-
1
-
-
0023985196
-
RSA and Rabin Functions: Certain Parts Are as Hard as the Whole
-
W. Alexi, B. Chor, O. Goldreich, and C.P. Schnorr. RSA and Rabin Functions: Certain Parts Are as Hard as the Whole. SIAM Journal on Computing, 17(2):194-209, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 194-209
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.P.4
-
2
-
-
0020879150
-
On the Cryptographic Security of Single RSA Bits
-
New York, ACM Press
-
M. Ben-Or, B. Chor, and A. Shamir. On the Cryptographic Security of Single RSA Bits. In Proc. 15-th STOC, pages 421-430, New York, 1983. ACM Press.
-
(1983)
Proc. 15-th STOC
, pp. 421-430
-
-
Ben-Or, M.1
Chor, B.2
Shamir, A.3
-
3
-
-
33746077698
-
QUAD: A Practical Stream Cipher with Provable Security
-
EUROCRYPT 2006, of, Berlin, Springer-Verlag
-
C. Berbain, H. Gilbert, and J. Patarin. QUAD: a Practical Stream Cipher with Provable Security. In EUROCRYPT 2006, volume 4004 of LNCS, pages 109-128, Berlin, 2006. Springer-Verlag.
-
(2006)
LNCS
, vol.4004
, pp. 109-128
-
-
Berbain, C.1
Gilbert, H.2
Patarin, J.3
-
5
-
-
21644470546
-
Predicting Nonlinear Pseudorandom Number Generators
-
S.R. Blackburn, D. Gomez-Perez, J. Gutierrez, and I.E. Shparlinski. Predicting Nonlinear Pseudorandom Number Generators. Mathematics of Computation, 74:1471-1494, 2004.
-
(2004)
Mathematics of Computation
, vol.74
, pp. 1471-1494
-
-
Blackburn, S.R.1
Gomez-Perez, D.2
Gutierrez, J.3
Shparlinski, I.E.4
-
6
-
-
0022716288
-
-
L. Blum, M. Blum, andM. Shub. A Simple Unpredictable Pseudo-Random Number Generator. SIAM Journal on Computing, 15:364-383, 1986.
-
L. Blum, M. Blum, andM. Shub. A Simple Unpredictable Pseudo-Random Number Generator. SIAM Journal on Computing, 15:364-383, 1986.
-
-
-
-
7
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
-
M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM Journal on Computing, 13:850-864, 1984.
-
(1984)
SIAM Journal on Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
9
-
-
84946840551
-
The Modular Inversion Hidden Number Problem
-
ASIACRYPT 2001, of, Berlin, Springer-Verlag
-
D. Boneh, S. Halevi, and N.A. Howgrave-Graham. The Modular Inversion Hidden Number Problem. In ASIACRYPT 2001, volume 2248 of LNCS, pages 36-51, Berlin, 2001. Springer-Verlag.
-
(2001)
LNCS
, vol.2248
, pp. 36-51
-
-
Boneh, D.1
Halevi, S.2
Howgrave-Graham, N.A.3
-
10
-
-
0035751083
-
Paillier's Cryptosystem Revisited
-
New York, November, ACM
-
D. Catalano, R. Gennaro, N. Howgrave-Graham, and P. Nguyen. Paillier's Cryptosystem Revisited. In Proc. CCS '01, New York, November 2001. ACM.
-
(2001)
Proc. CCS '01
-
-
Catalano, D.1
Gennaro, R.2
Howgrave-Graham, N.3
Nguyen, P.4
-
11
-
-
0001494997
-
Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities
-
D. Coppersmith. Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities. J. of Cryptology, 10:233-260, 1997.
-
(1997)
J. of Cryptology
, vol.10
, pp. 233-260
-
-
Coppersmith, D.1
-
12
-
-
84958958956
-
Finding Small Solutions to Low Degree Polynomials
-
CALC '01, of, Berlin, Springer-Verlag
-
D. Coppersmith. Finding Small Solutions to Low Degree Polynomials. In CALC '01, volume 2146 of LNCS, pages 20-31, Berlin, 2001. Springer-Verlag.
-
(2001)
LNCS
, vol.2146
, pp. 20-31
-
-
Coppersmith, D.1
-
14
-
-
0011189534
-
Stronger Security Proofs for RSA and Rabin Bits
-
R. Fischlin and C.P. Schnorr. Stronger Security Proofs for RSA and Rabin Bits. Journal of Cryptology, 13:221-244, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, pp. 221-244
-
-
Fischlin, R.1
Schnorr, C.P.2
-
15
-
-
17444407353
-
An Improved Pseudo-Random Generator Based on the Discrete-Logarithm Problem
-
R. Gennaro. An Improved Pseudo-Random Generator Based on the Discrete-Logarithm Problem. Journal of Cryptology, 18:91-110, 2005.
-
(2005)
Journal of Cryptology
, vol.18
, pp. 91-110
-
-
Gennaro, R.1
-
17
-
-
17444362761
-
On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators
-
O. Goldreich and V. Rosen. On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators. J. of Cryptology, 16:71-93, 2003.
