메뉴 건너뛰기




Volumn 16, Issue 4, 2007, Pages 365-411

Generalized compact knapsacks, cyclic lattices, and efficient one-way functions

Author keywords

Average case complexity; Cyclic lattices; Knapsack problem; One way functions

Indexed keywords


EID: 38749089099     PISSN: 10163328     EISSN: 14208954     Source Type: Journal    
DOI: 10.1007/s00037-007-0234-9     Document Type: Article
Times cited : (173)

References (67)
  • 1
  • 5
    • 0012619431 scopus 로고
    • Compact knapsacks are polynomially solvable
    • Preliminary version in CRYPTO
    • H. R. AMIRAZIZI, E. D. KARNIN & J. M. REYNERI (1983). Compact knapsacks are polynomially solvable. ACM SIGACT News 15, 20-22. Preliminary version in CRYPTO 1981.
    • (1981) ACM SIGACT News , vol.15 , pp. 20-22
    • AMIRAZIZI, H.R.1    KARNIN, E.D.2    REYNERI, J.M.3
  • 6
    • 0031119485 scopus 로고    scopus 로고
    • S. ARORA, L. BABAI, J. STERN & E. Z. SWEEDYK (1997). The hardness of approximate optima in lattices, codes, and systems of linear equations. Journal of Computer and System Sciences 54(2), 317-331. Preliminary version in FOCS 1993.
    • S. ARORA, L. BABAI, J. STERN & E. Z. SWEEDYK (1997). The hardness of approximate optima in lattices, codes, and systems of linear equations. Journal of Computer and System Sciences 54(2), 317-331. Preliminary version in FOCS 1993.
  • 7
    • 51249173801 scopus 로고
    • On Lovasz' lattice reduction and the nearest lattice point problem
    • Preliminary version in STAGS
    • L. BABAI (1986). On Lovasz' lattice reduction and the nearest lattice point problem. Combinatorica 6(1), 1-13. Preliminary version in STAGS 1985.
    • (1985) Combinatorica , vol.6 , Issue.1 , pp. 1-13
    • BABAI, L.1
  • 9
    • 85034633063 scopus 로고
    • Breaking iterated knapsacks
    • Advances in Cryptology Proceedings of CRYPTO '84, G. R. BLAKLEY & D. CHAUM, editors, of, Springer-Verlag, Santa Barbara, California, USA
    • E. F. BRICKELL (1984). Breaking iterated knapsacks. In Advances in Cryptology Proceedings of CRYPTO '84, G. R. BLAKLEY & D. CHAUM, editors, volume 196 of Lecture Notes in Computer Science, 342-358. Springer-Verlag, Santa Barbara, California, USA.
    • (1984) Lecture Notes in Computer Science , vol.196 , pp. 342-358
    • BRICKELL, E.F.1
  • 11
    • 0024079003 scopus 로고
    • A knapsack-type public key cryptosystem based on arithmetic in finite fields
    • Preliminary version in CRYPTO
    • B. CHOR & R. RIVEST (1988). A knapsack-type public key cryptosystem based on arithmetic in finite fields. IEEE Transactions in Information Theory 34, 901-909. Preliminary version in CRYPTO 1984.
    • (1984) IEEE Transactions in Information Theory , vol.34 , pp. 901-909
    • CHOR, B.1    RIVEST, R.2
  • 12
    • 0000951613 scopus 로고    scopus 로고
    • M. J. COSTER, A. JOUX, B. A. LAMACCHIA, A. M. ODLYZKO, C.-P. SCHNORR & J. STERN (1992). Improved low-density subset sum algorithms. Computational Complexity 2(2), 111-128. Preliminary versions in Eurocrypt 1991 and FCT 1991.
    • M. J. COSTER, A. JOUX, B. A. LAMACCHIA, A. M. ODLYZKO, C.-P. SCHNORR & J. STERN (1992). Improved low-density subset sum algorithms. Computational Complexity 2(2), 111-128. Preliminary versions in Eurocrypt 1991 and FCT 1991.
  • 13
    • 28144437148 scopus 로고
    • Cryptanalysis of a public key system based on Diophantine equations
    • T. W. CUSICK (1995). Cryptanalysis of a public key system based on Diophantine equations. Information Processing Letters 56(2), 73-75.
