-
1
-
-
27344461174
-
Lattice problems in NP ∩ coNP
-
Aharonov, D., Regev, O.: Lattice problems in NP ∩ coNP. Journal of the ACM 52(5), 749-765 (2005)
-
(2005)
Journal of the ACM
, vol.52
, Issue.5
, pp. 749-765
-
-
Aharonov, D.1
Regev, O.2
-
2
-
-
40249083658
-
-
Ajtai, M.: Generating hard instances of lattice problems. Complexity of Computations and Proofs, Quaderni di Matematica 13, 1-32 (2004) (Preliminary version in STOC 1996)
-
Ajtai, M.: Generating hard instances of lattice problems. Complexity of Computations and Proofs, Quaderni di Matematica 13, 1-32 (2004) (Preliminary version in STOC 1996)
-
-
-
-
3
-
-
0034826416
-
A sieve algorithm for the shortest lattice vector problem
-
Ajtai, M., Kumar, R., Sivakumar, D.: A sieve algorithm for the shortest lattice vector problem. In: STOC, pp. 601-610 (2001)
-
(2001)
STOC
, pp. 601-610
-
-
Ajtai, M.1
Kumar, R.2
Sivakumar, D.3
-
4
-
-
84955557264
-
-
Bleichenbacher, D., Maurer, U.: On the efficiency of one-time digital signatures. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, 1163, pp. 145-158. Springer, Heidelberg (1996)
-
Bleichenbacher, D., Maurer, U.: On the efficiency of one-time digital signatures. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 145-158. Springer, Heidelberg (1996)
-
-
-
-
5
-
-
84948125649
-
Optimal tree-based one-time digital signature schemes
-
Puech, C, Reischuk, R, eds, STAGS 1996, Springer, Heidelberg
-
Bleichenbacher, D., Maurer, U.: Optimal tree-based one-time digital signature schemes. In: Puech, C., Reischuk, R. (eds.) STAGS 1996. LNCS, vol. 1046, pp. 363-374. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1046
, pp. 363-374
-
-
Bleichenbacher, D.1
Maurer, U.2
-
6
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput. 13(4), 850-864 (1984)
-
(1984)
SIAM J. Comput
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
7
-
-
85028742531
-
Provably unfbrgeable signatures
-
McCurley, K.S, Ziegler, CD, eds, Advances in Cryptology 1981, 1997, Springer, Heidelberg
-
Bos, J., Chaum, D.: Provably unfbrgeable signatures. In: McCurley, K.S., Ziegler, CD. (eds.) Advances in Cryptology 1981 - 1997. LNCS, vol. 1440, pp. 1-14. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1440
, pp. 1-14
-
-
Bos, J.1
Chaum, D.2
-
8
-
-
85024261619
-
Signature schemes based on the strong RSA assumption
-
Cramer, R., Shoup, V.: Signature schemes based on the strong RSA assumption. ACM Trans. Inf. Syst. Secur. 3(3), 161-185 (2000)
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.3
, pp. 161-185
-
-
Cramer, R.1
Shoup, V.2
-
10
-
-
0037125666
-
Approximating SVP∞ to within almost-polynomial factors is NP-hard
-
Dinur, I.: Approximating SVP∞ to within almost-polynomial factors is NP-hard. Theor. Comput. Sci. 285(1), 55-71 (2002)
-
(2002)
Theor. Comput. Sci
, vol.285
, Issue.1
, pp. 55-71
-
-
Dinur, I.1
-
11
-
-
0003157491
-
On-line/off-line digital signatures
-
Even, S., Goldreich, O., Micali, S.: On-line/off-line digital signatures. J. Cryptology 9(1), 35-67 (1996)
-
(1996)
J. Cryptology
, vol.9
, Issue.1
, pp. 35-67
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
12
-
-
33644600483
-
Bounds on the efficiency of generic cryptographic constructions
-
Gennaro, R., Gertner, Y., Katz, J., Trevisan, L.: Bounds on the efficiency of generic cryptographic constructions. SIAM Journal on Computing 35(1), 217-246 (2005)
-
(2005)
SIAM Journal on Computing
, vol.35
, Issue.1
, pp. 217-246
-
-
Gennaro, R.1
Gertner, Y.2
Katz, J.3
Trevisan, L.4
-
13
-
-
84957661041
-
Secure hash-and-sign signatures without the random oracle
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Gennaro, R., Halevi, S., Rabin, T.: Secure hash-and-sign signatures without the random oracle. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 123-139. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 123-139
-
-
Gennaro, R.1
Halevi, S.2
Rabin, T.3
-
14
-
-
0034205405
-
On the limits of nonapproximability of lattice problems
-
Goldreich, O., Goldwasser, S.: On the limits of nonapproximability of lattice problems. J. Comput. Syst. Sci. 60(3) (2000)
-
(2000)
J. Comput. Syst. Sci
, vol.60
, Issue.3
-
-
Goldreich, O.1
Goldwasser, S.2
-
15
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281-308 (1988)
