Candidate multilinear maps from ideal lattices
We describe plausible lattice-based constructions with properties that approximate the
sought-after multilinear maps in hard-discrete-logarithm groups, and show an example …
sought-after multilinear maps in hard-discrete-logarithm groups, and show an example …
Order-preserving symmetric encryption
We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a
primitive suggested in the database community by Agrawal et al.(SIGMOD'04) for allowing …
primitive suggested in the database community by Agrawal et al.(SIGMOD'04) for allowing …
Approximate integer common divisors
N Howgrave-Graham - International cryptography and lattices conference, 2001 - Springer
We show that recent results of Coppersmith, Boneh, Durfee and Howgrave-Graham actually
apply in the more general setting of (partially) approximate common divisors. This leads us …
apply in the more general setting of (partially) approximate common divisors. This leads us …
The two faces of lattices in cryptology
PQ Nguyen, J Stern - International Cryptography and Lattices Conference, 2001 - Springer
Lattices are regular arrangements of points in n-dimensional space, whose study appeared
in the 19th century in both number theory and crystallography. Since the appearance of the …
in the 19th century in both number theory and crystallography. Since the appearance of the …
[PDF][PDF] New RSA vulnerabilities using lattice reduction methods.
A May - 2003 - Citeseer
New RSA Vulnerabilities Using Lattice Reduction Methods Page 1 New RSA Vulnerabilities
Using Lattice Reduction Methods Dissertation Thesis by Alexander May October 19, 2003 Page …
Using Lattice Reduction Methods Dissertation Thesis by Alexander May October 19, 2003 Page …
[图书][B] Cryptanalysis of RSA and its variants
MJ Hinek - 2009 - taylorfrancis.com
Thirty years after RSA was first publicized, it remains an active research area. Although
several good surveys exist, they are either slightly outdated or only focus on one type of …
several good surveys exist, they are either slightly outdated or only focus on one type of …
[图书][B] Cryptographic applications of analytic number theory: complexity lower bounds and pseudorandomness
I Shparlinski - 2013 - books.google.com
The book introduces new techniques that imply rigorous lower bounds on the com plexity of
some number-theoretic and cryptographic problems. It also establishes certain attractive …
some number-theoretic and cryptographic problems. It also establishes certain attractive …
Post-quantum RSA
This paper proposes RSA parameters for which (1) key generation, encryption, decryption,
signing, and verification are feasible on today's computers while (2) all known attacks are …
signing, and verification are feasible on today's computers while (2) all known attacks are …
Using LLL-reduction for solving RSA and factorization problems
A May - The LLL Algorithm: Survey and Applications, 2009 - Springer
Twenty five years ago, Lenstra, Lenstra and Lovász presented their celebrated LLL lattice
reduction algorithm. Among the various applications of the LLL algorithm is a method due to …
reduction algorithm. Among the various applications of the LLL algorithm is a method due to …