    • (1995) Information Processing Letters , vol.56 , Issue.2 , pp. 73-75
    • CUSICK, T.W.1
  • 14
    • 33745545274 scopus 로고
    • On the existence of statistically hiding bit commitment schemes and fail-stop signatures
    • Preliminary version in CRYPTO
    • I. DAMGÅRD, T. P. PEDERSEN & B. PFITZMANN (1997). On the existence of statistically hiding bit commitment schemes and fail-stop signatures. Journal of Cryptology 10(3), 163-194. Preliminary version in CRYPTO 1993.
    • (1993) Journal of Cryptology , vol.10 , Issue.3 , pp. 163-194
    • DAMGÅRD, I.1    PEDERSEN, T.P.2    PFITZMANN, B.3
  • 15
    • 0141655066 scopus 로고    scopus 로고
    • Approximating CVP to within almost-polynomial factors is NP-hard
    • Preliminary version in FOCS
    • I. DINUR, G. KINDLER, R. RAZ & S. SAFRA (2003). Approximating CVP to within almost-polynomial factors is NP-hard. Combinatorica 23(2), 205-243. Preliminary version in FOCS 1998.
    • (1998) Combinatorica , vol.23 , Issue.2 , pp. 205-243
    • DINUR, I.1    KINDLER, G.2    RAZ, R.3    SAFRA, S.4
  • 16
    • 38749097309 scopus 로고    scopus 로고
    • P. VAN EMDE BOAS (1981). Another NP-complete problem and the complexity of computing short vectors in a lattice. Technical Report 81-04, Mathematische Instituut, Universiry of Amsterdam. Available on-line at URL http://turing.wins.uva.nl/~peter/.
    • P. VAN EMDE BOAS (1981). Another NP-complete problem and the complexity of computing short vectors in a lattice. Technical Report 81-04, Mathematische Instituut, Universiry of Amsterdam. Available on-line at URL http://turing.wins.uva.nl/~peter/.
  • 17
    • 2942748673 scopus 로고    scopus 로고
    • The inapproximability of lattice and coding problems with preprocessing
    • Preliminary version in CCC
    • U. FEIGE & D. MICCIANCIO (2004). The inapproximability of lattice and coding problems with preprocessing. Journal of Computer and System, Sciences 69(1), 45-67. Preliminary version in CCC 2002.
    • (2002) Journal of Computer and System, Sciences , vol.69 , Issue.1 , pp. 45-67
    • FEIGE, U.1    MICCIANCIO, D.2
  • 18
    • 24144500621 scopus 로고    scopus 로고
    • Solving medium-density subset sum problems in expected polynomial time
    • Proceedings of the 22nd Annual Symposium on Theoretical Aspects of Computer Science, STACS 2005, V. DIEKERT & B. DURAND, editors, of, Springer, Stuttgart, Germany
    • A. FLAXMAN & B. PRZYDATEK (2005). Solving medium-density subset sum problems in expected polynomial time. In Proceedings of the 22nd Annual Symposium on Theoretical Aspects of Computer Science - STACS 2005, V. DIEKERT & B. DURAND, editors, volume 3404 of Lecture Notes in Computer Science, 305-314. Springer, Stuttgart, Germany.
    • (2005) Lecture Notes in Computer Science , vol.3404 , pp. 305-314
    • FLAXMAN, A.1    PRZYDATEK, B.2
  • 19
    • 84947222499 scopus 로고    scopus 로고
    • Cryptanaiysis of the revised NTRU signature scheme
    • Advances in Cryptology, EUROCRYPT 2002, Proceedings of the Internarional Conference on the Theory and Application of Cryptographic Techniques, L. KNUDSEN, editor, of, Springer-Verlag, Amsterdam, The Netherlands
    • C. GENTRY & M. SZYDLO (2002). Cryptanaiysis of the revised NTRU signature scheme. In Advances in Cryptology - EUROCRYPT 2002, Proceedings of the Internarional Conference on the Theory and Application of Cryptographic Techniques, L. KNUDSEN, editor, volume 2332 of Lecture Notes in Computer Science, 299-320. Springer-Verlag, Amsterdam, The Netherlands.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 299-320
    • GENTRY, C.1    SZYDLO, M.2
  • 20
    • 38749100890 scopus 로고    scopus 로고
    • O. GOLDREICH, S. GOLDWASSER & S. HALEVI (1996). Collision-free hashing from lattice problems. Technical Report TR96-056, Electronic Colloquium on Computational Complexity (ECCC).
