메뉴 건너뛰기




Volumn 4284 LNCS, Issue , 2006, Pages 194-209

On the provable security of an efficient RSA-based pseudorandom generator

Author keywords

Lattice attack; Provable security; Pseudorandom generator; RSA

Indexed keywords

CRYPTOLOGY; INVERSION PROBLEMS; PLAINTEXT; PROVABLE SECURITY; PROVABLY SECURE; PSEUDORANDOM GENERATORS; PSEUDORANDOMNESS; RSA MODULI; SIMPLE MODIFICATIONS;

EID: 56749098583     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11935230_13     Document Type: Conference Paper
Times cited : (23)

References (30)
  • 1
    • 0023985196 scopus 로고
    • RSA and Rabin Functions: Certain Parts Are as Hard as the Whole
    • W. Alexi, B. Chor, O. Goldreich, and C.P. Schnorr. RSA and Rabin Functions: Certain Parts Are as Hard as the Whole. SIAM Journal on Computing, 17(2):194-209, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 194-209
    • Alexi, W.1    Chor, B.2    Goldreich, O.3    Schnorr, C.P.4
  • 2
    • 0020879150 scopus 로고
    • On the Cryptographic Security of Single RSA Bits
    • New York, ACM Press
    • M. Ben-Or, B. Chor, and A. Shamir. On the Cryptographic Security of Single RSA Bits. In Proc. 15-th STOC, pages 421-430, New York, 1983. ACM Press.
    • (1983) Proc. 15-th STOC , pp. 421-430
    • Ben-Or, M.1    Chor, B.2    Shamir, A.3
  • 3
    • 33746077698 scopus 로고    scopus 로고
    • QUAD: A Practical Stream Cipher with Provable Security
    • EUROCRYPT 2006, of, Berlin, Springer-Verlag
    • C. Berbain, H. Gilbert, and J. Patarin. QUAD: a Practical Stream Cipher with Provable Security. In EUROCRYPT 2006, volume 4004 of LNCS, pages 109-128, Berlin, 2006. Springer-Verlag.
    • (2006) LNCS , vol.4004 , pp. 109-128
    • Berbain, C.1    Gilbert, H.2    Patarin, J.3
  • 6
    • 0022716288 scopus 로고    scopus 로고
    • L. Blum, M. Blum, andM. Shub. A Simple Unpredictable Pseudo-Random Number Generator. SIAM Journal on Computing, 15:364-383, 1986.
    • L. Blum, M. Blum, andM. Shub. A Simple Unpredictable Pseudo-Random Number Generator. SIAM Journal on Computing, 15:364-383, 1986.
  • 7
    • 0021522644 scopus 로고
    • How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
    • M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM Journal on Computing, 13:850-864, 1984.
    • (1984) SIAM Journal on Computing , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 9
    • 84946840551 scopus 로고    scopus 로고
    • The Modular Inversion Hidden Number Problem
    • ASIACRYPT 2001, of, Berlin, Springer-Verlag
    • D. Boneh, S. Halevi, and N.A. Howgrave-Graham. The Modular Inversion Hidden Number Problem. In ASIACRYPT 2001, volume 2248 of LNCS, pages 36-51, Berlin, 2001. Springer-Verlag.
    • (2001) LNCS , vol.2248 , pp. 36-51
    • Boneh, D.1    Halevi, S.2    Howgrave-Graham, N.A.3
  • 11
    • 0001494997 scopus 로고    scopus 로고
    • Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities
    • D. Coppersmith. Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities. J. of Cryptology, 10:233-260, 1997.
    • (1997) J. of Cryptology , vol.10 , pp. 233-260
    • Coppersmith, D.1
  • 12
    • 84958958956 scopus 로고    scopus 로고
    • Finding Small Solutions to Low Degree Polynomials
    • CALC '01, of, Berlin, Springer-Verlag
    • D. Coppersmith. Finding Small Solutions to Low Degree Polynomials. In CALC '01, volume 2146 of LNCS, pages 20-31, Berlin, 2001. Springer-Verlag.
    • (2001) LNCS , vol.2146 , pp. 20-31
    • Coppersmith, D.1
  • 14
    • 0011189534 scopus 로고    scopus 로고
    • Stronger Security Proofs for RSA and Rabin Bits
    • R. Fischlin and C.P. Schnorr. Stronger Security Proofs for RSA and Rabin Bits. Journal of Cryptology, 13:221-244, 2000.
    • (2000) Journal of Cryptology , vol.13 , pp. 221-244
    • Fischlin, R.1    Schnorr, C.P.2
  • 15
    • 17444407353 scopus 로고    scopus 로고
    • An Improved Pseudo-Random Generator Based on the Discrete-Logarithm Problem
    • R. Gennaro. An Improved Pseudo-Random Generator Based on the Discrete-Logarithm Problem. Journal of Cryptology, 18:91-110, 2005.
    • (2005) Journal of Cryptology , vol.18 , pp. 91-110
    • Gennaro, R.1
  • 16
  • 17
    • 17444362761 scopus 로고    scopus 로고
    • On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators
    • O. Goldreich and V. Rosen. On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators. J. of Cryptology, 16:71-93, 2003.
