Issue.3
, pp. 161-185
-
-
JOUX, A.1
STERN, J.2
-
32
-
-
0003037529
-
Reducibility among combinatorial problems
-
R. E. MILLER & J. W. THATCHER, editors, Plenum
-
R. M. KARP (1972). Reducibility among combinatorial problems. In Complexity of Computer Computation, R. E. MILLER & J. W. THATCHER, editors, 85-103. Plenum.
-
(1972)
Complexity of Computer Computation
, pp. 85-103
-
-
KARP, R.M.1
-
33
-
-
27344453570
-
Hardness of approximating the shortest vector problem in lattices
-
Preliminary version in FOCS
-
S. KHOT (2005). Hardness of approximating the shortest vector problem in lattices. Journal of the ACM 52(5), 789-808. Preliminary version in FOCS 2004.
-
(2004)
Journal of the ACM
, vol.52
, Issue.5
, pp. 789-808
-
-
KHOT, S.1
-
34
-
-
0021936756
-
Solving low-density subset sum problems
-
J. C. LAGARIAS & A. M. ODLYZKO (1985). Solving low-density subset sum problems. Journal of the ACM 32(1), 229-246.
-
(1985)
Journal of the ACM
, vol.32
, Issue.1
, pp. 229-246
-
-
LAGARIAS, J.C.1
ODLYZKO, A.M.2
-
37
-
-
0029219476
-
A new public-key cipher system based upon the Diophantine equations
-
C. H. LIN, C. C. CHANG & R. C. T. LEE (1995). A new public-key cipher system based upon the Diophantine equations. IEEE Transactions on Computers 44(1), 13-19.
-
(1995)
IEEE Transactions on Computers
, vol.44
, Issue.1
, pp. 13-19
-
-
LIN, C.H.1
CHANG, C.C.2
LEE, R.C.T.3
-
38
-
-
26944487960
-
The parity problem in the presence of noise, decoding random linear codes, and the subsetsum problem
-
APPROX-RANDOM 2005, C. CHEKURJ, K. JANSEN, D. P. JOSÉ ROLIM & L. TREVISAN, editors, of, Springer, Berkeley, CA, USA
-
V. LYUBASHEVSKY (2005). The parity problem in the presence of noise, decoding random linear codes, and the subsetsum problem. In APPROX-RANDOM 2005, C. CHEKURJ, K. JANSEN, D. P. JOSÉ ROLIM & L. TREVISAN, editors, volume 3624 of Lecture Notes in Computer Science, 378-389. Springer, Berkeley, CA, USA.
-
(2005)
Lecture Notes in Computer Science
, vol.3624
, pp. 378-389
-
-
LYUBASHEVSKY, V.1
-
39
-
-
33746342484
-
Generalized compact knapsacks are collision resistant
-
Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, ICALP 2006, I. WEGENER, V. SASSONE & B. PRENEEL, editors, of, SpringerVerlag, Venice, Italy
-
V. LYUBASHEVSKY & D. MICCIANCIO (2006). Generalized compact knapsacks are collision resistant. In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming - ICALP 2006, I. WEGENER, V. SASSONE & B. PRENEEL, editors, volume 4052 of Lecture Notes in Computer Science, 144-155. SpringerVerlag, Venice, Italy.
-
(2006)
Lecture Notes in Computer Science
, vol.4052
, pp. 144-155
-
-
LYUBASHEVSKY, V.1
MICCIANCIO, D.2
-
40
-
-
84958959970
-
Dimension reduction methods for convolution modular lattices
-
Cryptography and Lattices Conference, CaLC 2001, J. SILVERMAN, editor, of, Springer-Verlag, Providence, RI, USA
-
A. MAY & J. H. SILVERMAN (2001). Dimension reduction methods for convolution modular lattices. In Cryptography and Lattices Conference - CaLC 2001, J. SILVERMAN, editor, volume 2146 of Lecture Notes in Computer Science, 110-125. Springer-Verlag, Providence, RI, USA.