    • O. GOLDREICH, S. GOLDWASSER & S. HALEVI (1996). Collision-free hashing from lattice problems. Technical Report TR96-056, Electronic Colloquium on Computational Complexity (ECCC).
  • 23
    • 85014381599 scopus 로고
    • A new trapdoor knapsack public-key cryptosystem
    • Advances in Cryptology, EUROCRYPT '84, Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques, T. BETH, N. COT & I. INGEMARSSON, editors, of, Springer-Verlag, Paris, France
    • R. M. F. GOODMAN & A. J. MCAULEY (1984). A new trapdoor knapsack public-key cryptosystem. In Advances in Cryptology - EUROCRYPT '84, Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques, T. BETH, N. COT & I. INGEMARSSON, editors, volume 209 of Lecture Notes in Computer Science, 150-158. Springer-Verlag, Paris, France.
    • (1984) Lecture Notes in Computer Science , vol.209 , pp. 150-158
    • GOODMAN, R.M.F.1    MCAULEY, A.J.2
  • 24
    • 23744485134 scopus 로고    scopus 로고
    • Maximum-likelihood decoding of Reed-Solomon codes is NP-hard
    • Preliminary version in SODA
    • V. GURUSWAMI & A. VARDY (2005). Maximum-likelihood decoding of Reed-Solomon codes is NP-hard. IEEE Trunsactions on Information Theory 51(7), 2249-2256. Preliminary version in SODA 2005.
    • (2005) IEEE Trunsactions on Information Theory , vol.51 , Issue.7 , pp. 2249-2256
    • GURUSWAMI, V.1    VARDY, A.2
  • 26
    • 84947808606 scopus 로고    scopus 로고
    • NTRU: A ring based public key cryptosystem
    • Algorithmic Number Theory: Third International Symposium, ANTS-III, J. P. BUHLER, editor, of, Springer, Portland, OR, USA
    • J. HOFFSTEIN, J. PLPHER & J. H. SILVERMAN (1998). NTRU: A ring based public key cryptosystem. In Algorithmic Number Theory: Third International Symposium - ANTS-III, J. P. BUHLER, editor, volume 1423 of Lecture Notes in Computer Science, 267-288. Springer, Portland, OR, USA.
    • (1998) Lecture Notes in Computer Science , vol.1423 , pp. 267-288
    • HOFFSTEIN, J.1    PLPHER, J.2    SILVERMAN, J.H.3
  • 27
    • 35048825270 scopus 로고    scopus 로고
    • A method to solve cyclotomic norm equations
    • Algorithmic Number Theory: 6th International Symposium, ANTS-VI, D. A. BUELL, editor, of, Springer, Burlington, VT, USA
    • N. HOWGRAVE-GRAHAM & M. SZYDLO (2004). A method to solve cyclotomic norm equations. In Algorithmic Number Theory: 6th International Symposium - ANTS-VI, D. A. BUELL, editor, volume 3076 of Lecture Notes in Computer Science, 272-279. Springer, Burlington, VT, USA.
    • (2004) Lecture Notes in Computer Science , vol.3076 , pp. 272-279
    • HOWGRAVE-GRAHAM, N.1    SZYDLO, M.2
  • 28
    • 0001143795 scopus 로고    scopus 로고
    • Efficient cryptographic schemes provably as secure as subset sum
    • R. IMPAGLIAZZO & M. NAOR (1996). Efficient cryptographic schemes provably as secure as subset sum. Journal of Cryptology 9(4), 199-216.
    • (1996) Journal of Cryptology , vol.9 , Issue.4 , pp. 199-216
    • IMPAGLIAZZO, R.1    NAOR, M.2
  • 30
    • 21344479121 scopus 로고
    • Cryptanalysis of another knapsack cryptosystem
    • Advances in Cryptology, Proceedings Asiacrypt 1991, H. IMAI, R. L. RIVEST & T. MATSUMOTO, editors, of, Springer-Verlag
    • A. JOUX & J. STERN (1993). Cryptanalysis of another knapsack cryptosystem. In Advances in Cryptology - Proceedings Asiacrypt 1991, H. IMAI, R. L. RIVEST & T. MATSUMOTO, editors, volume 739 of Lecture Notes in Computer Science, 470-476. Springer-Verlag.
