The following pages link to (Q4474164):
Displaying 16 items.
- On the modular inversion hidden number problem (Q412197) (← links)
- QUAD: A multivariate stream cipher with provable security (Q733512) (← links)
- Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator (Q1650812) (← links)
- Cryptanalysis of elliptic curve hidden number problem from PKC 2017 (Q2291665) (← links)
- Close values of shifted modular inversions and the decisional modular inversion hidden number problem (Q2346709) (← links)
- More efficient DDH pseudorandom generators (Q2380399) (← links)
- Limits of a conjecture on a leakage-resilient cryptosystem (Q2445905) (← links)
- Recovering zeros of polynomials modulo a prime (Q3189458) (← links)
- Predicting nonlinear pseudorandom number generators (Q4671848) (← links)
- Using LLL-Reduction for Solving RSA and Factorization Problems (Q5188546) (← links)
- On the Bit Security of Elliptic Curve Diffie–Hellman (Q5738794) (← links)
- Reconstructing points of superelliptic curves over a prime finite field (Q6089463) (← links)
- The hidden number problem with small unknown multipliers: cryptanalyzing MEGA in six queries and other applications (Q6091132) (← links)
- Zero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejection (Q6132417) (← links)
- Improving bounds on elliptic curve hidden number problem for ECDH key exchange (Q6135458) (← links)
- Fast practical lattice reduction through iterated compression (Q6145939) (← links)