Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/314161.314413acmconferencesArticle/Chapter ViewAbstractPublication PagessodaConference Proceedingsconference-collections
Article
Free access

Rounding in lattices and its cryptographic applications

Published: 05 January 1997 Publication History
First page of PDF

References

[1]
M. Ajt~i, ~Generating H~rd Instances for Lattice Problems", STOC 96.]]
[2]
L. Bahai. On Lovasz' lattice reduction and the nearest lattice point problem. Combinatorica, 6:1-13, 1986.]]
[3]
D. Boneh, Venk~tesan R., "Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes~, Proc. of Crypto, 1996.]]
[4]
W. Diflie, Hellman E.M., "New directions in cryptography", IEEE. Trans. Inform. Theory, IT-22, No. 6, pp 644-654. (nov 1976)]]
[5]
T. Elgamal, ~A public-key crypto system and a signature scheme baaed on Discrete Logarithms", IEEE Trans. on Info. Theory, IT-31, No 4, pp 469-472. (july]]
[6]
Grotschel, Lovaaz L, Schrijex, "Geometric Algorithms and Combinatorial Optimization", Springer Verlag, 1988.]]
[7]
R. impagliazzo, Naor M., "Efficient cryptographic schemes provably as secure as subset sum", Proc. FOGS 1989, pp. 236-241.]]
[8]
D. Shmoys, ~Computing near-optimal solutions to combinatorial optimization problems," in Combinatorial Optimization: Papers from the DIMACS special year, Dimacs: Series in Discrete Mathematics and Theoretical Computer Science, Vol 20, 1995.]]
[9]
N. Koblitz, "A course in Number Theory and Cryptography", Springer Verlag 1987.]]
[10]
U. Maurer, "Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms", Proc. of Crypto, 1994, pp. 271-281.]]
[11]
T. Okamoto, "Encryption and Authentication Schemes Based on Public Key Systems, Ph. D Thesis, The Univ. of Tokyo, (1988).]]
[12]
K. Sakurai, Shizuya H, "Relationships among Computational powers of Breaking Discrete Log Cryptosysterns', Eurocrypt 95, pp 341-351.]]

Cited By

View all
  • (2015)Mind Your Nonces MovingProceedings of the 10th ACM Symposium on Information, Computer and Communications Security10.1145/2714576.2714587(609-614)Online publication date: 14-Apr-2015
  • (2014)Secure and efficient random functions with variable-length outputJournal of Network and Computer Applications10.1016/j.jnca.2014.07.03345:C(121-133)Online publication date: 1-Oct-2014
  • (2014)Modular Inversion Hidden Number Problem RevisitedProceedings of the 10th International Conference on Information Security Practice and Experience - Volume 843410.1007/978-3-319-06320-1_39(537-551)Online publication date: 5-May-2014
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SODA '97: Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms
January 1997
788 pages
ISBN:0898713900

Sponsors

Publisher

Society for Industrial and Applied Mathematics

United States

Publication History

Published: 05 January 1997

Check for updates

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 411 of 1,322 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)48
  • Downloads (Last 6 weeks)9
Reflects downloads up to 01 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2015)Mind Your Nonces MovingProceedings of the 10th ACM Symposium on Information, Computer and Communications Security10.1145/2714576.2714587(609-614)Online publication date: 14-Apr-2015
  • (2014)Secure and efficient random functions with variable-length outputJournal of Network and Computer Applications10.1016/j.jnca.2014.07.03345:C(121-133)Online publication date: 1-Oct-2014
  • (2014)Modular Inversion Hidden Number Problem RevisitedProceedings of the 10th International Conference on Information Security Practice and Experience - Volume 843410.1007/978-3-319-06320-1_39(537-551)Online publication date: 5-May-2014
  • (2012)Hardness of Computing Individual Bits for One-Way Functions on Elliptic CurvesProceedings of the 32nd Annual Cryptology Conference on Advances in Cryptology --- CRYPTO 2012 - Volume 741710.1007/978-3-642-32009-5_48(832-849)Online publication date: 19-Aug-2012
  • (2009)Non-mitotic setsTheoretical Computer Science10.1016/j.tcs.2008.12.043410:21-23(2011-2023)Online publication date: 1-May-2009
  • (2008)The complexity of unions of disjoint setsJournal of Computer and System Sciences10.1016/j.jcss.2008.05.00174:7(1173-1187)Online publication date: 1-Nov-2008
  • (2008)The Hidden Root ProblemProceedings of the 2nd international conference on Pairing-Based Cryptography10.1007/978-3-540-85538-5_6(89-99)Online publication date: 1-Sep-2008
  • (2007)Non-mitotic setsProceedings of the 27th international conference on Foundations of software technology and theoretical computer science10.5555/1781794.1781808(146-157)Online publication date: 12-Dec-2007
  • (2007)On the bits of elliptic curve Diffie-Hellman KeysProceedings of the cryptology 8th international conference on Progress in cryptology10.5555/1777898.1777904(33-47)Online publication date: 9-Dec-2007
  • (2007)The complexity of unions of disjoint setsProceedings of the 24th annual conference on Theoretical aspects of computer science10.5555/1763424.1763455(248-259)Online publication date: 22-Feb-2007
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media