    • (1993) Lecture Notes in Computer Science , vol.739 , pp. 470-476
    • JOUX, A.1    STERN, J.2
  • 31
    • 0001134554 scopus 로고    scopus 로고
    • Lattice reduction: A toolbox for the cryptanalyst
    • A. JOUX & J. STERN (1998). Lattice reduction: A toolbox for the cryptanalyst. Journal of Cryptology 11(3), 161-185.
    • (1998) Journal of Cryptology , vol.11 , Issue.3 , pp. 161-185
    • JOUX, A.1    STERN, J.2
  • 32
    • 0003037529 scopus 로고
    • Reducibility among combinatorial problems
    • R. E. MILLER & J. W. THATCHER, editors, Plenum
    • R. M. KARP (1972). Reducibility among combinatorial problems. In Complexity of Computer Computation, R. E. MILLER & J. W. THATCHER, editors, 85-103. Plenum.
    • (1972) Complexity of Computer Computation , pp. 85-103
    • KARP, R.M.1
  • 33
    • 27344453570 scopus 로고    scopus 로고
    • Hardness of approximating the shortest vector problem in lattices
    • Preliminary version in FOCS
    • S. KHOT (2005). Hardness of approximating the shortest vector problem in lattices. Journal of the ACM 52(5), 789-808. Preliminary version in FOCS 2004.
    • (2004) Journal of the ACM , vol.52 , Issue.5 , pp. 789-808
    • KHOT, S.1
  • 34
    • 0021936756 scopus 로고
    • Solving low-density subset sum problems
    • J. C. LAGARIAS & A. M. ODLYZKO (1985). Solving low-density subset sum problems. Journal of the ACM 32(1), 229-246.
    • (1985) Journal of the ACM , vol.32 , Issue.1 , pp. 229-246
    • LAGARIAS, J.C.1    ODLYZKO, A.M.2
  • 35
  • 37
    • 0029219476 scopus 로고
    • A new public-key cipher system based upon the Diophantine equations
    • C. H. LIN, C. C. CHANG & R. C. T. LEE (1995). A new public-key cipher system based upon the Diophantine equations. IEEE Transactions on Computers 44(1), 13-19.
    • (1995) IEEE Transactions on Computers , vol.44 , Issue.1 , pp. 13-19
    • LIN, C.H.1    CHANG, C.C.2    LEE, R.C.T.3
  • 38
    • 26944487960 scopus 로고    scopus 로고
    • The parity problem in the presence of noise, decoding random linear codes, and the subsetsum problem
    • APPROX-RANDOM 2005, C. CHEKURJ, K. JANSEN, D. P. JOSÉ ROLIM & L. TREVISAN, editors, of, Springer, Berkeley, CA, USA
    • V. LYUBASHEVSKY (2005). The parity problem in the presence of noise, decoding random linear codes, and the subsetsum problem. In APPROX-RANDOM 2005, C. CHEKURJ, K. JANSEN, D. P. JOSÉ ROLIM & L. TREVISAN, editors, volume 3624 of Lecture Notes in Computer Science, 378-389. Springer, Berkeley, CA, USA.
    • (2005) Lecture Notes in Computer Science , vol.3624 , pp. 378-389
    • LYUBASHEVSKY, V.1
  • 39
    • 33746342484 scopus 로고    scopus 로고
    • Generalized compact knapsacks are collision resistant
    • Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, ICALP 2006, I. WEGENER, V. SASSONE & B. PRENEEL, editors, of, SpringerVerlag, Venice, Italy
    • V. LYUBASHEVSKY & D. MICCIANCIO (2006). Generalized compact knapsacks are collision resistant. In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming - ICALP 2006, I. WEGENER, V. SASSONE & B. PRENEEL, editors, volume 4052 of Lecture Notes in Computer Science, 144-155. SpringerVerlag, Venice, Italy.
    • (2006) Lecture Notes in Computer Science , vol.4052 , pp. 144-155
    • LYUBASHEVSKY, V.1    MICCIANCIO, D.2
  • 40
    • 84958959970 scopus 로고    scopus 로고
    • Dimension reduction methods for convolution modular lattices
    • Cryptography and Lattices Conference, CaLC 2001, J. SILVERMAN, editor, of, Springer-Verlag, Providence, RI, USA
    • A. MAY & J. H. SILVERMAN (2001). Dimension reduction methods for convolution modular lattices. In Cryptography and Lattices Conference - CaLC 2001, J. SILVERMAN, editor, volume 2146 of Lecture Notes in Computer Science, 110-125. Springer-Verlag, Providence, RI, USA.
