scientific article
From MaRDI portal
Publication:2739436
zbMath0980.94010MaRDI QIDQ2739436
Jacques Stern, Phong Q. Nguyen
Publication date: 28 February 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
cryptographycryptanalysislatticescryptologyLLL algorithmhidden number problemNTRU cryptosystemlattice-based cryptosystemsAjtai-Dwork cryptosystemGoldreich-Goldwasser-Halevi cryptosystemsmall roots of polynomial equations
Related Items (16)
Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation ⋮ Lattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSA ⋮ Recovering zeros of polynomials modulo a prime ⋮ Correcting noisy exponentiation black-boxes modulo a prime ⋮ Reconstructing points of superelliptic curves over a prime finite field ⋮ The better bound of private key in RSA with unbalanced primes ⋮ Lattice-Based Fault Attacks Against ECMQV ⋮ Lattice Algorithms for Compression Color Space Estimation in JPEG Images ⋮ Security of the most significant bits of the Shamir message passing scheme ⋮ Fast LLL-type lattice reduction ⋮ Cryptanalysis of a quadratic knapsack cryptosystem ⋮ Noisy interpolation of sparse polynomials in finite fields ⋮ Predicting nonlinear pseudorandom number generators ⋮ Noisy polynomial interpolation modulo prime powers ⋮ Cryptanalysis of a knapsack-based probabilistic encryption scheme ⋮ Noisy Chinese remaindering in the Lee norm
Uses Software
This page was built for publication: