On the statistical properties of Diffie-Hellman distributions
暂无分享,去创建一个
[1] D. Hone. Algorithms for Black-Box Fields and their Application to Cryptography , 2002 .
[2] A. Harles. Sieve Methods , 2001 .
[3] Igor E. Shparlinski,et al. On Certain Exponential Sums and the Distribution of Diffie–Hellman Triples , 1999 .
[4] Igor E. Shparlinski,et al. On The Correlation Of Binary M-sequences , 1999, Des. Codes Cryptogr..
[5] Igor E. Shparlinski. Number Theoretic Methods in Cryptography: Complexity lower bounds , 1999 .
[6] Igor E. Shparlinski,et al. Number Theoretic Methods in Cryptography , 1999 .
[7] Igor E. Shparlinski. Finite Fields: Theory and Computation , 1999 .
[8] I. Shparlinski,et al. Character Sums with Exponential Functions and their Applications: Multiplicative Translations of Arbitrary Sets Modulo p , 1999 .
[9] Glyn Harman,et al. Shifted primes without large prime factors , 1998 .
[10] Igor E. Shparlinski,et al. On the Distribution of the RSA Generator , 1998, SETA.
[11] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[12] Ran Canetti,et al. Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information , 1997, CRYPTO.
[13] Victor Shoup,et al. Lower Bounds for Discrete Logarithms and Related Problems , 1997, EUROCRYPT.
[14] Dan Boneh,et al. Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes , 1996, CRYPTO.
[15] U. Maurer,et al. On the complexity of breaking the Diffie-Hellman protocol , 1996 .
[16] Oded Goldreich,et al. Foundations of Cryptography (Fragments of a Book) , 1995 .
[17] Ueli Maurer,et al. Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms , 1994, CRYPTO.
[18] H. Montgomery. Ten lectures on the interface between analytic number theory and harmonic analysis , 1994 .
[19] Stefan A. Brands,et al. An Efficient Off-line Electronic Cash System Based On The Representation Problem. , 1993 .
[20] Francesco Pappalardi,et al. On Artin's Conjecture for Primitive Roots , 1993 .
[21] Igor E. Shparlinski,et al. On the number of zeros of exponential polynomials and related questions , 1992, Bulletin of the Australian Mathematical Society.
[22] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[23] N. M. Korobov. Exponential Sums and their Applications , 1992 .
[24] Torben P. Pedersen. Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.
[25] S. A. Stepanov,et al. On the construction of primitive elements and primitive normal bases in a finite field , 1991 .
[26] Adi Shamir,et al. The discrete log is very discreet , 1990, STOC '90.
[27] S A Stepanov,et al. ON THE CONSTRUCTION OF A PRIMITIVE NORMAL BASIS IN A FINITE FIELD , 1990 .
[28] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[29] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[30] A. Taher. Cryptography and logarithms over finite fields , 1984 .
[31] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[32] Rudolf Lide,et al. Finite fields , 1983 .
[33] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.
[34] J. Chalk,et al. The Vinogradov-Mordell-Tietäväinen inequalities , 1980 .
[35] H. Niederreiter. Quasi-Monte Carlo methods and pseudo-random numbers , 1978 .
[36] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[37] N M Korobov. ON THE DISTRIBUTION OF DIGITS IN PERIODIC FRACTIONS , 1972 .
[38] H. Weyl. Über die Gleichverteilung von Zahlen mod. Eins , 1916 .