-
1
-
-
51249173801
-
On Lovász' lattice reduction and the nearest lattice point problem
-
L. Babai. On Lovász' lattice reduction and the nearest lattice point problem. Combinatorial, 6(1):1-13, 1986.
-
(1986)
Combinatorial
, vol.6
, Issue.1
, pp. 1-13
-
-
Babai, L.1
-
3
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
November
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Computing, 13(4):850-863, November 1984.
-
(1984)
SIAM J. Computing
, vol.13
, Issue.4
, pp. 850-863
-
-
Blum, M.1
Micali, S.2
-
4
-
-
0024303956
-
Inferring sequences produced by pseudo-random number generators
-
Joan Boyax. Inferring sequences produced by pseudo-random number generators. Journal of the ACM, 36(1):129-141, January 1989.
-
(1989)
Journal of the ACM
, vol.36
, Issue.1
, pp. 129-141
-
-
Boyax, J.1
-
5
-
-
0021547328
-
Linear congruential generators do not produce random sequences
-
Singer Island, IEEE
-
A. M. Frieze, R. Kannan, and J. C. Lagarias. Linear congruential generators do not produce random sequences. In Proc. 25th IEEE Symp. on Foundations of Comp. Science, pages 480-484, Singer Island, 1984. IEEE.
-
(1984)
Proc. 25Th IEEE Symp. On Foundations of Comp. Science
, pp. 480-484
-
-
Frieze, A.M.1
Kannan, R.2
Lagarias, J.C.3
-
6
-
-
0000534667
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
G. R. Blakley and D. C. Chaum, editors, Sringer, Lecture Notes in Computer Science No. 196
-
Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In G. R. Blakley and D. C. Chaum, editors, Proc. CRYPTO 84, pages 10-18. Sringer, 1985. Lecture Notes in Computer Science No. 196.
-
(1985)
Proc. CRYPTO 84
, pp. 10
-
-
Gamal, T.E.1
-
7
-
-
0021567758
-
How to construct random functions
-
Singer Island, IEEE
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. In Proc. 25th IEEE Symp. on Foundations of Comp. Science, pages 464-479, Singer Island, 1984. IEEE.
-
(1984)
Proc. 25Th IEEE Symp. On Foundations of Comp. Science
, pp. 464-479
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
9
-
-
0021975313
-
The cryptographic security of truncated linearly related variables
-
Providence, ACM
-
J. Hastad and A. Shamir. The cryptographic security of truncated linearly related variables. In Proc. 17th ACM Symp. on Theory of Computing, pages 356-362, Providence, 1985. ACM.
-
(1985)
Proc. 17Th ACM Symp. On Theory of Computing
, pp. 356-362
-
-
Hastad, J.1
Shamir, A.2
-
10
-
-
0000126406
-
Minkowski's convex body theorem and integer programming
-
R. Kannan. Minkowski's convex body theorem and integer programming. Mathematics of operations research, 12(3):415-440, 1987.
-
(1987)
Mathematics of Operations Research
, vol.12
, Issue.3
, pp. 415-440
-
-
Kannan, R.1
-
11
-
-
0004285345
-
-
Addison-Wesley, 1969. Second edition
-
Donald E. Knuth. Seminumerical Algorithms, volume 2 of The Art of Computer Programming. Addison-Wesley, 1969. Second edition, 1981.
-
(1981)
Seminumerical Algorithms
-
-
Knuth, D.E.1
-
12
-
-
0021819410
-
Knuth. Deciphering a linear congruential encryption
-
January
-
Donald E. Knuth. Deciphering a linear congruential encryption. IEEE Transactions on Information Theory, IT-31(1):49-52, January 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.1
, pp. 49-52
-
-
Donald, E.1
-
13
-
-
85014681171
-
How to predict congruential generators
-
G. Brassard, editor, Springer, Lecture Notes in Computer Science No. 435
-
H. Krawczyk. How to predict congruential generators. In G. Brassard, editor, Proc. CRYPTO 89, pages 138-153. Springer, 1990. Lecture Notes in Computer Science No. 435.
-
(1990)
Proc. CRYPTO 89
, pp. 138
-
-
Krawczyk, H.1
-
14
-
-
0020845921
-
Integer programming with a fixed number of variables
-
H.W. Lenstra. Integer programming with a fixed number of variables. Mathematics of operations research, 8(4):538-548, 1983.
-
(1983)
Mathematics of Operations Research
, vol.8
, Issue.4
, pp. 538-548
-
-
Lenstra, H.W.1
-
17
-
-
0020271558
-
Inferring a sequence generated by a linear congruence
-
Chicago, IEEE
-
J. Plumstead (Boyar). Inferring a sequence generated by a linear congruence. In Proc. 23rd IEEE Symp. on Foundations of Comp. Science, pages 153-159, Chicago, 1982. IEEE.
-
(1982)
Proc. 23Rd IEEE Symp. On Foundations of Comp. Science
, pp. 153-159
-
-
Plumstead, J.1
-
18
-
-
0000787838
-
The generation of cryptographically strong pseudo-random sequences
-
Allen Gersho, editor, U.C. Santa Barbara Dept. of Elec. and Computer Eng., Tech Report 82-04
-
Adi Shamir. The generation of cryptographically strong pseudo-random sequences. In Allen Gersho, editor, Advances in Cryptology: A Report on CRYPTO 81, pages 1-1. U.C. Santa Barbara Dept. of Elec. and Computer Eng., 1982. Tech Report 82-04.
-
(1982)
Advances in Cryptology: A Report on CRYPTO 81
, pp. 1
-
-
Shamir, A.1
-
19
-
-
0023576573
-
Secret linear congruential generators are not cryptographically secure
-
Los Angeles, IEEE
-
J. Stern. Secret linear congruential generators are not cryptographically secure. In Proc. 28th IEEE Symp. on Foundations of Comp. Science, pages 421-426, Los Angeles, 1987. IEEE.
-
(1987)
Proc. 28Th IEEE Symp. On Foundations of Comp. Science
, pp. 421-426
-
-
Stern, J.1
|