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
16
-
-
84958749510
-
The provable security of graph-based one-time signatures and extensions to algebraic signature schemes
-
Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
-
Hevia, A., Micciancio, D.: The provable security of graph-based one-time signatures and extensions to algebraic signature schemes. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 379-396. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 379-396
-
-
Hevia, A.1
Micciancio, D.2
-
17
-
-
0041384096
-
On polynomial-factor approximations to the shortest lattice vector length
-
Kumar, R., Sivakumar, D.: On polynomial-factor approximations to the shortest lattice vector length. SIAM J. Discrete Math. 16(3), 422-425 (2003)
-
(2003)
SIAM J. Discrete Math
, vol.16
, Issue.3
, pp. 422-425
-
-
Kumar, R.1
Sivakumar, D.2
-
18
-
-
33746342484
-
Generalized compact knapsacks are collision resistant
-
Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
-
Lyubashevsky, V., Micciancio, D.: Generalized compact knapsacks are collision resistant. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 144-155. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 144-155
-
-
Lyubashevsky, V.1
Micciancio, D.2
-
19
-
-
40249087766
-
-
Lyubashevsky, V., Micciancio, D., Peikert, C., Rosen, R.: Provably secure FFT hashing. Technical report, 2nd NIST Cryptographic Hash Function Workshop (2006)
-
Lyubashevsky, V., Micciancio, D., Peikert, C., Rosen, R.: Provably secure FFT hashing. Technical report, 2nd NIST Cryptographic Hash Function Workshop (2006)
-
-
-
-
20
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
McCurley, K.S, Ziegler, CD, eds, Advances in Cryptology 1981, 1997, Springer, Heidelberg
-
Merkle, R.: A digital signature based on a conventional encryption function. In: McCurley, K.S., Ziegler, CD. (eds.) Advances in Cryptology 1981. - 1997. LNCS, vol. 1440, pp. 369-378. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1440
, pp. 369-378
-
-
Merkle, R.1
-
21
-
-
84969346266
-
A certified digital signature
-
McCurley, K.S, Ziegler, C.D, eds, Advances in Cryptology 1981, 1997, Springer, Heidelberg
-
Merkle, R.: A certified digital signature. In: McCurley, K.S., Ziegler, C.D. (eds.) Advances in Cryptology 1981 - 1997. LNCS, vol. 1440, pp. 218-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1440
, pp. 218-238
-
-
Merkle, R.1
-
22
-
-
38749089099
-
-
Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient one-way functions. Computational Complexity (2007) (Special issue on worst-case versus average-case complexity, in print. Available on-line as doi:10.1007/s00037-007-0234-9. Preliminary version in FOCS 2002)
-
Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient one-way functions. Computational Complexity (2007) (Special issue on worst-case versus average-case complexity, in print. Available on-line as doi:10.1007/s00037-007-0234-9. Preliminary version in FOCS 2002)
-
-
-
-
23
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: STOC, pp. 33-43 (1989)
-
(1989)
STOC
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
25
-
-
40249117848
-
-
Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, Springer, Heidelberg (2006)
-
Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, Springer, Heidelberg (2006)
-
-
-
-
27
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
Rompel, J.: One-way functions are necessary and sufficient for secure signatures. In: STOC, pp. 387-394 (1990)
-
(1990)
STOC
, pp. 387-394
-
-
Rompel, J.1
-
28
-
-
35048813651
-
Merkle tree traversal in log space and time
-
Cachiri, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Szydlo, M.: Merkle tree traversal in log space and time. In: Cachiri, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 541-554. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 541-554
-
-
Szydlo, M.1
-
29
-
-
0011039877
-
Another NP-compIete problem and the complexity of computing short vectors in a lattice
-
Technical Report 81.-04, University of Amsterdam
-
van Emde Boas, P.: Another NP-compIete problem and the complexity of computing short vectors in a lattice. Technical Report 81.-04, University of Amsterdam (1981), http://turing.wins.uva.nl/~peter/
-
(1981)
-
-
van Emde Boas, P.1
|