메뉴 건너뛰기




Volumn 1880, Issue , 2000, Pages 469-481

An improved pseudo-random generator based on discrete log

Author keywords

[No Author keywords available]

Indexed keywords

NUMBER THEORY;

EID: 84974622962     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44598-6_29     Document Type: Conference Paper
Times cited : (34)

References (20)
  • 1
    • 0018724062 scopus 로고
    • A Subexponential Algorithm for the Discrete Logarithm Problem with Applications to Cryptography
    • L. Adleman. A Subexponential Algorithm for the Discrete Logarithm Problem with Applications to Cryptography. IEEE FOCS, pp.55-60, 1979.
    • (1979) IEEE FOCS , pp. 55-60
    • Adleman, L.1
  • 2
    • 0023985196 scopus 로고
    • RSA and Rabin Functions: Certain Parts are as Hard as the Whole
    • April
    • W. Alexi, B. Chor, O. Goldreich and C. Schnorr. RSA and Rabin Functions: Certain Parts are as Hard as the Whole. SIAM J. Computing, 17(2):194-209, April 1988.
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 194-209
    • Alexi, W.1    Chor, B.2    Goldreich, O.3    Schnorr, C.4
  • 3
    • 0022716288 scopus 로고
    • A Simple Unpredictable Pseudo-Random Number Generator
    • May
    • L. Blum, M. Blum and M. Shub. A Simple Unpredictable Pseudo-Random Number Generator. SIAM J.Computing, 15(2):364-383, May 1986.
    • (1986) SIAM J.Computing , vol.15 , Issue.2 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 4
    • 0021522644 scopus 로고
    • How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
    • November
    • M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM J.Computing, 13(4):850-864, November 1984.
    • (1984) SIAM J.Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 5
    • 0017018484 scopus 로고
    • New Directions in Cryptography
    • IT-22, November
    • W. Diffie and M. Hellman. New Directions in Cryptography. IEEE Trans. Inf. Theory, IT-22:644-654, November 1976.
    • (1976) IEEE Trans. Inf. Theory , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 6
    • 0011189534 scopus 로고    scopus 로고
    • Stronger Security Proofs for RSA and Rabin Bits
    • Spring 2000
    • R. Fischlin and C. Schnorr. Stronger Security Proofs for RSA and Rabin Bits. J.Crypt., 13(2):221-244, Spring 2000.
    • J.Crypt , vol.13 , Issue.2 , pp. 221-244
    • Fischlin, R.1    Schnorr, C.2
  • 7
    • 0021409284 scopus 로고
    • Probabilistic Encryption
    • S. Goldwasser and S. Micali. Probabilistic Encryption. JCSS, 28:270-299, 1988.
    • (1988) JCSS , vol.28 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 8
    • 0345253860 scopus 로고    scopus 로고
    • A Pseudo-Random Generator from any One-Way Function
    • J. Håstad, R. Impagliazzo, L. Levin and M. Luby. A Pseudo-Random Generator from any One-Way Function. SIAM J.Computing, 28(4):1364-1396, 1999.
    • (1999) SIAM J.Computing , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.3    Luby, M.4
  • 9
    • 0032305852 scopus 로고    scopus 로고
    • The Security of Individual RSA Bits
    • J. Håstad and M. Näslund. The Security of Individual RSA Bits. IEEE FOCS, pp.510-519, 1998.
    • (1998) IEEE FOCS , pp. 510-519
    • Håstad, J.1    Näslund, M.2
  • 10
    • 0344056457 scopus 로고
    • The Discrete Logarithm Modulo a Composite Hides O(N) Bits
    • J. Håstad, A. Schrift and A. Shamir. The Discrete Logarithm Modulo a Composite Hides O(n) Bits. JCSS, 47:376-404, 1993.
    • (1993) JCSS , vol.47 , pp. 376-404
    • Håstad, J.1    Schrift, A.2    Shamir, A.3
  • 11
    • 0001143795 scopus 로고    scopus 로고
    • Efficient Cryptographic Schemes Provably as Secure as Subset Sum
    • R. Impagliazzo and M. Naor. Efficient Cryptographic Schemes Provably as Secure as Subset Sum. J.Crypt., 9(4):199-216, 1996.
    • (1996) J.Crypt. , vol.9 , Issue.4 , pp. 199-216
    • Impagliazzo, R.1    Naor, M.2
  • 13
    • 84955368946 scopus 로고    scopus 로고
    • More Flexible Exponentiation with Precomputation
    • C.H. Lim and P.J. Lee. More Flexible Exponentiation with Precomputation. CRYPTO’94, LNCS 839, pp.95-107.
    • CRYPTO’94, LNCS , vol.839 , pp. 95-107
    • Lim, C.H.1    Lee, P.J.2
  • 14
    • 0023985034 scopus 로고
    • The Discrete Log Hides O(Log n) Bits
    • D. Long and A. Wigderson. The Discrete Log Hides O(log n) Bits. SIAM J.Computing, 17:363-372, 1988.
    • (1988) SIAM J.Computing , vol.17 , pp. 363-372
    • Long, D.1    Wigderson, A.2
  • 15
    • 0031332843 scopus 로고    scopus 로고
    • Number-Theoretic Constructions of Efficient Pseudo-Random Functions
    • M. Naor and O. Reingold. Number-Theoretic Constructions of Efficient Pseudo-Random Functions. IEEE FOCS, pp.458-467, 1997.
    • (1997) IEEE FOCS , pp. 458-467
    • Naor, M.1    Reingold, O.2
  • 16
    • 84957638120 scopus 로고    scopus 로고
    • An Efficient Discrete Log Pseudo Random Generator
    • S. Patel and G. Sundaram. An Efficient Discrete Log Pseudo Random Generator. CRYPTO’98, LNCS 1462, pp.304-317, 1998.
    • (1998) CRYPTO’98, LNCS , vol.1462 , pp. 304-317
    • Patel, S.1    Sundaram, G.2
  • 17
    • 0039783282 scopus 로고
    • Simultaneous Security of Bits in the Discrete Log
    • R. Peralta. Simultaneous Security of Bits in the Discrete Log. EUROCRYPT’85, LNCS 219, pp.62-72, 1986.
    • (1986) EUROCRYPT’85, LNCS , vol.219 , pp. 62-72
    • Peralta, R.1
  • 18
    • 84966238549 scopus 로고
    • Monte-Carlo Methods for Index Computation (Mod p)
    • J. Pollard. Monte-Carlo Methods for Index Computation (mod p). Mathematics of Computation, 32(143):918-924, 1978.
    • (1978) Mathematics of Computation , vol.32 , Issue.143 , pp. 918-924
    • Pollard, J.1
  • 20
    • 0002952549 scopus 로고
    • Theory and Applications of Trapdoor Functions
    • A. Yao. Theory and Applications of Trapdoor Functions. IEEE FOCS, 1982.
    • (1982) IEEE FOCS
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.