A public-key cryptosystem with worst-case/average-case equivalence
暂无分享,去创建一个
[1] Daniel M. Gordon,et al. Discrete Logarithms in GF(P) Using the Number Field Sieve , 1993, SIAM J. Discret. Math..
[2] F. Thorne,et al. Geometry of Numbers , 2017, Algebraic Number Theory.
[3] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[4] Dan Boneh,et al. Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes , 1996, CRYPTO.
[5] Jeffrey C. Lagarias,et al. Solving low density subset sum problems , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[6] Leonard M. Adleman,et al. On breaking generalized knapsack public key cryptosystems , 1983, STOC.
[7] J. G. Pierce,et al. Geometric Algorithms and Combinatorial Optimization , 2016 .
[8] Miklós Ajtai,et al. Generating hard instances of lattice problems (extended abstract) , 1996, STOC '96.
[9] Johan Håstad,et al. Solving Simultaneous Modular Equations of Low Degree , 1988, SIAM J. Comput..
[10] Journal of the Association for Computing Machinery , 1961, Nature.
[11] Adi Shamir,et al. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem , 1984, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[12] Don Coppersmith,et al. Finding a Small Root of a Univariate Modular Equation , 1996, EUROCRYPT.
[13] Oded Goldreich,et al. Public-Key Cryptosystems from Lattice Reduction Problems , 1996, CRYPTO.
[14] Miklós Ajtai,et al. Generating Hard Instances of Lattice Problems , 1996, Electron. Colloquium Comput. Complex..
[15] C. A. Rogers,et al. An Introduction to the Geometry of Numbers , 1959 .
[16] Whitfield Diffie. The first ten years of public-key cryptography , 1988 .
[17] Oded Goldreich,et al. Foundations of Cryptography (Fragments of a Book) , 1995 .
[18] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.