    • (2001) Lecture Notes in Computer Science , vol.2146 , pp. 110-125
    • MAY, A.1    SILVERMAN, J.H.2
  • 41
  • 42
    • 0035271103 scopus 로고    scopus 로고
    • The hardness of the closest vector problem with preprocessing
    • D. MICCIANCIO (2001a). The hardness of the closest vector problem with preprocessing. IEEE Transactions on Information Theory 47(3), 1212-1215.
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.3 , pp. 1212-1215
    • MICCIANCIO, D.1
  • 43
    • 84958950822 scopus 로고    scopus 로고
    • Improving lattice based cryptosystems using the Hermite normal form
    • Cryptography and Lattices Conference, CaLC 2001, J. SILVERMAN, editor, of, Springer-Verlag, Providence, RI, USA
    • D. MICCIANCIO (2001b). Improving lattice based cryptosystems using the Hermite normal form. In Cryptography and Lattices Conference - CaLC 2001, J. SILVERMAN, editor, volume 2146 of Lecture Notes in Computer Science, 126-145. Springer-Verlag, Providence, RI, USA.
    • (2001) Lecture Notes in Computer Science , vol.2146 , pp. 126-145
    • MICCIANCIO, D.1
  • 44
    • 0035707359 scopus 로고    scopus 로고
    • The shortest vector problem is NP-hard to approximate to within some constant
    • Preliminary version in FOCS
    • D. MICCIANCIO (2001c). The shortest vector problem is NP-hard to approximate to within some constant. SIAM Journal on Computing 30(6), 2008-2035. Preliminary version in FOCS 1998.
    • (1998) SIAM Journal on Computing , vol.30 , Issue.6 , pp. 2008-2035
    • MICCIANCIO, D.1
  • 45
    • 0036949107 scopus 로고    scopus 로고
    • Generalized compact knapsaks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions
    • IEEE, Vancouver, British Columbia, Canada
    • D. MICCIANCIO (2002a). Generalized compact knapsaks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions. In Proceedings of the 43rd Annual Symposium on Foundations of Computer Science - FOCS 2002, 356-365. IEEE, Vancouver, British Columbia, Canada.
    • (2002) Proceedings of the 43rd Annual Symposium on Foundations of Computer Science - FOCS 2002 , pp. 356-365
    • MICCIANCIO, D.1
  • 46
    • 0037634586 scopus 로고    scopus 로고
    • A note on the minimal volume of almost cubic parallelepiped
    • D. MICCIANCIO (2002b). A note on the minimal volume of almost cubic parallelepiped. Discrete and Computational Geometry 29(1), 133-138.
    • (2002) Discrete and Computational Geometry , vol.29 , Issue.1 , pp. 133-138
    • MICCIANCIO, D.1
  • 47
    • 16244401113 scopus 로고    scopus 로고
    • Almost perfect lattices, the covering radius problem, and applications to Ajtai's connection factor
    • Preliminary version in STOC
    • D. MICCIANCIO (2004). Almost perfect lattices, the covering radius problem, and applications to Ajtai's connection factor. SIAM Journal on Computing 34(1), 118-169. Preliminary version in STOC 2002.
    • (2002) SIAM Journal on Computing , vol.34 , Issue.1 , pp. 118-169
    • MICCIANCIO, D.1
  • 49
    • 38749097694 scopus 로고    scopus 로고
    • Worst-case to average-case reductions based on Gaussian measure
    • Preliminary version in FOCS
    • D. MICCIANCIO & O. REGEV (2007). Worst-case to average-case reductions based on Gaussian measure. SIAM Journal on Computing 37(1), 267-302. Preliminary version in FOCS 2004.
    • (2004) SIAM Journal on Computing , vol.37 , Issue.1 , pp. 267-302
    • MICCIANCIO, D.1    REGEV, O.2
  • 50
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • Preliminary version in CRYPTO
    • M. NAOR (1991). Bit commitment using pseudorandomness. Journal of Cryptology 4(2), 151-158. Preliminary version in CRYPTO 1989.
