-
1
-
-
84955621986
-
Hardness of computing the most significant bits of secret keys in Diffie–Hellman and related schemes
-
D. Boneh and R. Venkatesan, Hardness of computing the most significant bits of secret keys in Diffie–Hellman and related schemes, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1109 (1996), 129–142.
-
(1996)
Lect. Notes in Comp. Sci., Springer-Verlag, Berlin
, vol.1109
, pp. 129-142
-
-
Boneh, D.1
Venkatesan, R.2
-
2
-
-
0030781798
-
Rounding in lattices and its cryptographic applications
-
Algorithms, ACM, NY
-
D. Boneh and R. Venkatesan, Rounding in lattices and its cryptographic applications, Proc. 8th AnnualA CM-SIAM Symp. on Discr. Algorithms, ACM, NY, 1997, 675–681.
-
(1997)
Proc. 8Th Annuala CM-SIAM Symp. on Discr
, pp. 675-681
-
-
Boneh, D.1
Venkatesan, R.2
-
3
-
-
84956862055
-
Doing more with fewer bits
-
A. E. Brouwer, R. Pellikaan and E. R. Verheul, Doing more with fewer bits, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1716 (1999), 321–332.
-
(1999)
Lect. Notes in Comp. Sci., Springer-Verlag, Berlin
, vol.1716
, pp. 321-332
-
-
Brouwer, A.E.1
Pellikaan, R.2
Verheul, E.R.3
-
4
-
-
0002107440
-
On the statistical properties of Diffie–Hellman distributions
-
R. Canetti, J. B. Friedlander, S. Konyagin, M. Larsen, D. Lieman and I. E. Shparlinski, On the statistical properties of Diffie–Hellman distributions, IsraelJ. Math., 120 (2000), 23–46.
-
(2000)
Israelj. Math.
, vol.120
, pp. 23-46
-
-
Canetti, R.1
Friedlander, J.B.2
Konyagin, S.3
Larsen, M.4
Lieman, D.5
Shparlinski, I.E.6
-
5
-
-
84880910493
-
The insecurity of Nyberg–Rueppel and other DSA-like signature schemes with partially known nonces
-
Boston, MA, 2001 (to appear)
-
E. ElMahassni, P. Q. Nguyen and I. E. Shparlinski, The insecurity of Nyberg–Rueppel and other DSA-like signature schemes with partially known nonces, Proc. Workshop on Lattices and Cryptography, Boston, MA, 2001 (to appear).
-
Proc. Workshop on Lattices and Cryptography
-
-
Elmahassni, E.1
Nguyen, P.Q.2
Shparlinski, I.E.3
-
6
-
-
0003661439
-
On correlation of binary M-sequences, Designs
-
J. B. Friedlander, M. Larsen, D. Lieman and I. E. Shparlinski, On correlation of binary M-sequences, Designs, Codes and Cryptography, 16 (1999), 249–256.
-
(1999)
Codes and Cryptography
, vol.16
, pp. 249-256
-
-
Friedlander, J.B.1
Larsen, M.2
Lieman, D.3
Shparlinski, I.E.4
-
7
-
-
0001170206
-
On the security of Diffie-Hellman bits
-
Singapore 1999, Birkhäuser
-
M. I. González Vasco and I. E. Shparlinski, On the security of Diffie-Hellman bits, Proc. Workshop on Cryptography and ComputationalNum ber Theory, Singapore 1999, Birkhäuser, 2001, 257–268.
-
(2001)
Proc. Workshop on Cryptography and Computationalnum Ber Theory
, pp. 257-268
-
-
González Vasco, M.I.1
Shparlinski, I.E.2
-
8
-
-
84880912593
-
Security of the most significant bits of the Shamir message passing scheme
-
(to appear)
-
M. I. González Vasco and I. E. Shparlinski, Security of the most significant bits of the Shamir message passing scheme, Math. Comp. (to appear).
-
Math. Comp
-
-
González Vasco, M.I.1
Shparlinski, I.E.2
-
10
-
-
0000351029
-
Algorithmic geometry of numbers
-
R. Kannan, Algorithmic geometry of numbers, Annual Review of Comp. Sci., 2 (1987), 231–267.
-
(1987)
Annual Review of Comp. Sci.
, vol.2
, pp. 231-267
-
-
Kannan, R.1
-
11
-
-
0000126406
-
Minkowski’s convex body theorem and integer programming
-
R. Kannan, Minkowski’s convex body theorem and integer programming, Math. Of Oper. Research, 12 (1987), 231–267.
-
(1987)
Math. of Oper. Research
, vol.12
, pp. 231-267
-
-
Kannan, R.1
-
13
-
-
34250244723
-
Factoring polynomials with rational coefficients
-
A. K. Lenstra, H. W. Lenstra and L. Lovász, Factoring polynomials with rational coefficients, Mathematische Annalen, 261 (1982), 515–534.
