메뉴 건너뛰기




Volumn 2248, Issue , 2001, Pages 36-51

The modular inversion hidden number problem

Author keywords

Approximations; Coppersmith s attack; Hidden number problems; Lattices; MAC; Modular inversion; PRNG

Indexed keywords

CRYPTOGRAPHY; CRYSTAL LATTICES; SECURITY OF DATA;

EID: 84946840551     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45682-1_3     Document Type: Conference Paper
Times cited : (43)

References (16)
  • 2
    • 0022716288 scopus 로고
    • A simple unpredictable pseudo-random number generatorSIAM
    • L. Blum, M. Blum, M. Shub, “A simple unpredictable pseudo-random number generator”, SIAM J. Comput. 15, 2 (1986) 364–383.
    • (1986) J. Comput. , vol.15 , Issue.2 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 3
    • 0021522644 scopus 로고
    • How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
    • November
    • M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM J.Computing, 13(4):850–864, November 1984.
    • (1984) SIAM J.Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 4
    • 0008878919 scopus 로고    scopus 로고
    • Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes
    • D. Boneh, Venkatesan R., “Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes”, Proc. of Crypto, 1996, pp. 129–142, 1996.
    • (1996) Proc. Of Crypto , vol.1996 , pp. 129-142
    • Boneh, D.1    Venkatesan, R.2
  • 6
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    • D. Coppersmith, “Small solutions to polynomial equations, and low exponent RSA vulnerabilities”, J. of Cryptology, Vol. 10, pp. 233–260, 1997.
    • (1997) J. Of Cryptology , vol.10 , pp. 233-260
    • Coppersmith, D.1
  • 7
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • R. Cramer and V. Shoup, “A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack”, in proc. Crypto’98, pp. 13–25, 1998.
    • (1998) In Proc. Crypto’98 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 8
    • 85139411892 scopus 로고    scopus 로고
    • Signature schemes based on the Strong RSA Assumption
    • on Computer and Communications Security
    • R. Cramer and V. Shoup, “Signature schemes based on the Strong RSA Assumption”, Proc. 6th ACM Conf. on Computer and Communications Security, 1999.
    • (1999) Proc. 6Th ACM Conf
    • Cramer, R.1    Shoup, V.2
  • 10
    • 84957661041 scopus 로고    scopus 로고
    • Secure hash-and-sign signature without random oracles
    • R. Gennaro, S. Halevi, T. Rabin, “Secure hash-and-sign signature without random oracles”, Proc. Eurocrypt’99, pp. 123–139, 1999.
    • (1999) Proc. Eurocrypt’99 , pp. 123-139
    • Gennaro, R.1    Halevi, S.2    Rabin, T.3
  • 14
    • 34250244723 scopus 로고
    • Factoring polynomials with rational coefficients
    • A. Lenstra, H. Lenstra, and L. Lovász. Factoring polynomials with rational coefficients. Mathematische Annalen, vol. 261, pp. 515–534, 1982.
    • (1982) Mathematische Annalen , vol.261 , pp. 515-534
    • Lenstra, A.1    Lenstra, H.2    Lovász, L.3
  • 15
    • 0031332843 scopus 로고    scopus 로고
    • Number theoretic constructions of efficient pseudo random functions
    • M. Naor, O. Reingold, “Number theoretic constructions of efficient pseudo random functions”, Proc. FOCS’97. pp. 458–467.
    • Proc. FOCS’97 , pp. 458-467
    • Naor, M.1    Reingold, O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.