    • (1989) Journal of Cryptology , vol.4 , Issue.2 , pp. 151-158
    • NAOR, M.1
  • 52
    • 84958613113 scopus 로고    scopus 로고
    • Merkle-Hellman revisited: A cryptanalysis of the Qu-Vanstone cryptosystem based on group factorizations
    • Advances in Cryptology, CRYPTO '97, Proceedings of the 17th Annual International Cryptology Conference, B. S. KALISKI, JR, editor, of, Springer, Santa Barbara, California, USA
    • P. NGUYEN & J. STERN (1997). Merkle-Hellman revisited: A cryptanalysis of the Qu-Vanstone cryptosystem based on group factorizations. In Advances in Cryptology - CRYPTO '97, Proceedings of the 17th Annual International Cryptology Conference, B. S. KALISKI, JR,., editor, volume 1294 of Lecture Notes in Computer Science, 198-212. Springer, Santa Barbara, California, USA.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 198-212
    • NGUYEN, P.1    STERN, J.2
  • 53
    • 84957660976 scopus 로고    scopus 로고
    • Cryptanalysis of the Ajtai-Dwork cryptosystem
    • Advances in Cryptology, CRYPTO '98, Proceedings of the 18th Annual International Cryptology Conference, H. KRAWCZYK, editor, of, Springer-Verlag, Santa Barbara, California, USA
    • P. NGUYEN & J. STERN (1998). Cryptanalysis of the Ajtai-Dwork cryptosystem. In Advances in Cryptology - CRYPTO '98, Proceedings of the 18th Annual International Cryptology Conference, H. KRAWCZYK, editor, volume 1462 of Lecture Notes in Computer Science, 223-242. Springer-Verlag, Santa Barbara, California, USA.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 223-242
    • NGUYEN, P.1    STERN, J.2
  • 54
    • 33846870481 scopus 로고    scopus 로고
    • Lattice reduction in cryptology: An update
    • Algorithmic Number Theory: 4th International Symposium, ANTS-IV, W. BOSMA, editor, of, Springer, Leiden, The Netherlands
    • P. NGUYEN & J. STERN (2000). Lattice reduction in cryptology: An update. In Algorithmic Number Theory: 4th International Symposium - ANTS-IV, W. BOSMA, editor, volume 1838 of Lecture Notes in Computer Science, 85-112. Springer, Leiden, The Netherlands.
    • (2000) Lecture Notes in Computer Science , vol.1838 , pp. 85-112
    • NGUYEN, P.1    STERN, J.2
  • 55
    • 33846867921 scopus 로고    scopus 로고
    • The two faces of lattices in cryptology
    • Cryptography and Lattices Conference, CaLC 2001, J. SILVERMAN, editor, of, Springer-Verlag, Providence, RI, USA
    • P. NGUYEN & J. STERN (2001). The two faces of lattices in cryptology. In Cryptography and Lattices Conference - CaLC 2001, J. SILVERMAN, editor, volume 2146 of Lecture Notes in Computer Science, 146-180. Springer-Verlag, Providence, RI, USA.
    • (2001) Lecture Notes in Computer Science , vol.2146 , pp. 146-180
    • NGUYEN, P.1    STERN, J.2
  • 56
    • 38749105374 scopus 로고    scopus 로고
    • A. M. ODLYZKO (1989). The rise and fall of knapsack cryptosystems. In Cryptology and Computational Number Theory, C. POMERANCE, editor, 42 of Procedings of Symposia in Applied Mathematics, 75-88. AMS, Boulder, Colorado.
    • A. M. ODLYZKO (1989). The rise and fall of knapsack cryptosystems. In Cryptology and Computational Number Theory, C. POMERANCE, editor, volume 42 of Procedings of Symposia in Applied Mathematics, 75-88. AMS, Boulder, Colorado.
  • 57
    • 0012619683 scopus 로고
    • A multiple-iterated trapdoor for dense compact knapsacks
    • Advances in Cryptology, EUROCRYPT '94, Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques, A. DE SANTIS, editor, of, Springer-Verlag, Perugia, Italy
    • G. ORTON (1994). A multiple-iterated trapdoor for dense compact knapsacks. In Advances in Cryptology - EUROCRYPT '94, Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques, A. DE SANTIS, editor, volume 950 of Lecture Notes in Computer Science, 112-130. Springer-Verlag, Perugia, Italy.