-
(2003)
J. of Cryptology
, vol.16
, pp. 71-93
-
-
Goldreich, O.1
Rosen, V.2
-
19
-
-
0020279669
-
Why and How to Establish a Private Code on a Public Network
-
IEEE Computer Society Press
-
S. Goldwasser, S. Micali, and P. Tong. Why and How to Establish a Private Code on a Public Network. In Proc. FOCS '82, pages 134-144. IEEE Computer Society Press, 1982.
-
(1982)
Proc. FOCS '82
, pp. 134-144
-
-
Goldwasser, S.1
Micali, S.2
Tong, P.3
-
20
-
-
84949226531
-
Finding Small Roots of Univariate Polynomials Revisited
-
Cryptography and Coding, of, Berlin, Springer-Verlag
-
N. Howgrave-Graham. Finding Small Roots of Univariate Polynomials Revisited. In Cryptography and Coding, volume 1355 of LNCS, pages 131-142, Berlin, 1997. Springer-Verlag.
-
(1997)
LNCS
, vol.1355
, pp. 131-142
-
-
Howgrave-Graham, N.1
-
21
-
-
0001143795
-
Efficient Cryptographic Schemes Provably as Secure as Subset Sum
-
R. Impagliazzo and M. Naor. Efficient Cryptographic Schemes Provably as Secure as Subset Sum. Journal of Cryptology, 9:199-216, 1996.
-
(1996)
Journal of Cryptology
, vol.9
, pp. 199-216
-
-
Impagliazzo, R.1
Naor, M.2
-
23
-
-
0000653210
-
Selecting Cryptographic Key Sizes
-
A.K. Lenstra and E.R. Verheul. Selecting Cryptographic Key Sizes. J. of Cryptology, 14:255-293, 2001.
-
(2001)
J. of Cryptology
, vol.14
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
24
-
-
0025750430
-
Efficient, Perfect Polynomial Random Number Generators
-
S. Micali and C.P. Schnorr. Efficient, Perfect Polynomial Random Number Generators. J. of Cryptology, 3:157-172, 1991.
-
(1991)
J. of Cryptology
, vol.3
, pp. 157-172
-
-
Micali, S.1
Schnorr, C.P.2
-
25
-
-
33746391879
-
The insecurity of the digital signature algorithm with partially known nonces
-
P. Q. Nguyen and I. E. Shparlinski. The insecurity of the digital signature algorithm with partially known nonces. J. Cryptology, 15:151-176, 2002.
-
(2002)
J. Cryptology
, vol.15
, pp. 151-176
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
-
26
-
-
33846867921
-
The Two Faces of Lattices in Cryptology
-
Cryptography and Lattices, of, Berlin, Springer-Verlag
-
P. Q. Nguyen and J. Stern. The Two Faces of Lattices in Cryptology. In Cryptography and Lattices, volume 2146 of LNCS, pages 146-180, Berlin, 2001. Springer-Verlag.
-
(2001)
LNCS
, vol.2146
, pp. 146-180
-
-
Nguyen, P.Q.1
Stern, J.2
-
27
-
-
84957638120
-
An Efficient Discrete Log Pseudo Random Generator
-
CRYPTO '98, of, Berlin, Springer-Verlag
-
S. Patel and G. Sundaram. An Efficient Discrete Log Pseudo Random Generator. In CRYPTO '98, volume 1462 of LNCS, pages 304-317, Berlin, 1998. Springer-Verlag.
-
(1998)
LNCS
, vol.1462
, pp. 304-317
-
-
Patel, S.1
Sundaram, G.2
-
28
-
-
33646853911
-
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
-
Cryptography and Coding 2005, of, Berlin, Springer-Verlag
-
A. Sidorenko and B. Schoenmakers. Concrete Security of the Blum-Blum-Shub Pseudorandom Generator. In Cryptography and Coding 2005, volume 3796 of LNCS, pages 355-375, Berlin, 2005. Springer-Verlag.
-
(2005)
LNCS
, vol.3796
, pp. 355-375
-
-
Sidorenko, A.1
Schoenmakers, B.2
-
29
-
-
38049070609
-
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. Cryptology ePrint Archive
-
Report 2006/206
-
R. Steinfeld, J. Pieprzyk, and H. Wang. On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. Cryptology ePrint Archive, Report 2006/206, 2006. http://eprint.iacr.org/2006/206.
-
(2006)
-
-
Steinfeld, R.1
Pieprzyk, J.2
Wang, H.3
-
30
-
-
38149098041
-
Efficient and Secure Pseudo-Random Number Generation
-
IEEE Computer Society Press
-
U.V. Vazirani and V.V. Vazirani. Efficient and Secure Pseudo-Random Number Generation. In Proc. FOCS '84, pages 458-463. IEEE Computer Society Press, 1982.
-
(1982)
Proc. FOCS '84
, pp. 458-463
-
-
Vazirani, U.V.1
Vazirani, V.V.2
|