Low-density attack revisited
暂无分享,去创建一个
Takeshi Koshiba | Takeshi Shimoyama | Jun Kogure | Tetsuya Izu | Takeshi Koshiba | T. Izu | Takeshi Shimoyama | Jun Kogure
[1] Serge Vaudenay,et al. Cryptanalysis of the Chor-Rivest Cryptosystem , 1998, CRYPTO.
[2] A. Shamir. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem , 1982, FOCS 1982.
[3] Claus-Peter Schnorr,et al. Attacking the Chor-Rivest Cryptosystem by Improved Lattice Reduction , 1995, EUROCRYPT.
[4] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[5] Ronald L. Rivest,et al. A knapsack-type public key cryptosystem based on arithmetic in finite fields , 1988, IEEE Trans. Inf. Theory.
[6] Antoine Joux,et al. Improved low-density subset sum algorithms , 1992, computational complexity.
[7] Jeffrey C. Lagarias,et al. Solving low density subset sum problems , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[8] Ernest F. Brickell,et al. Breaking Iterated Knapsacks , 1985, CRYPTO.
[9] A. Odlyzko,et al. Lattice points in high-dimensional spheres , 1990 .
[10] Claus-Peter Schnorr,et al. Lattice Basis Reduction: Improved Practical Algorithms and Solving Subset Sum Problems , 1991, FCT.
[11] László Lovász,et al. Factoring polynomials with rational coefficients , 1982 .
[12] Keisuke Tanaka,et al. Quantum Public-Key Cryptosystems , 2000, CRYPTO.
[13] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[14] Phong Q. Nguyen. The Two Faces of Lattices in Cryptology , 2001, Selected Areas in Cryptography.