    • (1994) Lecture Notes in Computer Science , vol.950 , pp. 112-130
    • ORTON, G.1
  • 58
    • 33745559478 scopus 로고    scopus 로고
    • Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices
    • Theory of Cryptography Conference, Proceedings of TCC, S. HALEVI & T. RABIN, editors, of, Springer, New York, NY, USA
    • C. PEIKERT& A. ROSEN (2006). Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In Theory of Cryptography Conference - Proceedings of TCC 2006, S. HALEVI & T. RABIN, editors, volume 3876 of Lecture Notes in Computer Science, 145-166. Springer, New York, NY, USA.
    • (2006) Lecture Notes in Computer Science , vol.3876 , pp. 145-166
    • PEIKERT, C.1    ROSEN, A.2
  • 59
    • 4544250860 scopus 로고    scopus 로고
    • Improved inapproximability of lattice and coding problems with preprocessing
    • Preliminary version in CCC
    • O. REGEV (2004a). Improved inapproximability of lattice and coding problems with preprocessing. IEEE Transactions on Information Theory 50(9), 2031-2037. Preliminary version in CCC 2003.
    • (2003) IEEE Transactions on Information Theory , vol.50 , Issue.9 , pp. 2031-2037
    • REGEV, O.1
  • 60
    • 20444451186 scopus 로고    scopus 로고
    • New lattice-based cryptographic constructions
    • Preliminary version in STOC
    • O. REGEV (2004b). New lattice-based cryptographic constructions. Journal of the ACM 51(6), 899-942. Preliminary version in STOC 2003.
    • (2003) Journal of the ACM , vol.51 , Issue.6 , pp. 899-942
    • REGEV, O.1
  • 63
    • 0023532388 scopus 로고    scopus 로고
    • C.-P. SCHNOR.R. (1987). A hierarchy of polynomial time lattice basis reduction algorithms. Theoretical Computer Science 53(2-3), 201-224.
    • C.-P. SCHNOR.R. (1987). A hierarchy of polynomial time lattice basis reduction algorithms. Theoretical Computer Science 53(2-3), 201-224.
  • 64
    • 33846200465 scopus 로고
    • Lattice basis reduction: Improved practical algorithms and solving subset sum problems
    • Preliminary version in FCT
    • C.-P. SCHNORR. & M. EUCHNER (1994). Lattice basis reduction: Improved practical algorithms and solving subset sum problems. Mathematical Programming 66(1-3), 181-199. Preliminary version in FCT 1991.
    • (1991) Mathematical Programming , vol.66 , Issue.1-3 , pp. 181-199
    • SCHNORR, C.-P.1    EUCHNER, M.2
  • 65
    • 0009452048 scopus 로고
    • Attacking the Chor-Rivest cryptosystem by improved lattice reduction
    • Advances in Cryptology, EUROCRYPT '95, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, L. C. GUILLOU & J.-J. QUISQUATER, editors, of, Springer-Verlag, Saint-Malo, France
    • C.-P. SCHNORR & H. H. HÖRNER (1995). Attacking the Chor-Rivest cryptosystem by improved lattice reduction. In Advances in Cryptology - EUROCRYPT '95, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, L. C. GUILLOU & J.-J. QUISQUATER., editors, volume 921 of Lecture Notes in Computer Science, 1-12. Springer-Verlag, Saint-Malo, France.
    • (1995) Lecture Notes in Computer Science , vol.921 , pp. 1-12
    • SCHNORR, C.-P.1    HÖRNER, H.H.2
  • 66
    • 0021484340 scopus 로고
    • A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem
    • Preliminary version in FOCS
    • A. SHAMIR. (1984). A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem. IEEE Transactions on Information Theory 30(5), 699-704. Preliminary version in FOCS 1982.
    • (1982) IEEE Transactions on Information Theory , vol.30 , Issue.5 , pp. 699-704
    • SHAMIR, A.1
  • 67
    • 33746070284 scopus 로고    scopus 로고
    • Hypercubic lattice reduction and analysis of GGH and NTRU signatures
    • Advances in Cryptology, EUROCRYPT 2003, Proceedings of the Internarional Conference on the Theory and Application of Cryptographic Techniques, E. BIHAM, editor, of, Springer-Verlag, Warsaw, Poland
    • M. SZYDLO (2003). Hypercubic lattice reduction and analysis of GGH and NTRU signatures. In Advances in Cryptology - EUROCRYPT 2003, Proceedings of the Internarional Conference on the Theory and Application of Cryptographic Techniques, E. BIHAM, editor, volume 2656 of Lecture Notes in Computer Science, 433-448. Springer-Verlag, Warsaw, Poland.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 433-448
    • SZYDLO, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.