    • (2003) J. of Cryptology , vol.16 , pp. 71-93
    • Goldreich, O.1    Rosen, V.2
  • 19
    • 0020279669 scopus 로고
    • Why and How to Establish a Private Code on a Public Network
    • IEEE Computer Society Press
    • S. Goldwasser, S. Micali, and P. Tong. Why and How to Establish a Private Code on a Public Network. In Proc. FOCS '82, pages 134-144. IEEE Computer Society Press, 1982.
    • (1982) Proc. FOCS '82 , pp. 134-144
    • Goldwasser, S.1    Micali, S.2    Tong, P.3
  • 20
    • 84949226531 scopus 로고    scopus 로고
    • Finding Small Roots of Univariate Polynomials Revisited
    • Cryptography and Coding, of, Berlin, Springer-Verlag
    • N. Howgrave-Graham. Finding Small Roots of Univariate Polynomials Revisited. In Cryptography and Coding, volume 1355 of LNCS, pages 131-142, Berlin, 1997. Springer-Verlag.
    • (1997) LNCS , vol.1355 , pp. 131-142
    • Howgrave-Graham, N.1
  • 21
    • 0001143795 scopus 로고    scopus 로고
    • Efficient Cryptographic Schemes Provably as Secure as Subset Sum
    • R. Impagliazzo and M. Naor. Efficient Cryptographic Schemes Provably as Secure as Subset Sum. Journal of Cryptology, 9:199-216, 1996.
    • (1996) Journal of Cryptology , vol.9 , pp. 199-216
    • Impagliazzo, R.1    Naor, M.2
  • 23
    • 0000653210 scopus 로고    scopus 로고
    • Selecting Cryptographic Key Sizes
    • A.K. Lenstra and E.R. Verheul. Selecting Cryptographic Key Sizes. J. of Cryptology, 14:255-293, 2001.
    • (2001) J. of Cryptology , vol.14 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 24
    • 0025750430 scopus 로고
    • Efficient, Perfect Polynomial Random Number Generators
    • S. Micali and C.P. Schnorr. Efficient, Perfect Polynomial Random Number Generators. J. of Cryptology, 3:157-172, 1991.
    • (1991) J. of Cryptology , vol.3 , pp. 157-172
    • Micali, S.1    Schnorr, C.P.2
  • 25
    • 33746391879 scopus 로고    scopus 로고
    • The insecurity of the digital signature algorithm with partially known nonces
    • P. Q. Nguyen and I. E. Shparlinski. The insecurity of the digital signature algorithm with partially known nonces. J. Cryptology, 15:151-176, 2002.
    • (2002) J. Cryptology , vol.15 , pp. 151-176
    • Nguyen, P.Q.1    Shparlinski, I.E.2
  • 26
    • 33846867921 scopus 로고    scopus 로고
    • The Two Faces of Lattices in Cryptology
    • Cryptography and Lattices, of, Berlin, Springer-Verlag
    • P. Q. Nguyen and J. Stern. The Two Faces of Lattices in Cryptology. In Cryptography and Lattices, volume 2146 of LNCS, pages 146-180, Berlin, 2001. Springer-Verlag.
    • (2001) LNCS , vol.2146 , pp. 146-180
    • Nguyen, P.Q.1    Stern, J.2
  • 27
    • 84957638120 scopus 로고    scopus 로고
    • An Efficient Discrete Log Pseudo Random Generator
    • CRYPTO '98, of, Berlin, Springer-Verlag
    • S. Patel and G. Sundaram. An Efficient Discrete Log Pseudo Random Generator. In CRYPTO '98, volume 1462 of LNCS, pages 304-317, Berlin, 1998. Springer-Verlag.
    • (1998) LNCS , vol.1462 , pp. 304-317
    • Patel, S.1    Sundaram, G.2
  • 28
    • 33646853911 scopus 로고    scopus 로고
    • Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
    • Cryptography and Coding 2005, of, Berlin, Springer-Verlag
    • A. Sidorenko and B. Schoenmakers. Concrete Security of the Blum-Blum-Shub Pseudorandom Generator. In Cryptography and Coding 2005, volume 3796 of LNCS, pages 355-375, Berlin, 2005. Springer-Verlag.
    • (2005) LNCS , vol.3796 , pp. 355-375
    • Sidorenko, A.1    Schoenmakers, B.2
  • 29
    • 38049070609 scopus 로고    scopus 로고
    • On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. Cryptology ePrint Archive
    • Report 2006/206
    • R. Steinfeld, J. Pieprzyk, and H. Wang. On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. Cryptology ePrint Archive, Report 2006/206, 2006. http://eprint.iacr.org/2006/206.
    • (2006)
    • Steinfeld, R.1    Pieprzyk, J.2    Wang, H.3
  • 30
    • 38149098041 scopus 로고
    • Efficient and Secure Pseudo-Random Number Generation
    • IEEE Computer Society Press
    • U.V. Vazirani and V.V. Vazirani. Efficient and Secure Pseudo-Random Number Generation. In Proc. FOCS '84, pages 458-463. IEEE Computer Society Press, 1982.
    • (1982) Proc. FOCS '84 , pp. 458-463
    • Vazirani, U.V.1    Vazirani, V.V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.