Pages that link to "Item:Q3452347"
From MaRDI portal
The following pages link to Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes (Q3452347):
Displaying 46 items.
- (EC)DSA lattice attacks based on Coppersmith's method (Q280950) (← links)
- Secret sets and applications (Q293178) (← links)
- On the bit security of the weak Diffie-Hellman problem (Q407550) (← links)
- On the modular inversion hidden number problem (Q412197) (← links)
- Finding shortest lattice vectors faster using quantum search (Q887421) (← links)
- Security of polynomial transformations of the Diffie-Hellman key. (Q1418189) (← links)
- Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator (Q1650812) (← links)
- Analysis of hidden number problem with hidden multiplier (Q1691252) (← links)
- Koblitz curve cryptosystems (Q1779327) (← links)
- On the complexity of the discrete logarithm and Diffie-Hellman problems (Q1827563) (← links)
- Noisy Chinese remaindering in the Lee norm (Q1827579) (← links)
- Security of most significant bits of \(g^{x^{2}}\). (Q1853041) (← links)
- Noisy polynomial interpolation modulo prime powers (Q2034569) (← links)
- Security of hedged Fiat-Shamir signatures under fault attacks (Q2055633) (← links)
- On bounded distance decoding with predicate: breaking the ``lattice barrier'' for the hidden number problem (Q2056699) (← links)
- RSA key recovery from digit equivalence information (Q2096611) (← links)
- Attacking ECDSA leaking discrete bits with a more efficient lattice (Q2151304) (← links)
- Integer LWE with non-subgaussian error and related attacks (Q2154034) (← links)
- The security of all private-key bits in isogeny-based schemes (Q2185742) (← links)
- Characterizing overstretched NTRU attacks (Q2191207) (← links)
- Cryptanalysis of elliptic curve hidden number problem from PKC 2017 (Q2291665) (← links)
- Close values of shifted modular inversions and the decisional modular inversion hidden number problem (Q2346709) (← links)
- Limits of a conjecture on a leakage-resilient cryptosystem (Q2445905) (← links)
- Noisy interpolation of sparse polynomials in finite fields (Q2491980) (← links)
- Security of the most significant bits of the Shamir message passing scheme (Q2759102) (← links)
- Safe-Errors on SPA Protected Implementations with the Atomicity Technique (Q2803660) (← links)
- Bit Security of the CDH Problems over Finite Fields (Q2807226) (← links)
- RSA and Elliptic Curve Least Significant Bit Security (Q2946472) (← links)
- The Multivariate Hidden Number Problem (Q2947535) (← links)
- On the Security of Supersingular Isogeny Cryptosystems (Q2958115) (← links)
- Toward Compact Public Key Encryption Based on CDH Assumption via Extended Twin DH Assumption (Q3092354) (← links)
- Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes (Q3452347) (← links)
- Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm (Q3454866) (← links)
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption (Q3600382) (← links)
- The Hidden Root Problem (Q3600495) (← links)
- Optimal Randomness Extraction from a Diffie-Hellman Element (Q3627458) (← links)
- Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation (Q4806399) (← links)
- Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption (Q4933224) (← links)
- Evaluating the Cache Side Channel Attacks Against ECDSA (Q5040404) (← links)
- A Tale of Three Signatures: Practical Attack of ECDSA with wNAF (Q5048983) (← links)
- The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance (Q5188548) (← links)
- A hidden number problem in small subgroups (Q5315437) (← links)
- On the Bit Security of Elliptic Curve Diffie–Hellman (Q5738794) (← links)
- Minicrypt primitives with algebraic structure and applications (Q5925579) (← links)
- On the statistical properties of Diffie-Hellman distributions (Q5932009) (← links)
- Generalized attack on ECDSA: known bits in arbitrary positions (Q6063142) (← links)