-
1
-
-
0029719917
-
Generating hard instances of lattice problems
-
Ajtai, M.: Generating hard instances of lattice problems. In: STOC, pp. 99-108 (1996)
-
(1996)
STOC
, pp. 99-108
-
-
Ajtai, M.1
-
2
-
-
0031644084
-
2 is NP-hard for randomized reductions
-
2 is NP-hard for randomized reductions. In: STOC, pp. 10-19 (1998)
-
(1998)
STOC
, pp. 10-19
-
-
Ajtai, M.1
-
3
-
-
0030679849
-
-
Ajtai, M., Dwork, C.: A. public-key cryptosystem with worst-case/average-case equivalence. In: STOC, pp. 284-293 (1997)
-
Ajtai, M., Dwork, C.: A. public-key cryptosystem with worst-case/average-case equivalence. In: STOC, pp. 284-293 (1997)
-
-
-
-
4
-
-
0034826416
-
-
Ajtai, M., Kumar, R., Sivakumar, D.: A sieve algorithm for the shortest lattice vector problem, In: STOC, pp. 601-610 (2001)
-
Ajtai, M., Kumar, R., Sivakumar, D.: A sieve algorithm for the shortest lattice vector problem, In: STOC, pp. 601-610 (2001)
-
-
-
-
5
-
-
38149019948
-
Sampling methods for shortest vectors, closest vectors and successive minima
-
Arge, L, Cachin, C, Jurdziński, T, Tarlecki, A, eds, ICALP 2007, Springer, Heidelberg
-
Blömer, J., Naewe, S.: Sampling methods for shortest vectors, closest vectors and successive minima. In: Arge, L., Cachin, C., Jurdziński, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol. 4596, pp. 65-77. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4596
, pp. 65-77
-
-
Blömer, J.1
Naewe, S.2
-
6
-
-
0032653013
-
On the complexity of computing short linearly independent vectors and short bases in a lattice
-
Blömer, J., Seifert, J.-P.: On the complexity of computing short linearly independent vectors and short bases in a lattice. In: STOC, pp. 711-720 (1999)
-
(1999)
STOC
, pp. 711-720
-
-
Blömer, J.1
Seifert, J.-P.2
-
7
-
-
0024135240
-
Zero-knowledge proofs of identity
-
Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. J. Cryptology 1(2), 77-94 (1988)
-
(1988)
J. Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
8
-
-
0024984004
-
Witness indistinguishable and witness hiding protocols
-
Feige, U., Shamir, A.: Witness indistinguishable and witness hiding protocols. In: STOC, pp. 416-426 (1990)
-
(1990)
STOC
, pp. 416-426
-
-
Feige, U.1
Shamir, A.2
-
9
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
10
-
-
33749561582
-
On the fly authentication and signature schemes based on groups of unknown order
-
Girault, M., Poupard, G., Stern, J.: On the fly authentication and signature schemes based on groups of unknown order. J. Cryptology 19(4), 463-487 (2006)
-
(2006)
J. Cryptology
, vol.19
, Issue.4
, pp. 463-487
-
-
Girault, M.1
Poupard, G.2
Stern, J.3
-
11
-
-
84947558992
-
A "paradoxical" indentity-based signature scheme resulting from zero-knowledge
-
Goldwasser, S, ed, CRYPTO 1988, Springer, Heidelberg
-
Guillou, L., Quisquater, J.J.: A "paradoxical" indentity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216-231. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.403
, pp. 216-231
-
-
Guillou, L.1
Quisquater, J.J.2
-
12
-
-
0024771884
-
How to recycle random bits
-
Impagliazzo, R., Zuckerman, D.: How to recycle random bits. In: FOCS, pp. 248-253 (1989)
-
(1989)
FOCS
, pp. 248-253
-
-
Impagliazzo, R.1
Zuckerman, D.2
-
13
-
-
17744386194
-
Hardness of approximating the shortest vector problem in lattices
-
Khot, S.: Hardness of approximating the shortest vector problem in lattices. In: FOCS, pp. 126-135 (2004)
-
(2004)
FOCS
, pp. 126-135
-
-
Khot, S.1
-
14
-
-
0041384096
-
On polynomial-factor approximations to the shortest lattice vector length
-
Kumar, R., Sivakumar, D.: On polynomial-factor approximations to the shortest lattice vector length. SIAM J. Discrete Math. 16(3), 422-425 (2003)
-
(2003)
SIAM J. Discrete Math
, vol.16
, Issue.3
, pp. 422-425
-
-
Kumar, R.1
Sivakumar, D.2
-
15
-
-
33746342484
-
Generalized compact knapsacks are collision resistant
-
Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
-
Lyubashevsky, V., Micciancio, D.: Generalized compact knapsacks are collision resistant. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 144-155. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 144-155
-
-
Lyubashevsky, V.1
Micciancio, D.2
-
16
-
-
40249099769
-
SWIFFT: A modest proposal for FFT hashing
-
to appear
-
Lyubashevsky, V., Micciancio, D., Peikert, C., Rosen, A.: SWIFFT: A modest proposal for FFT hashing. In: Fast Software Encryption (FSE) (2008); Preliminary version appeared at the 2nd NIST Cryptographic Hash. Function Workshop (to appear)
-
Fast Software Encryption (FSE) (2008); Preliminary version appeared at the 2nd NIST Cryptographic Hash. Function Workshop
-
-
Lyubashevsky, V.1
Micciancio, D.2
Peikert, C.3
Rosen, A.4
-
17
-
-
40249107880
-
-
Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions. In: Computational Complexity (2002); Preliminary version in FOCS 2002 (to appear)
-
Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions. In: Computational Complexity (2002); Preliminary version in FOCS 2002 (to appear)
-
-
-
-
18
-
-
51949098877
-
-
Micciancio, D.: Efficient reductions among lattice problems. In: SODA (to appear, 2008)
-
Micciancio, D.: Efficient reductions among lattice problems. In: SODA (to appear, 2008)
-
-
-
-
19
-
-
38749097694
-
Worst-case to average-case reductions based on Gaussian measures
-
Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. on Computing 37(1), 267-302 (2007)
-
(2007)
SIAM J. on Computing
, vol.37
, Issue.1
, pp. 267-302
-
-
Micciancio, D.1
Regev, O.2
-
20
-
-
35248837045
-
Statistical zero-knowledge proofs with efficient provers: Lattice problems and more
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Micciancio, D., Vadhan, S.: Statistical zero-knowledge proofs with efficient provers: Lattice problems and more. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 282-298. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 282-298
-
-
Micciancio, D.1
Vadhan, S.2
-
21
-
-
84875762817
-
Provably secure and practical identification schemes and corresponding signature schemes
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31-53. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
-
22
-
-
40249117855
-
-
Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, Springer, Heidelberg (2006)
-
Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, Springer, Heidelberg (2006)
-
-
-
-
23
-
-
84957794940
-
The composite discrete logarithm and secure authentication
-
Pointcheval, D.: The composite discrete logarithm and secure authentication, In: Public Key Cryptography, pp. 113-128 (2000)
-
(2000)
Public Key Cryptography
, pp. 113-128
-
-
Pointcheval, D.1
-
24
-
-
0037770045
-
New lattice based cryptographic constructions
-
Regev, O.: New lattice based cryptographic constructions. In: STOC, pp. 407-416 (2003)
-
(2003)
STOC
, pp. 407-416
-
-
Regev, O.1
-
26
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptology 4(3), 161-174 (1991)
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
27
-
-
85032871579
-
An efficient identification scheme based on permuted kernels (extended abstract)
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Shamir, A.: An efficient identification scheme based on permuted kernels (extended abstract). In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 606-609. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 606-609
-
-
Shamir, A.1
-
28
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484-1509 (1997)
-
(1997)
SIAM J. Comput
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.1
-
29
-
-
0004746654
-
On the security of a practical identification scheme
-
Shoup, V.: On the security of a practical identification scheme. J. Cryptology 12(4), 247-260 (1999)
-
(1999)
J. Cryptology
, vol.12
, Issue.4
, pp. 247-260
-
-
Shoup, V.1
|