RSA and elliptic curve least significant bit security
From MaRDI portal
Publication:2946472
DOI10.1007/978-3-319-16295-9_8zbMATH Open1378.94059OpenAlexW939065709MaRDI QIDQ2946472FDOQ2946472
Authors: Dionathan Nakamura, Routo Terada
Publication date: 17 September 2015
Published in: Progress in Cryptology - LATINCRYPT 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16295-9_8
Recommendations
Cites Work
- Title not available (Why is that?)
- A method for obtaining digital signatures and public-key cryptosystems
- New directions in cryptography
- Title not available (Why is that?)
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes
- Practical Chosen Ciphertext Secure Encryption from Factoring
- A Simple Unpredictable Pseudo-Random Number Generator
- RSA and Rabin Functions: Certain Parts are as Hard as the Whole
- Optimal Randomness Extraction from a Diffie-Hellman Element
- On the bit security of the weak Diffie-Hellman problem
- Stronger security proofs for RSA and Rabin bits.
- Selecting cryptographic key sizes
- Computational problems associated with Racah algebra
- Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys
- Systolic VLSI Arrays for Polynomial GCD Computation
- Title not available (Why is that?)
Cited In (2)
This page was built for publication: RSA and elliptic curve least significant bit security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946472)