-
(1982)
Mathematische Annalen
, vol.261
, pp. 515-534
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Lovász, L.3
-
14
-
-
84974628135
-
The XTR public key system
-
A. K. Lenstra and E. R. Verheul, The XTR public key system, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1880 (2000), 1–19.
-
(2000)
Lect. Notes in Comp. Sci., Springer-Verlag, Berlin
, vol.1880
, pp. 1-19
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
15
-
-
84937417792
-
Key improvements to XTR
-
A. K. Lenstra and E. R. Verheul, Key improvements to XTR, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1976 (2000), 220–233.
-
(2000)
Lect. Notes in Comp. Sci., Springer-Verlag, Berlin
, vol.1976
, pp. 220-233
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
18
-
-
0141898671
-
The dark side of the Hidden Number Problem: Lattice attacks on DSA
-
Singapore 1999, Birkhäuser
-
P. Q. Nguyen, The dark side of the Hidden Number Problem: Lattice attacks on DSA, Proc. Workshop on Cryptography and ComputationalNum ber Theory, Singapore 1999, Birkhäuser, 2001, 321–330.
-
(2001)
Proc. Workshop on Cryptography and Computationalnum Ber Theory
, pp. 321-330
-
-
Nguyen, P.Q.1
-
19
-
-
84974706930
-
-
The insecurity of the Digital Signature Algorithm with partially known nonces, Preprint
-
P. Q. Nguyen and I. E. Shparlinski, The insecurity of the Digital Signature Algorithm with partially known nonces, Preprint, 2000, 1–26.
-
(2000)
, pp. 1-26
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
-
20
-
-
84974669532
-
-
The insecurity of the elliptic curve Digital Signature Algorithm with partially known nonces, Preprint
-
P. Q. Nguyen and I. E. Shparlinski, The insecurity of the elliptic curve Digital Signature Algorithm with partially known nonces, Preprint, 2001, 1–16.
-
(2001)
, pp. 1-16
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
-
21
-
-
33846870481
-
Lattice reduction in cryptology: An update
-
P. Q. Nguyen and J. Stern, Lattice reduction in cryptology: An update, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1838 (2000), 85–112.
-
(2000)
Lect. Notes in Comp. Sci., Springer-Verlag, Berlin
, vol.1838
, pp. 85-112
-
-
Nguyen, P.Q.1
Stern, J.2
-
22
-
-
84974730127
-
-
Boston, MA, Springer-Verlag, Berlin, (to appear)
-
P. Q. Nguyen and J. Stern, ‘The two faces of lattices in cryptology’, Proc. Workshop on Lattices and Cryptography, Boston, MA, 2001, Springer-Verlag, Berlin, (to appear).
-
(2001)
The Two Faces of Lattices in Cryptology, Proc. Workshop on Lattices and Cryptography
-
-
Nguyen, P.Q.1
Stern, J.2
-
23
-
-
0023532388
-
A hierarchy of polynomial time basis reduction algorithms
-
C. P. Schnorr, A hierarchy of polynomial time basis reduction algorithms, Theor. Comp. Sci., 53 (1987), 201–224.
-
(1987)
Theor. Comp. Sci.
, vol.53
, pp. 201-224
-
-
Schnorr, C.P.1
-
24
-
-
84974723519
-
-
Security of polynomial transformations of the Diffie–Hellman key, Preprint
-
I. E. Shparlinski, Security of polynomial transformations of the Diffie–Hellman key, Preprint, 2000, 1–8.
-
(2000)
, pp. 1-8
-
-
Shparlinski, I.E.1
-
25
-
-
0034830272
-
Sparse polynomial approximation in finite fields
-
I. E. Shparlinski, Sparse polynomial approximation in finite fields, Proc. 33rd ACM Symp. on Theory of Comput., Crete, Greece, July 6-8, 2001, 209–215.
-
(2001)
Proc. 33Rd ACM Symp. on Theory of Comput., Crete, Greece, July
, vol.6
, Issue.8
, pp. 209-215
-
-
Shparlinski, I.E.1
-
26
-
-
84957801117
-
Certificates of recoverability with scalable recovery agent security
-
E. R. Verheul, Certificates of recoverability with scalable recovery agent security, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1751 (2000), 258–275.
-
(2000)
Lect. Notes in Comp. Sci., Springer-Verlag, Berlin
, vol.1751
, pp. 258-275
-
-
Verheul, E.R.1
|