-
2
-
-
0022716288
-
A simple unpredictable pseudo-random number generatorSIAM
-
L. Blum, M. Blum, M. Shub, “A simple unpredictable pseudo-random number generator”, SIAM J. Comput. 15, 2 (1986) 364–383.
-
(1986)
J. Comput.
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
3
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
-
November
-
M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM J.Computing, 13(4):850–864, November 1984.
-
(1984)
SIAM J.Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
4
-
-
0008878919
-
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes
-
D. Boneh, Venkatesan R., “Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes”, Proc. of Crypto, 1996, pp. 129–142, 1996.
-
(1996)
Proc. Of Crypto
, vol.1996
, pp. 129-142
-
-
Boneh, D.1
Venkatesan, R.2
-
5
-
-
84880296900
-
On the unpredictability of bits of the elliptic curve Diffie–Hellman scheme
-
Springer-Verlag
-
D. Boneh, I. Shparlinksi, “On the unpredictability of bits of the elliptic curve Diffie–Hellman scheme”, In Advances in Cryptology –CR YPTO 2001, volume 2139 of Lecture Notes in Computer Science, pp. 201–212. Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology –CR YPTO 2001, Volume 2139 of Lecture Notes in Computer Science
, pp. 201-212
-
-
Boneh, D.1
Shparlinksi, I.2
-
6
-
-
0001494997
-
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
-
D. Coppersmith, “Small solutions to polynomial equations, and low exponent RSA vulnerabilities”, J. of Cryptology, Vol. 10, pp. 233–260, 1997.
-
(1997)
J. Of Cryptology
, vol.10
, pp. 233-260
-
-
Coppersmith, D.1
-
7
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
R. Cramer and V. Shoup, “A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack”, in proc. Crypto’98, pp. 13–25, 1998.
-
(1998)
In Proc. Crypto’98
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
8
-
-
85139411892
-
Signature schemes based on the Strong RSA Assumption
-
on Computer and Communications Security
-
R. Cramer and V. Shoup, “Signature schemes based on the Strong RSA Assumption”, Proc. 6th ACM Conf. on Computer and Communications Security, 1999.
-
(1999)
Proc. 6Th ACM Conf
-
-
Cramer, R.1
Shoup, V.2
-
10
-
-
84957661041
-
Secure hash-and-sign signature without random oracles
-
R. Gennaro, S. Halevi, T. Rabin, “Secure hash-and-sign signature without random oracles”, Proc. Eurocrypt’99, pp. 123–139, 1999.
-
(1999)
Proc. Eurocrypt’99
, pp. 123-139
-
-
Gennaro, R.1
Halevi, S.2
Rabin, T.3
-
14
-
-
34250244723
-
Factoring polynomials with rational coefficients
-
A. Lenstra, H. Lenstra, and L. Lovász. Factoring polynomials with rational coefficients. Mathematische Annalen, vol. 261, pp. 515–534, 1982.
-
(1982)
Mathematische Annalen
, vol.261
, pp. 515-534
-
-
Lenstra, A.1
Lenstra, H.2
Lovász, L.3
-
15
-
-
0031332843
-
Number theoretic constructions of efficient pseudo random functions
-
M. Naor, O. Reingold, “Number theoretic constructions of efficient pseudo random functions”, Proc. FOCS’97. pp. 458–467.
-
Proc. FOCS’97
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
|