Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems
暂无分享,去创建一个
Jeffrey C. Lagarias | Ernest F. Brickell | Andrew M. Odlyzko | E. Brickell | A. Odlyzko | J. Lagarias
[1] Jeffrey C. Lagarias,et al. Knapsack Public Key Cryptosystems and Diophantine Approximation , 1983, CRYPTO.
[2] David Chaum,et al. Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .
[3] Leonard M. Adleman,et al. On breaking generalized knapsack public key cryptosystems , 1983, STOC.
[4] Andrew M. Odlyzko,et al. Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir's fast signature scheme , 1984, IEEE Trans. Inf. Theory.
[5] Leonard M. Adleman,et al. On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem , 1982, CRYPTO.
[6] Abraham Lempel,et al. Cryptology in Transition , 1979, CSUR.
[7] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[8] László Lovász,et al. Factoring polynomials with rational coefficients , 1982 .
[9] Jeffrey C. Lagarias,et al. Solving low density subset sum problems , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[10] A. Shamir. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem , 1982, FOCS 1982.