메뉴 건너뛰기




Volumn 1294, Issue , 1997, Pages 277-291

"pseudo-random" number generation within cryptographic algorithms: The DDS case

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; NUMBER THEORY;

EID: 84958656559     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0052242     Document Type: Conference Paper
Times cited : (65)

References (20)
  • 1
    • 51249173801 scopus 로고
    • On Lovász' lattice reduction and the nearest lattice point problem
    • L. Babai. On Lovász' lattice reduction and the nearest lattice point problem. Combinatorial, 6(1):1-13, 1986.
    • (1986) Combinatorial , vol.6 , Issue.1 , pp. 1-13
    • Babai, L.1
  • 3
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • November
    • M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Computing, 13(4):850-863, November 1984.
    • (1984) SIAM J. Computing , vol.13 , Issue.4 , pp. 850-863
    • Blum, M.1    Micali, S.2
  • 4
    • 0024303956 scopus 로고
    • Inferring sequences produced by pseudo-random number generators
    • Joan Boyax. Inferring sequences produced by pseudo-random number generators. Journal of the ACM, 36(1):129-141, January 1989.
    • (1989) Journal of the ACM , vol.36 , Issue.1 , pp. 129-141
    • Boyax, J.1
  • 6
    • 0000534667 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • G. R. Blakley and D. C. Chaum, editors, Sringer, Lecture Notes in Computer Science No. 196
    • Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In G. R. Blakley and D. C. Chaum, editors, Proc. CRYPTO 84, pages 10-18. Sringer, 1985. Lecture Notes in Computer Science No. 196.
    • (1985) Proc. CRYPTO 84 , pp. 10
    • Gamal, T.E.1
  • 9
    • 0021975313 scopus 로고
    • The cryptographic security of truncated linearly related variables
    • Providence, ACM
    • J. Hastad and A. Shamir. The cryptographic security of truncated linearly related variables. In Proc. 17th ACM Symp. on Theory of Computing, pages 356-362, Providence, 1985. ACM.
    • (1985) Proc. 17Th ACM Symp. On Theory of Computing , pp. 356-362
    • Hastad, J.1    Shamir, A.2
  • 10
    • 0000126406 scopus 로고
    • Minkowski's convex body theorem and integer programming
    • R. Kannan. Minkowski's convex body theorem and integer programming. Mathematics of operations research, 12(3):415-440, 1987.
    • (1987) Mathematics of Operations Research , vol.12 , Issue.3 , pp. 415-440
    • Kannan, R.1
  • 11
    • 0004285345 scopus 로고
    • Addison-Wesley, 1969. Second edition
    • Donald E. Knuth. Seminumerical Algorithms, volume 2 of The Art of Computer Programming. Addison-Wesley, 1969. Second edition, 1981.
    • (1981) Seminumerical Algorithms
    • Knuth, D.E.1
  • 12
    • 0021819410 scopus 로고
    • Knuth. Deciphering a linear congruential encryption
    • January
    • Donald E. Knuth. Deciphering a linear congruential encryption. IEEE Transactions on Information Theory, IT-31(1):49-52, January 1985.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.1 , pp. 49-52
    • Donald, E.1
  • 13
    • 85014681171 scopus 로고
    • How to predict congruential generators
    • G. Brassard, editor, Springer, Lecture Notes in Computer Science No. 435
    • H. Krawczyk. How to predict congruential generators. In G. Brassard, editor, Proc. CRYPTO 89, pages 138-153. Springer, 1990. Lecture Notes in Computer Science No. 435.
    • (1990) Proc. CRYPTO 89 , pp. 138
    • Krawczyk, H.1
  • 14
    • 0020845921 scopus 로고
    • Integer programming with a fixed number of variables
    • H.W. Lenstra. Integer programming with a fixed number of variables. Mathematics of operations research, 8(4):538-548, 1983.
    • (1983) Mathematics of Operations Research , vol.8 , Issue.4 , pp. 538-548
    • Lenstra, H.W.1
  • 17
    • 0020271558 scopus 로고
    • Inferring a sequence generated by a linear congruence
    • Chicago, IEEE
    • J. Plumstead (Boyar). Inferring a sequence generated by a linear congruence. In Proc. 23rd IEEE Symp. on Foundations of Comp. Science, pages 153-159, Chicago, 1982. IEEE.
    • (1982) Proc. 23Rd IEEE Symp. On Foundations of Comp. Science , pp. 153-159
    • Plumstead, J.1
  • 18
    • 0000787838 scopus 로고
    • The generation of cryptographically strong pseudo-random sequences
    • Allen Gersho, editor, U.C. Santa Barbara Dept. of Elec. and Computer Eng., Tech Report 82-04
    • Adi Shamir. The generation of cryptographically strong pseudo-random sequences. In Allen Gersho, editor, Advances in Cryptology: A Report on CRYPTO 81, pages 1-1. U.C. Santa Barbara Dept. of Elec. and Computer Eng., 1982. Tech Report 82-04.
    • (1982) Advances in Cryptology: A Report on CRYPTO 81 , pp. 1
    • Shamir, A.1
  • 19
    • 0023576573 scopus 로고
    • Secret linear congruential generators are not cryptographically secure
    • Los Angeles, IEEE
    • J. Stern. Secret linear congruential generators are not cryptographically secure. In Proc. 28th IEEE Symp. on Foundations of Comp. Science, pages 421-426, Los Angeles, 1987. IEEE.
    • (1987) Proc. 28Th IEEE Symp. On Foundations of Comp. Science , pp. 421-426
    • Stern, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.