-
(2001)
Lecture Notes in Computer Science
, vol.2146
, pp. 110-125
-
-
MAY, A.1
SILVERMAN, J.H.2
-
42
-
-
0035271103
-
The hardness of the closest vector problem with preprocessing
-
D. MICCIANCIO (2001a). The hardness of the closest vector problem with preprocessing. IEEE Transactions on Information Theory 47(3), 1212-1215.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.3
, pp. 1212-1215
-
-
MICCIANCIO, D.1
-
43
-
-
84958950822
-
Improving lattice based cryptosystems using the Hermite normal form
-
Cryptography and Lattices Conference, CaLC 2001, J. SILVERMAN, editor, of, Springer-Verlag, Providence, RI, USA
-
D. MICCIANCIO (2001b). Improving lattice based cryptosystems using the Hermite normal form. In Cryptography and Lattices Conference - CaLC 2001, J. SILVERMAN, editor, volume 2146 of Lecture Notes in Computer Science, 126-145. Springer-Verlag, Providence, RI, USA.
-
(2001)
Lecture Notes in Computer Science
, vol.2146
, pp. 126-145
-
-
MICCIANCIO, D.1
-
44
-
-
0035707359
-
The shortest vector problem is NP-hard to approximate to within some constant
-
Preliminary version in FOCS
-
D. MICCIANCIO (2001c). The shortest vector problem is NP-hard to approximate to within some constant. SIAM Journal on Computing 30(6), 2008-2035. Preliminary version in FOCS 1998.
-
(1998)
SIAM Journal on Computing
, vol.30
, Issue.6
, pp. 2008-2035
-
-
MICCIANCIO, D.1
-
45
-
-
0036949107
-
Generalized compact knapsaks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions
-
IEEE, Vancouver, British Columbia, Canada
-
D. MICCIANCIO (2002a). Generalized compact knapsaks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions. In Proceedings of the 43rd Annual Symposium on Foundations of Computer Science - FOCS 2002, 356-365. IEEE, Vancouver, British Columbia, Canada.
-
(2002)
Proceedings of the 43rd Annual Symposium on Foundations of Computer Science - FOCS 2002
, pp. 356-365
-
-
MICCIANCIO, D.1
-
46
-
-
0037634586
-
A note on the minimal volume of almost cubic parallelepiped
-
D. MICCIANCIO (2002b). A note on the minimal volume of almost cubic parallelepiped. Discrete and Computational Geometry 29(1), 133-138.
-
(2002)
Discrete and Computational Geometry
, vol.29
, Issue.1
, pp. 133-138
-
-
MICCIANCIO, D.1
-
47
-
-
16244401113
-
Almost perfect lattices, the covering radius problem, and applications to Ajtai's connection factor
-
Preliminary version in STOC
-
D. MICCIANCIO (2004). Almost perfect lattices, the covering radius problem, and applications to Ajtai's connection factor. SIAM Journal on Computing 34(1), 118-169. Preliminary version in STOC 2002.
-
(2002)
SIAM Journal on Computing
, vol.34
, Issue.1
, pp. 118-169
-
-
MICCIANCIO, D.1
-
49
-
-
38749097694
-
Worst-case to average-case reductions based on Gaussian measure
-
Preliminary version in FOCS
-
D. MICCIANCIO & O. REGEV (2007). Worst-case to average-case reductions based on Gaussian measure. SIAM Journal on Computing 37(1), 267-302. Preliminary version in FOCS 2004.
-
(2004)
SIAM Journal on Computing
, vol.37
, Issue.1
, pp. 267-302
-
-
MICCIANCIO, D.1
REGEV, O.2
-
50
-
-
0001448484
-
Bit commitment using pseudorandomness
-
Preliminary version in CRYPTO
-
M. NAOR (1991). Bit commitment using pseudorandomness. Journal of Cryptology 4(2), 151-158. Preliminary version in CRYPTO 1989.
-
(1989)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 151-158
-
-
NAOR, M.1
-
51
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
ACM, Seattle, Washington, USA
-
M. NAOR & M. YUNG (1989). Universal one-way hash functions and their cryptographic applications. In Proceedings of the Twenty-first Annual ACM Symposium on the Theory of Computing - STOC '89, 33-43. ACM, Seattle, Washington, USA.
