On the modular inversion hidden number problem
From MaRDI portal
Publication:412197
DOI10.1016/J.JSC.2011.09.002zbMATH Open1248.11103OpenAlexW2093082154MaRDI QIDQ412197FDOQ412197
Ron Steinfeld, Igor E. Shparlinski, Huaxiong Wang, San Ling
Publication date: 4 May 2012
Published in: Journal of Symbolic Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jsc.2011.09.002
Recommendations
- Close values of shifted modular inversions and the decisional modular inversion hidden number problem
- scientific article; zbMATH DE number 2081057
- New results on Modular Inversion Hidden Number problem and inversive congruential generator
- scientific article; zbMATH DE number 2086222
- Public Key Cryptography – PKC 2004
Symbolic computation and algebraic computation (68W30) Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71)
Cites Work
- A hierarchy of polynomial time lattice basis reduction algorithms
- A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations
- Small solutions to polynomial equations, and low exponent RSA vulnerabilities
- Solving Hidden Number Problem with One Bit Oracle and Advice
- Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes
- An LLL algorithm with quadratic complexity
- An LLL-reduction algorithm with quasi-linear time complexity
- Playing ``hide-and-seek with numbers: the hidden number problem, lattices and exponential sums
- Reconstructing noisy polynomial evaluation in residue rings
- Finding short lattice vectors within Mordell's inequality
- Title not available (Why is that?)
- Predicting nonlinear pseudorandom number generators
- Title not available (Why is that?)
- Cryptography and Coding
- Title not available (Why is that?)
Cited In (11)
- The hidden number problem with non-prime modulus
- Title not available (Why is that?)
- On the Bit Security of Elliptic Curve Diffie–Hellman
- Title not available (Why is that?)
- Zero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejection
- Improving bounds on elliptic curve hidden number problem for ECDH key exchange
- The Hidden Root Problem
- Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator
- Close values of shifted modular inversions and the decisional modular inversion hidden number problem
- Solving Hidden Number Problem with One Bit Oracle and Advice
- Cryptanalysis of elliptic curve hidden number problem from PKC 2017
This page was built for publication: On the modular inversion hidden number problem
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q412197)