×

Found 71 Documents (Results 1–71)

Simplification of the lattice based attack of Boneh and Durfee for RSA cryptoanalysis. (English) Zbl 1370.94479

Feng, Ruyong (ed.) et al., Computer mathematics. 9th Asian symposium, ASCM 2009, Fukuoka, Japan, December 14–17, 2009, 10th Asian symposium, ASCM 2012, Beijing, China, October 26–28, 2012. Contributed papers and invited talks. Berlin: Springer (ISBN 978-3-662-43798-8/hbk; 978-3-662-43799-5/ebook). 15-32 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Faster repeated doublings on binary elliptic curves. (English) Zbl 1362.94028

Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 456-470 (2014).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Security analysis of multilinear maps over the integers. (English) Zbl 1343.94069

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 224-240 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical cryptanalysis of a public-key encryption scheme based on new multivariate quadratic assumptions. (English) Zbl 1288.94049

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 446-464 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Software speed records for lattice-based signatures. (English) Zbl 1306.94057

Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 67-82 (2013).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI

Full lattice basis reduction on graphics cards. (English) Zbl 1305.68080

Armknecht, Frederik (ed.) et al., Research in cryptology. 4th Western European workshop, WEWoRC 2011, Weimar, Germany, July 20–22, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34158-8/pbk). Lecture Notes in Computer Science 7242, 30-44 (2012).
MSC:  68P25 94A60 68W10
PDFBibTeX XMLCite
Full Text: DOI

Binary Kloosterman sums with value 4. (English) Zbl 1247.11148

Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 61-78 (2011).
MSC:  11T71 11L05 94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the knapsack generator. (English) Zbl 1282.94050

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 188-198 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Implementing Gentry’s fully-homomorphic encryption scheme. (English) Zbl 1281.94026

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 129-148 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Better key sizes (and attacks) for LWE-based encryption. (English) Zbl 1284.94088

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 319-339 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improvement of lattice-based cryptography using CRT. (English) Zbl 1205.81073

Sergienko, Alexander (ed.) et al., Quantum communication and quantum networking. First international conference, QuantumComm 2009, Naples, Italy, October 26–30, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-11730-5/pbk; 978-3-642-11731-2/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 36, 275-282 (2010).
MSC:  81P94 94A60
PDFBibTeX XMLCite
Full Text: DOI

Key agreement from close secrets over unsecured channels. (English) Zbl 1239.94076

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 206-223 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Speeding up the Pollard rho method on prime fields. (English) Zbl 1206.94061

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 471-488 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Rigorous and efficient short lattice vectors enumeration. (English) Zbl 1206.94086

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 390-405 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Gröbner bases for public key cryptography. (English) Zbl 1237.94053

Jeffrey, David J. (ed.), ISSAC 2008. Proceedings of the twenty-first international symposium on symbolic and algebraic computation 2008, Linz/Hagenberg, Austria, July 20–23, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-904-3). 315-324 (2008).
MSC:  94A60 13P10 68W30
PDFBibTeX XMLCite

Cryptanalysis of short exponent RSA with primes sharing least significant bits. (English) Zbl 1362.94055

Franklin, Matthew K. (ed.) et al., Cryptology and network security. 7th international conference, CANS 2008, Hong-Kong, China, December 2–4, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89640-1/pbk). Lecture Notes in Computer Science 5339, 49-63 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Explicit hard instances of the shortest vector problem. (English) Zbl 1177.94132

Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 79-94 (2008).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Faster multiplication in \(\text{GF}(2)[x]\). (English) Zbl 1230.11152

van der Poorten, Alfred J. (ed.) et al., Algorithmic number theory. 8th international symposium, ANTS-VIII Banff, Canada, May 17–22, 2008 Proceedings. Berlin: Springer (ISBN 978-3-540-79455-4/pbk). Lecture Notes in Computer Science 5011, 153-166 (2008).
MSC:  11Y16 11T06 68W40
PDFBibTeX XMLCite
Full Text: DOI

Predicting lattice reduction. (English) Zbl 1149.94314

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 31-51 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A hybrid lattice-reduction and meet-in-the-middle attack against NTRU. (English) Zbl 1215.94053

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 150-169 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

When stream cipher analysis meets public-key cryptography. (English) Zbl 1161.94398

Biham, Eli (ed.) et al., Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17–18, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74461-0/pbk). Lecture Notes in Computer Science 4356, 266-284 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Effects of optimizations for software implementations of small binary field arithmetic. (English) Zbl 1213.94079

Carlet, Claude (ed.) et al., Arithmetic of finite fields. First international workshop, WAIFI 2007, Madrid, Spain, June 21–22, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73073-6/pbk). Lecture Notes in Computer Science 4547, 69-84 (2007).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

A strategy for finding roots of multivariate polynomials with new applications in attacking RSA variants. (English) Zbl 1172.94577

Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 267-282 (2006).
MSC:  94A60 68W30
PDFBibTeX XMLCite
Full Text: DOI

The 2-adic CM method for genus 2 curves with application to cryptography. (English) Zbl 1172.94576

Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 114-129 (2006).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI arXiv

Learning a parallelepiped: cryptanalysis of GGH and NTRU signatures. (English) Zbl 1140.94365

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 271-288 (2006).
MSC:  94A60 94A62 11T71
PDFBibTeX XMLCite
Full Text: DOI

Flexible exponentiation with resistance to side channel attacks. (English) Zbl 1151.94579

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 4th international conference, ACNS 2006, Singapore, June 6–9, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34703-8/pbk). Lecture Notes in Computer Science 3989, 268-283 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New attacks on RSA with small secret cRT-exponents. (English) Zbl 1151.94483

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 1-13 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Partial key exposure attacks on RSA up to full size exponents. (English) Zbl 1137.94343

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 371-386 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Computing the RSA secret key is deterministic polynomial time equivalent to factoring. (English) Zbl 1104.94030

Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 213-219 (2004).
PDFBibTeX XMLCite
Full Text: DOI

Linear recurrences with polynomial coefficients and computation of the Cartier-Manin operator on hyperelliptic curves. (English) Zbl 1119.11032

Mullen, Gary L. (ed.) et al., Finite fields and applications. 7th international conference, \({\mathbb{F}}_{q^7}\), Toulouse, France, May 5–9, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21324-4/pbk). Lecture Notes in Computer Science 2948, 40-58 (2004).
PDFBibTeX XMLCite

New partial key exposure attacks on RSA. (English) Zbl 1122.94353

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 27-43 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the efficient generation of elliptic curves over prime fields. (English) Zbl 1028.94507

Kaliski, Burton S. jun. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2523, 333-348 (2002).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software