-
1
-
-
0023985196
-
RSA and Rabin functions: Certain parts are as hard as the whole
-
Nov. [ACGS88]
-
[ACGS88] W. Alexi, B. Chor, O. Goldreich, and C. Schnorr. RSA and Rabin functions: Certain parts are as hard as the whole. SIAM J. Computing, 17(2):194-209, Nov. 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 194-209
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.4
-
2
-
-
51249173801
-
On Lovasz' lattice reduction and the nearest lattice point problem
-
[Bab86]
-
[Bab86] L. Babai. On Lovasz' lattice reduction and the nearest lattice point problem. Combinatorica, 6:1-13, 1986.
-
(1986)
Combinatorica
, vol.6
, pp. 1-13
-
-
Babai, L.1
-
3
-
-
84947913130
-
Generating EIGamal Signatures without knowing the secret key
-
[B96]
-
[B96] D. Bleichenbacher. Generating EIGamal Signatures without knowing the secret key EuroCrypt96, pp 10-18, 1996
-
(1996)
EuroCrypt96
, pp. 10-18
-
-
Bleichenbacher, D.1
-
6
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on the discrete logarithm
-
[EG85]
-
[EG85] T. El-Gamal. A public key cryptosystem and a signature scheme based on the discrete logarithm. IEEE Transactions on Information Theory, 31(4):469 472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El-Gamal, T.1
-
7
-
-
0023985464
-
Reconstructing Truncated Integer Variables Satisfying Linear Congruences
-
[FHK*88]
-
[FHK*88] A. Frieze, J. Hastad, R. Kannan, J. Lagarias, and A. Shamir. Reconstructing Truncated Integer Variables Satisfying Linear Congruences. SIAM J. Computing, 17(2):262-280, 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 262-280
-
-
Frieze, A.1
Hastad, J.2
Kannan, R.3
Lagarias, J.4
Shamir, A.5
-
10
-
-
34250244723
-
Factoring polynomial with rational coefficients
-
[LLL82]
-
[LLL82] A. Lenstra, H. Lenstra, and L. Lovasz. Factoring polynomial with rational coefficients. Mathematíche Annalen, 261:515-534, 1982.
-
(1982)
Mathematíche Annalen
, vol.261
, pp. 515-534
-
-
Lenstra, A.1
Lenstra, H.2
Lovasz, L.3
-
11
-
-
85032877753
-
Non-interactive oblivious transfer and applications
-
[MB89]
-
[MB89] S. Micali M. Bellare. Non-interactive oblivious transfer and applications. In Proc. CRYPTO 89, pages 547-557, 1989.
-
(1989)
Proc. CRYPTO 89
, pp. 547-557
-
-
Micali, S.1
Bellare, M.2
-
13
-
-
0023532388
-
A hierarchy of polynomial time lattice basis reduction algorithms
-
[Schnorr]
-
[Schnorr] C, Schnorr. A hierarchy of polynomial time lattice basis reduction algorithms Theoretical Computer Science, 53:201-224,1987
-
(1987)
Theoretical Computer Science
, vol.53
, pp. 201-224
-
-
Schnorr, C.1
-
14
-
-
84974183411
-
Reduced Lattice Bases and Successive Minima
-
[Schn94]
-
[Schn94] C.P. Schnorr: Reduced Lattice Bases and Successive Minima. Combinatorics, Probability and Computing 3, (1994), 507-522.
-
(1994)
Combinatorics, Probability and Computing
, vol.3
, pp. 507-522
-
-
Schnorr, C.P.1
-
15
-
-
84957353267
-
Relationships among the computational powers of breaking discrete log cryptosystems
-
May. [SS95]
-
[SS95] K. Sakurai and H Shizuya. Relationships among the computational powers of breaking discrete log cryptosystems. In Proc. EUROCRYPT 95, pages 341-355, May 1995.
-
(1995)
Proc. EUROCRYPT 95
, pp. 341-355
-
-
Sakurai, K.1
Shizuya, H.2
|