메뉴 건너뛰기




Volumn 1666, Issue , 1999, Pages 31-46

The hardness of the hidden subset sum problem and its cryptographic implications

Author keywords

[No Author keywords available]

Indexed keywords

DISCRETE FOURIER TRANSFORMS; HARDNESS; SET THEORY; SMART CARDS;

EID: 84957072857     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48405-1_3     Document Type: Conference Paper
Times cited : (32)

References (21)
  • 1
    • 0029719917 scopus 로고    scopus 로고
    • Generating hard instances of lattice problems
    • Extended version at
    • M. Ajtai. Generating hard instances of lattice problems. In Proc. 28th ACM STOC, pages 99-108, 1996. Extended version at http://www.eccc.uni-trier.de/eccc/.
    • (1996) Proc. 28Th ACM STOC , pp. 99-108
    • Ajtai, M.1
  • 2
    • 84957610823 scopus 로고    scopus 로고
    • Speeding up discrete log and factoring based schemes via precomputations
    • Springer-Verlag
    • V. Boyko, M. Peinado, and R. Venkatesan. Speeding up discrete log and factoring based schemes via precomputations. In Proc. of Eurocrypt' 98, volume 1403 of LNCS, pages 221-235. Springer-Verlag, 1998.
    • (1998) Proc. Of Eurocrypt' 98, Volume 1403 of LNCS , pp. 221-235
    • Boyko, V.1    Peinado, M.2    Venkatesan, R.3
  • 4
    • 0026627555 scopus 로고
    • An interactive identi_cation scheme based on discrete logarithms and factoring
    • E. F. Brickell and K. S. McCurley. An interactive identi_cation scheme based on discrete logarithms and factoring. Journal of Cryptology, 5(1):29-39, 1992.
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 29-39
    • Brickell, E.F.1    McCurley, K.S.2
  • 6
    • 35048859177 scopus 로고
    • On the security of the Schnorr scheme using preprocessing
    • Springer-Verlag
    • P. de Rooij. On the security of the Schnorr scheme using preprocessing. In Proc. Of Eurocrypt'91, volume 547 of LNCS, pages 71-80. Springer-Verlag, 1991.
    • (1991) Proc. Of Eurocrypt'91, Volume 547 of LNCS , pp. 71-80
    • De Rooij, P.1
  • 8
    • 24144497588 scopus 로고    scopus 로고
    • On Schnorr's preprocessing for digital signature schemes
    • P. de Rooij. On Schnorr's preprocessing for digital signature schemes. Journal of Cryptology, 10(1):1-16, 1997.
    • (1997) Journal of Cryptology , vol.10 , Issue.1 , pp. 1-16
    • De Rooij, P.1
  • 9
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory, 31:469-472, 1985.
    • (1985) IEEE Trans. Inform. Theory , vol.31 , pp. 469-472
    • El Gamal, T.1
  • 10
    • 0001143795 scopus 로고    scopus 로고
    • Efficient cryptographic schemes provably as secure as subset sum
    • R. Impagliazzo and M. Naor. Efficient cryptographic schemes provably as secure as subset sum. Journal of Cryptology, 9(4):199-216, 1996.
    • (1996) Journal of Cryptology , vol.9 , Issue.4 , pp. 199-216
    • Impagliazzo, R.1    Naor, M.2
  • 11
    • 34250244723 scopus 로고
    • Factoring polynomials with rational coeficients
    • A. K. Lenstra, H. W. Lenstra, and L. Lovfiasz. Factoring polynomials with rational coeficients. Math. Ann., 261:515-534, 1982.
    • (1982) Math. Ann , vol.261 , pp. 515-534
    • Lenstra, A.K.1    Lenstra, H.W.2    Lovfiasz, L.3
  • 13
  • 14
    • 84958613113 scopus 로고    scopus 로고
    • Merkle-Hellman revisited: A cryptanalysis of the Qu-Vanstone cryptosystem based on group factorizations
    • Springer-Verlag
    • P. Nguyen and J. Stern. Merkle-Hellman revisited: a cryptanalysis of the Qu-Vanstone cryptosystem based on group factorizations. In Proc. of Crypto'97, volume 1294 of LNCS, pages 198-212. Springer-Verlag, 1997.
    • (1997) Proc. Of Crypto'97, Volume 1294 of LNCS , pp. 198-212
    • Nguyen, P.1    Stern, J.2
  • 15
    • 84947755425 scopus 로고    scopus 로고
    • Cryptanalysis of a fast public key cryptosystem presented at SAC '97
    • Springer-Verlag
    • P. Nguyen and J. Stern. Cryptanalysis of a fast public key cryptosystem presented at SAC '97. In Proc. of SAC '98, LNCS. Springer-Verlag, 1998.
    • (1998) Proc. Of SAC '98, LNCS
    • Nguyen, P.1    Stern, J.2
  • 16
    • 84947806031 scopus 로고    scopus 로고
    • The Béguin-Quisquater server-aided RSA protocol from Crypto '95 is not secure
    • Springer-Verlag
    • P. Nguyen and J. Stern. The Béguin-Quisquater server-aided RSA protocol from Crypto '95 is not secure. In Proc. of Asiacrypt '98, volume 1514 of LNCS, pages 372-379. Springer-Verlag, 1998.
    • (1998) Proc. Of Asiacrypt '98, Volume 1514 of LNCS , pp. 372-379
    • Nguyen, P.1    Stern, J.2
  • 17
    • 0023532388 scopus 로고
    • A hierarchy of polynomial lattice basis reduction algorithms
    • C.-P. Schnorr. A hierarchy of polynomial lattice basis reduction algorithms. The-oretical Computer Science, 53:201-224, 1987.
    • (1987) The-Oretical Computer Science , vol.53 , pp. 201-224
    • Schnorr, C.-P.1
  • 18
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • Springer-Verlag
    • C.P. Schnorr. Efficient identification and signatures for smart cards. In Proc. Of Crypto'89, volume 435, pages 239-252. Springer-Verlag, 1990.
    • (1990) Proc. Of Crypto'89 , vol.435 , pp. 239-252
    • Schnorr, C.P.1
  • 19
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C.P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4:161-174, 1991.
    • (1991) Journal of Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.P.1
  • 20
    • 0009452048 scopus 로고
    • Attacking the Chor-Rivest cryptosystem by improved lattice reduction
    • Springer-Verlag
    • C.P. Schnorr and H.H. Hörner. Attacking the Chor-Rivest cryptosystem by improved lattice reduction. In Proc. of Eurocrypt'95, volume 921 of LNCS, pages 12. Springer-Verlag, 1995.
    • (1995) Proc. Of Eurocrypt'95, Volume 921 of LNCS
    • Schnorr, C.P.1    Hörner, H.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.