Bit Security of the CDH Problems over Finite Fields
From MaRDI portal
Publication:2807226
Recommendations
- On the bit security of cryptographic primitives
- Bit security of the hyperelliptic curves Diffie-Hellman problem
- Revisiting homomorphic encryption schemes for finite fields
- On finite fields for pairing based cryptography
- On the bit security of the weak Diffie-Hellman problem
- scientific article; zbMATH DE number 927439
- Finite fields and cryptology
- scientific article; zbMATH DE number 426144
- Partially homomorphic encryption schemes over finite fields
- On the bit security of elliptic curve Diffie-Hellman
Cites work
- scientific article; zbMATH DE number 3882549 (Why is no real title available?)
- scientific article; zbMATH DE number 1842493 (Why is no real title available?)
- scientific article; zbMATH DE number 1440062 (Why is no real title available?)
- A generalization of Komlós's theorem on random matrices
- A new index calculus algorithm with complexity \(L(1/4+o(1))\) in small characteristic
- A public key cryptosystem and a signature scheme based on discrete logarithms
- All bits in \(ax + b\bmod p\) are hard
- Hard-core predicates for a Diffie-Hellman problem over finite fields
- Hardness of computing individual bits for one-way functions on elliptic curves
- Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- Modern computer algebra
- New directions in cryptography
- Probabilistic encryption
- RSA and Rabin Functions: Certain Parts are as Hard as the Whole
- Security of polynomial transformations of the Diffie-Hellman key.
- The Security of All Bits Using List Decoding
- The multivariate hidden number problem
Cited in
(4)
This page was built for publication: Bit Security of the CDH Problems over Finite Fields
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807226)