Candidate multilinear maps from ideal lattices

S Garg, C Gentry, S Halevi - … 32nd Annual International Conference on the …, 2013 - Springer
We describe plausible lattice-based constructions with properties that approximate the
sought-after multilinear maps in hard-discrete-logarithm groups, and show an example …

Order-preserving symmetric encryption

A Boldyreva, N Chenette, Y Lee, A O'neill - Advances in Cryptology …, 2009 - Springer
We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a
primitive suggested in the database community by Agrawal et al.(SIGMOD'04) for allowing …

Approximate integer common divisors

N Howgrave-Graham - International cryptography and lattices conference, 2001 - Springer
We show that recent results of Coppersmith, Boneh, Durfee and Howgrave-Graham actually
apply in the more general setting of (partially) approximate common divisors. This leads us …

The two faces of lattices in cryptology

PQ Nguyen, J Stern - International Cryptography and Lattices Conference, 2001 - Springer
Lattices are regular arrangements of points in n-dimensional space, whose study appeared
in the 19th century in both number theory and crystallography. Since the appearance of the …

[PDF][PDF] Fast variants of RSA

D Boneh, H Shacham - CryptoBytes, 2002 - cs.nmsu.edu
Fast Variants of RSA Page 1 Fast Variants of RSA Dan Boneh dabo@cs.stanford.edu Hovav
Shacham hovav@cs.stanford.edu Abstract We survey three variants of RSA designed to speed …

[PDF][PDF] New RSA vulnerabilities using lattice reduction methods.

A May - 2003 - Citeseer
New RSA Vulnerabilities Using Lattice Reduction Methods Page 1 New RSA Vulnerabilities
Using Lattice Reduction Methods Dissertation Thesis by Alexander May October 19, 2003 Page …

[图书][B] Cryptanalysis of RSA and its variants

MJ Hinek - 2009 - taylorfrancis.com
Thirty years after RSA was first publicized, it remains an active research area. Although
several good surveys exist, they are either slightly outdated or only focus on one type of …

[图书][B] Cryptographic applications of analytic number theory: complexity lower bounds and pseudorandomness

I Shparlinski - 2013 - books.google.com
The book introduces new techniques that imply rigorous lower bounds on the com plexity of
some number-theoretic and cryptographic problems. It also establishes certain attractive …

Post-quantum RSA

DJ Bernstein, N Heninger, P Lou, L Valenta - Post-Quantum Cryptography …, 2017 - Springer
This paper proposes RSA parameters for which (1) key generation, encryption, decryption,
signing, and verification are feasible on today's computers while (2) all known attacks are …

Using LLL-reduction for solving RSA and factorization problems

A May - The LLL Algorithm: Survey and Applications, 2009 - Springer
Twenty five years ago, Lenstra, Lenstra and Lovász presented their celebrated LLL lattice
reduction algorithm. Among the various applications of the LLL algorithm is a method due to …