-
1
-
-
0018724062
-
A Subexponential Algorithm for the Discrete Logarithm Problem with Applications to Cryptography
-
L. Adleman. A Subexponential Algorithm for the Discrete Logarithm Problem with Applications to Cryptography. IEEE FOCS, pp.55-60, 1979.
-
(1979)
IEEE FOCS
, pp. 55-60
-
-
Adleman, L.1
-
2
-
-
0023985196
-
RSA and Rabin Functions: Certain Parts are as Hard as the Whole
-
April
-
W. Alexi, B. Chor, O. Goldreich and C. Schnorr. RSA and Rabin Functions: Certain Parts are as Hard as the Whole. SIAM J. Computing, 17(2):194-209, April 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 194-209
-
-
Alexi, W.1
Chor, B.2
Goldreich, O.3
Schnorr, C.4
-
3
-
-
0022716288
-
A Simple Unpredictable Pseudo-Random Number Generator
-
May
-
L. Blum, M. Blum and M. Shub. A Simple Unpredictable Pseudo-Random Number Generator. SIAM J.Computing, 15(2):364-383, May 1986.
-
(1986)
SIAM J.Computing
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
4
-
-
0021522644
-
How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits
-
November
-
M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM J.Computing, 13(4):850-864, November 1984.
-
(1984)
SIAM J.Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
5
-
-
0017018484
-
New Directions in Cryptography
-
IT-22, November
-
W. Diffie and M. Hellman. New Directions in Cryptography. IEEE Trans. Inf. Theory, IT-22:644-654, November 1976.
-
(1976)
IEEE Trans. Inf. Theory
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
6
-
-
0011189534
-
Stronger Security Proofs for RSA and Rabin Bits
-
Spring 2000
-
R. Fischlin and C. Schnorr. Stronger Security Proofs for RSA and Rabin Bits. J.Crypt., 13(2):221-244, Spring 2000.
-
J.Crypt
, vol.13
, Issue.2
, pp. 221-244
-
-
Fischlin, R.1
Schnorr, C.2
-
7
-
-
0021409284
-
Probabilistic Encryption
-
S. Goldwasser and S. Micali. Probabilistic Encryption. JCSS, 28:270-299, 1988.
-
(1988)
JCSS
, vol.28
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
8
-
-
0345253860
-
A Pseudo-Random Generator from any One-Way Function
-
J. Håstad, R. Impagliazzo, L. Levin and M. Luby. A Pseudo-Random Generator from any One-Way Function. SIAM J.Computing, 28(4):1364-1396, 1999.
-
(1999)
SIAM J.Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
9
-
-
0032305852
-
The Security of Individual RSA Bits
-
J. Håstad and M. Näslund. The Security of Individual RSA Bits. IEEE FOCS, pp.510-519, 1998.
-
(1998)
IEEE FOCS
, pp. 510-519
-
-
Håstad, J.1
Näslund, M.2
-
10
-
-
0344056457
-
The Discrete Logarithm Modulo a Composite Hides O(N) Bits
-
J. Håstad, A. Schrift and A. Shamir. The Discrete Logarithm Modulo a Composite Hides O(n) Bits. JCSS, 47:376-404, 1993.
-
(1993)
JCSS
, vol.47
, pp. 376-404
-
-
Håstad, J.1
Schrift, A.2
Shamir, A.3
-
11
-
-
0001143795
-
Efficient Cryptographic Schemes Provably as Secure as Subset Sum
-
R. Impagliazzo and M. Naor. Efficient Cryptographic Schemes Provably as Secure as Subset Sum. J.Crypt., 9(4):199-216, 1996.
-
(1996)
J.Crypt.
, vol.9
, Issue.4
, pp. 199-216
-
-
Impagliazzo, R.1
Naor, M.2
-
13
-
-
84955368946
-
More Flexible Exponentiation with Precomputation
-
C.H. Lim and P.J. Lee. More Flexible Exponentiation with Precomputation. CRYPTO’94, LNCS 839, pp.95-107.
-
CRYPTO’94, LNCS
, vol.839
, pp. 95-107
-
-
Lim, C.H.1
Lee, P.J.2
-
14
-
-
0023985034
-
The Discrete Log Hides O(Log n) Bits
-
D. Long and A. Wigderson. The Discrete Log Hides O(log n) Bits. SIAM J.Computing, 17:363-372, 1988.
-
(1988)
SIAM J.Computing
, vol.17
, pp. 363-372
-
-
Long, D.1
Wigderson, A.2
-
15
-
-
0031332843
-
Number-Theoretic Constructions of Efficient Pseudo-Random Functions
-
M. Naor and O. Reingold. Number-Theoretic Constructions of Efficient Pseudo-Random Functions. IEEE FOCS, pp.458-467, 1997.
-
(1997)
IEEE FOCS
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
16
-
-
84957638120
-
An Efficient Discrete Log Pseudo Random Generator
-
S. Patel and G. Sundaram. An Efficient Discrete Log Pseudo Random Generator. CRYPTO’98, LNCS 1462, pp.304-317, 1998.
-
(1998)
CRYPTO’98, LNCS
, vol.1462
, pp. 304-317
-
-
Patel, S.1
Sundaram, G.2
-
17
-
-
0039783282
-
Simultaneous Security of Bits in the Discrete Log
-
R. Peralta. Simultaneous Security of Bits in the Discrete Log. EUROCRYPT’85, LNCS 219, pp.62-72, 1986.
-
(1986)
EUROCRYPT’85, LNCS
, vol.219
, pp. 62-72
-
-
Peralta, R.1
-
18
-
-
84966238549
-
Monte-Carlo Methods for Index Computation (Mod p)
-
J. Pollard. Monte-Carlo Methods for Index Computation (mod p). Mathematics of Computation, 32(143):918-924, 1978.
-
(1978)
Mathematics of Computation
, vol.32
, Issue.143
, pp. 918-924
-
-
Pollard, J.1
-
20
-
-
0002952549
-
Theory and Applications of Trapdoor Functions
-
A. Yao. Theory and Applications of Trapdoor Functions. IEEE FOCS, 1982.
-
(1982)
IEEE FOCS
-
-
Yao, A.1
|