메뉴 건너뛰기




Volumn 2227, Issue , 2001, Pages 268-277

On the generalised hidden number problem and bit security of XTR

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84974695972     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45624-4_28     Document Type: Conference Paper
Times cited : (13)

References (26)
  • 1
    • 84955621986 scopus 로고    scopus 로고
    • Hardness of computing the most significant bits of secret keys in Diffie–Hellman and related schemes
    • D. Boneh and R. Venkatesan, Hardness of computing the most significant bits of secret keys in Diffie–Hellman and related schemes, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1109 (1996), 129–142.
    • (1996) Lect. Notes in Comp. Sci., Springer-Verlag, Berlin , vol.1109 , pp. 129-142
    • Boneh, D.1    Venkatesan, R.2
  • 2
    • 0030781798 scopus 로고    scopus 로고
    • Rounding in lattices and its cryptographic applications
    • Algorithms, ACM, NY
    • D. Boneh and R. Venkatesan, Rounding in lattices and its cryptographic applications, Proc. 8th AnnualA CM-SIAM Symp. on Discr. Algorithms, ACM, NY, 1997, 675–681.
    • (1997) Proc. 8Th Annuala CM-SIAM Symp. on Discr , pp. 675-681
    • Boneh, D.1    Venkatesan, R.2
  • 5
    • 84880910493 scopus 로고    scopus 로고
    • The insecurity of Nyberg–Rueppel and other DSA-like signature schemes with partially known nonces
    • Boston, MA, 2001 (to appear)
    • E. ElMahassni, P. Q. Nguyen and I. E. Shparlinski, The insecurity of Nyberg–Rueppel and other DSA-like signature schemes with partially known nonces, Proc. Workshop on Lattices and Cryptography, Boston, MA, 2001 (to appear).
    • Proc. Workshop on Lattices and Cryptography
    • Elmahassni, E.1    Nguyen, P.Q.2    Shparlinski, I.E.3
  • 8
    • 84880912593 scopus 로고    scopus 로고
    • Security of the most significant bits of the Shamir message passing scheme
    • (to appear)
    • M. I. González Vasco and I. E. Shparlinski, Security of the most significant bits of the Shamir message passing scheme, Math. Comp. (to appear).
    • Math. Comp
    • González Vasco, M.I.1    Shparlinski, I.E.2
  • 10
    • 0000351029 scopus 로고
    • Algorithmic geometry of numbers
    • R. Kannan, Algorithmic geometry of numbers, Annual Review of Comp. Sci., 2 (1987), 231–267.
    • (1987) Annual Review of Comp. Sci. , vol.2 , pp. 231-267
    • Kannan, R.1
  • 11
    • 0000126406 scopus 로고
    • Minkowski’s convex body theorem and integer programming
    • R. Kannan, Minkowski’s convex body theorem and integer programming, Math. Of Oper. Research, 12 (1987), 231–267.
    • (1987) Math. of Oper. Research , vol.12 , pp. 231-267
    • Kannan, R.1
  • 13
  • 18
    • 0141898671 scopus 로고    scopus 로고
    • The dark side of the Hidden Number Problem: Lattice attacks on DSA
    • Singapore 1999, Birkhäuser
    • P. Q. Nguyen, The dark side of the Hidden Number Problem: Lattice attacks on DSA, Proc. Workshop on Cryptography and ComputationalNum ber Theory, Singapore 1999, Birkhäuser, 2001, 321–330.
    • (2001) Proc. Workshop on Cryptography and Computationalnum Ber Theory , pp. 321-330
    • Nguyen, P.Q.1
  • 19
    • 84974706930 scopus 로고    scopus 로고
    • The insecurity of the Digital Signature Algorithm with partially known nonces, Preprint
    • P. Q. Nguyen and I. E. Shparlinski, The insecurity of the Digital Signature Algorithm with partially known nonces, Preprint, 2000, 1–26.
    • (2000) , pp. 1-26
    • Nguyen, P.Q.1    Shparlinski, I.E.2
  • 20
    • 84974669532 scopus 로고    scopus 로고
    • The insecurity of the elliptic curve Digital Signature Algorithm with partially known nonces, Preprint
    • P. Q. Nguyen and I. E. Shparlinski, The insecurity of the elliptic curve Digital Signature Algorithm with partially known nonces, Preprint, 2001, 1–16.
    • (2001) , pp. 1-16
    • Nguyen, P.Q.1    Shparlinski, I.E.2
  • 23
    • 0023532388 scopus 로고
    • A hierarchy of polynomial time basis reduction algorithms
    • C. P. Schnorr, A hierarchy of polynomial time basis reduction algorithms, Theor. Comp. Sci., 53 (1987), 201–224.
    • (1987) Theor. Comp. Sci. , vol.53 , pp. 201-224
    • Schnorr, C.P.1
  • 24
    • 84974723519 scopus 로고    scopus 로고
    • Security of polynomial transformations of the Diffie–Hellman key, Preprint
    • I. E. Shparlinski, Security of polynomial transformations of the Diffie–Hellman key, Preprint, 2000, 1–8.
    • (2000) , pp. 1-8
    • Shparlinski, I.E.1
  • 26
    • 84957801117 scopus 로고    scopus 로고
    • Certificates of recoverability with scalable recovery agent security
    • E. R. Verheul, Certificates of recoverability with scalable recovery agent security, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1751 (2000), 258–275.
    • (2000) Lect. Notes in Comp. Sci., Springer-Verlag, Berlin , vol.1751 , pp. 258-275
    • Verheul, E.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.