-
(1989)
Proceedings of the Twenty-first Annual ACM Symposium on the Theory of Computing - STOC '89
, pp. 33-43
-
-
NAOR, M.1
YUNG, M.2
-
52
-
-
84958613113
-
Merkle-Hellman revisited: A cryptanalysis of the Qu-Vanstone cryptosystem based on group factorizations
-
Advances in Cryptology, CRYPTO '97, Proceedings of the 17th Annual International Cryptology Conference, B. S. KALISKI, JR, editor, of, Springer, Santa Barbara, California, USA
-
P. NGUYEN & J. STERN (1997). Merkle-Hellman revisited: A cryptanalysis of the Qu-Vanstone cryptosystem based on group factorizations. In Advances in Cryptology - CRYPTO '97, Proceedings of the 17th Annual International Cryptology Conference, B. S. KALISKI, JR,., editor, volume 1294 of Lecture Notes in Computer Science, 198-212. Springer, Santa Barbara, California, USA.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 198-212
-
-
NGUYEN, P.1
STERN, J.2
-
53
-
-
84957660976
-
Cryptanalysis of the Ajtai-Dwork cryptosystem
-
Advances in Cryptology, CRYPTO '98, Proceedings of the 18th Annual International Cryptology Conference, H. KRAWCZYK, editor, of, Springer-Verlag, Santa Barbara, California, USA
-
P. NGUYEN & J. STERN (1998). Cryptanalysis of the Ajtai-Dwork cryptosystem. In Advances in Cryptology - CRYPTO '98, Proceedings of the 18th Annual International Cryptology Conference, H. KRAWCZYK, editor, volume 1462 of Lecture Notes in Computer Science, 223-242. Springer-Verlag, Santa Barbara, California, USA.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 223-242
-
-
NGUYEN, P.1
STERN, J.2
-
54
-
-
33846870481
-
Lattice reduction in cryptology: An update
-
Algorithmic Number Theory: 4th International Symposium, ANTS-IV, W. BOSMA, editor, of, Springer, Leiden, The Netherlands
-
P. NGUYEN & J. STERN (2000). Lattice reduction in cryptology: An update. In Algorithmic Number Theory: 4th International Symposium - ANTS-IV, W. BOSMA, editor, volume 1838 of Lecture Notes in Computer Science, 85-112. Springer, Leiden, The Netherlands.
-
(2000)
Lecture Notes in Computer Science
, vol.1838
, pp. 85-112
-
-
NGUYEN, P.1
STERN, J.2
-
55
-
-
33846867921
-
The two faces of lattices in cryptology
-
Cryptography and Lattices Conference, CaLC 2001, J. SILVERMAN, editor, of, Springer-Verlag, Providence, RI, USA
-
P. NGUYEN & J. STERN (2001). The two faces of lattices in cryptology. In Cryptography and Lattices Conference - CaLC 2001, J. SILVERMAN, editor, volume 2146 of Lecture Notes in Computer Science, 146-180. Springer-Verlag, Providence, RI, USA.
-
(2001)
Lecture Notes in Computer Science
, vol.2146
, pp. 146-180
-
-
NGUYEN, P.1
STERN, J.2
-
56
-
-
38749105374
-
-
A. M. ODLYZKO (1989). The rise and fall of knapsack cryptosystems. In Cryptology and Computational Number Theory, C. POMERANCE, editor, 42 of Procedings of Symposia in Applied Mathematics, 75-88. AMS, Boulder, Colorado.
-
A. M. ODLYZKO (1989). The rise and fall of knapsack cryptosystems. In Cryptology and Computational Number Theory, C. POMERANCE, editor, volume 42 of Procedings of Symposia in Applied Mathematics, 75-88. AMS, Boulder, Colorado.
-
-
-
-
57
-
-
0012619683
-
A multiple-iterated trapdoor for dense compact knapsacks
-
Advances in Cryptology, EUROCRYPT '94, Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques, A. DE SANTIS, editor, of, Springer-Verlag, Perugia, Italy
-
G. ORTON (1994). A multiple-iterated trapdoor for dense compact knapsacks. In Advances in Cryptology - EUROCRYPT '94, Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques, A. DE SANTIS, editor, volume 950 of Lecture Notes in Computer Science, 112-130. Springer-Verlag, Perugia, Italy.
