Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes
- 1 January 1996
- book chapter
- Published by Springer Nature
- p. 129-142
- https://doi.org/10.1007/3-540-68697-5_11
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Relationships among the Computational Powers of Breaking Discrete Log CryptosystemsPublished by Springer Nature ,1995
- Block Reduced Lattice Bases and Successive MinimaCombinatorics, Probability and Computing, 1994
- Reconstructing Truncated Integer Variables Satisfying Linear CongruencesSIAM Journal on Computing, 1988
- RSA and Rabin Functions: Certain Parts are as Hard as the WholeSIAM Journal on Computing, 1988
- A hierarchy of polynomial time lattice basis reduction algorithmsTheoretical Computer Science, 1987
- A Course in Number Theory and CryptographyPublished by Springer Nature ,1987
- On Lovász’ lattice reduction and the nearest lattice point problemCombinatorica, 1986
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Factoring polynomials with rational coefficientsMathematische Annalen, 1982
- New directions in cryptographyIEEE Transactions on Information Theory, 1976