Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
暂无分享,去创建一个
[1] Victor Shoup,et al. Lower Bounds for Discrete Logarithms and Related Problems , 1997, EUROCRYPT.
[2] L. Babai,et al. Groups St Andrews 1997 in Bath, I: A polynomial-time theory of black box groups I , 1999 .
[3] Moti Yung,et al. Non-interactive cryptocomputing for NC/sup 1/ , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[4] H. Niederreiter,et al. Finite Fields: Encyclopedia of Mathematics and Its Applications. , 1997 .
[5] Rudolf Lide,et al. Finite fields , 1983 .
[6] Ueli Maurer,et al. The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms , 1999, SIAM J. Comput..
[7] V. Rich. Personal communication , 1989, Nature.
[8] Endre Szemerédi,et al. On the Complexity of Matrix Group Problems I , 1984, FOCS.
[9] Niv Ahituv,et al. Processing encrypted data , 1987, CACM.
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Ueli Maurer,et al. Abstract Models of Computation in Cryptography , 2005, IMACC.
[12] Arjen K. Lenstra,et al. Factorization of Polynomials , 1983 .
[13] Richard J. Lipton,et al. Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract) , 1996, CRYPTO.
[14] H. Lenstra. Finding isomorphisms between finite fields , 1991 .
[15] Jeffrey Shallit,et al. Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.
[16] Josep Domingo-Ferrer,et al. A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.
[17] Ueli Maurer,et al. Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms , 1994, CRYPTO.
[18] Joachim von zur Gathen,et al. Factoring Polynomials over Special Finite Fields , 2001 .