-
(1994)
Lecture Notes in Computer Science
, vol.950
, pp. 112-130
-
-
ORTON, G.1
-
58
-
-
33745559478
-
Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices
-
Theory of Cryptography Conference, Proceedings of TCC, S. HALEVI & T. RABIN, editors, of, Springer, New York, NY, USA
-
C. PEIKERT& A. ROSEN (2006). Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In Theory of Cryptography Conference - Proceedings of TCC 2006, S. HALEVI & T. RABIN, editors, volume 3876 of Lecture Notes in Computer Science, 145-166. Springer, New York, NY, USA.
-
(2006)
Lecture Notes in Computer Science
, vol.3876
, pp. 145-166
-
-
PEIKERT, C.1
ROSEN, A.2
-
59
-
-
4544250860
-
Improved inapproximability of lattice and coding problems with preprocessing
-
Preliminary version in CCC
-
O. REGEV (2004a). Improved inapproximability of lattice and coding problems with preprocessing. IEEE Transactions on Information Theory 50(9), 2031-2037. Preliminary version in CCC 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.50
, Issue.9
, pp. 2031-2037
-
-
REGEV, O.1
-
60
-
-
20444451186
-
New lattice-based cryptographic constructions
-
Preliminary version in STOC
-
O. REGEV (2004b). New lattice-based cryptographic constructions. Journal of the ACM 51(6), 899-942. Preliminary version in STOC 2003.
-
(2003)
Journal of the ACM
, vol.51
, Issue.6
, pp. 899-942
-
-
REGEV, O.1
-
63
-
-
0023532388
-
-
C.-P. SCHNOR.R. (1987). A hierarchy of polynomial time lattice basis reduction algorithms. Theoretical Computer Science 53(2-3), 201-224.
-
C.-P. SCHNOR.R. (1987). A hierarchy of polynomial time lattice basis reduction algorithms. Theoretical Computer Science 53(2-3), 201-224.
-
-
-
-
64
-
-
33846200465
-
Lattice basis reduction: Improved practical algorithms and solving subset sum problems
-
Preliminary version in FCT
-
C.-P. SCHNORR. & M. EUCHNER (1994). Lattice basis reduction: Improved practical algorithms and solving subset sum problems. Mathematical Programming 66(1-3), 181-199. Preliminary version in FCT 1991.
-
(1991)
Mathematical Programming
, vol.66
, Issue.1-3
, pp. 181-199
-
-
SCHNORR, C.-P.1
EUCHNER, M.2
-
65
-
-
0009452048
-
Attacking the Chor-Rivest cryptosystem by improved lattice reduction
-
Advances in Cryptology, EUROCRYPT '95, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, L. C. GUILLOU & J.-J. QUISQUATER, editors, of, Springer-Verlag, Saint-Malo, France
-
C.-P. SCHNORR & H. H. HÖRNER (1995). Attacking the Chor-Rivest cryptosystem by improved lattice reduction. In Advances in Cryptology - EUROCRYPT '95, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, L. C. GUILLOU & J.-J. QUISQUATER., editors, volume 921 of Lecture Notes in Computer Science, 1-12. Springer-Verlag, Saint-Malo, France.
-
(1995)
Lecture Notes in Computer Science
, vol.921
, pp. 1-12
-
-
SCHNORR, C.-P.1
HÖRNER, H.H.2
-
66
-
-
0021484340
-
A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem
-
Preliminary version in FOCS
-
A. SHAMIR. (1984). A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem. IEEE Transactions on Information Theory 30(5), 699-704. Preliminary version in FOCS 1982.
-
(1982)
IEEE Transactions on Information Theory
, vol.30
, Issue.5
, pp. 699-704
-
-
SHAMIR, A.1
-
67
-
-
33746070284
-
Hypercubic lattice reduction and analysis of GGH and NTRU signatures
-
Advances in Cryptology, EUROCRYPT 2003, Proceedings of the Internarional Conference on the Theory and Application of Cryptographic Techniques, E. BIHAM, editor, of, Springer-Verlag, Warsaw, Poland
-
M. SZYDLO (2003). Hypercubic lattice reduction and analysis of GGH and NTRU signatures. In Advances in Cryptology - EUROCRYPT 2003, Proceedings of the Internarional Conference on the Theory and Application of Cryptographic Techniques, E. BIHAM, editor, volume 2656 of Lecture Notes in Computer Science, 433-448. Springer-Verlag, Warsaw, Poland.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 433-448
-
-
SZYDLO, M.1
|