咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 7 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 软件工程
    • 1 篇 信息与通信工程
  • 1 篇 理学
    • 1 篇 数学

主题

  • 7 篇 lattice-based cr...
  • 4 篇 rsa
  • 3 篇 lll algorithm
  • 3 篇 small inverse pr...
  • 1 篇 euclidean lattic...
  • 1 篇 multicores
  • 1 篇 parallelism
  • 1 篇 lattices
  • 1 篇 rsa-s2
  • 1 篇 algorithms
  • 1 篇 security strengt...
  • 1 篇 multi-threading
  • 1 篇 voronoi-cell
  • 1 篇 cuda
  • 1 篇 two-step mode
  • 1 篇 bkz
  • 1 篇 starpu
  • 1 篇 rsa-s1
  • 1 篇 lwe estimator
  • 1 篇 exponentiation o...

机构

  • 2 篇 univ tokyo kashi...
  • 1 篇 univ minho dept ...
  • 1 篇 inst univ france
  • 1 篇 univ pantheon as...
  • 1 篇 univ tokyo tokyo...
  • 1 篇 fujitsu labs kaw...
  • 1 篇 univ lyon cnrs e...
  • 1 篇 shanghai jiao to...
  • 1 篇 sorbonne univ cn...
  • 1 篇 shanghai jiao to...
  • 1 篇 xidian univ stat...
  • 1 篇 univ coimbra ins...
  • 1 篇 xidian univ sch ...
  • 1 篇 inesc tec p-5 po...
  • 1 篇 state key lab cr...
  • 1 篇 nict koganei tok...

作者

  • 3 篇 kunihiro noboru
  • 1 篇 mefenza thierry
  • 1 篇 gu dawu
  • 1 篇 mariano artur
  • 1 篇 shinohara naoyuk...
  • 1 篇 falcao gabriel
  • 1 篇 wang leizhang
  • 1 篇 cabeleira filipe
  • 1 篇 wang baocang
  • 1 篇 stehle damien
  • 1 篇 pujol xavier
  • 1 篇 hanrot guillaume
  • 1 篇 vergnaud damien
  • 1 篇 xia wenwen
  • 1 篇 izu tetsuya
  • 1 篇 santos luis paul...
  • 1 篇 wang geng

语言

  • 7 篇 英文
检索条件"主题词=lattice-based cryptanalysis"
7 条 记 录,以下是1-10 订阅
排序:
A Unified Framework for Small Secret Exponent Attack on RSA
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2014年 第6期E97A卷 1285-1295页
作者: Kunihiro, Noboru Shinohara, Naoyuki Izu, Tetsuya Univ Tokyo Kashiwa Chiba 2778561 Japan NICT Koganei Tokyo 1848795 Japan Fujitsu Labs Kawasaki Kanagawa 2118588 Japan
In this paper, we present a lattice based method on small secret exponent attack on the RSA scheme. Boneh and Durfee reduced the attack to finding the small roots of the bivariate modular equation: x(N + 1 + y)+1 0 (m... 详细信息
来源: 评论
Solving Generalized Small Inverse Problems
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2011年 第6期E94A卷 1274-1284页
作者: Kunihiro, Noboru Univ Tokyo Kashiwa Chiba 2778561 Japan
We introduce a "generalized small inverse problem (GSIP)" and present an algorithm for solving this problem. GSIP is formulated as finding small solutions of f(x(0), x(1),...x(n)) = x(0)h(x(1),...,x(n))+C = ... 详细信息
来源: 评论
cryptanalysis of Server-Aided RSA Protocols with Private-Key Splitting
收藏 引用
COMPUTER JOURNAL 2019年 第8期62卷 1194-1213页
作者: Mefenza, Thierry Vergnaud, Damien Univ Pantheon Assas Paris France Sorbonne Univ CNRS LIP6 Paris France Inst Univ France Paris France
We analyze the security and the efficiency of interactive protocols where a client wants to delegate the computation of an RSA signature given a public key, a public message and the secret signing exponent. We conside... 详细信息
来源: 评论
A Refined Hardness Estimation of LWE in Two-Step Mode  27th
A Refined Hardness Estimation of LWE in Two-Step Mode
收藏 引用
27th IACR International Conference on Practice and Theory of Public Key Cryptography (PKC)
作者: Xia, Wenwen Wang, Leizhang Wang, Geng Gu, Dawu Wang, Baocang Xidian Univ Sch Cyber Engn Xian 710071 Peoples R China Shanghai Jiao Tong Univ Lab Cryptol & Comp Secur Shanghai 200240 Peoples R China Xidian Univ State Key Lab Integrated Serv Networks Xian 710071 Peoples R China Shanghai Jiao Tong Univ Sch Elect Informat & Elect Engn Shanghai 200240 Peoples R China State Key Lab Cryptol POB 5159 Beijing 100878 Peoples R China
Recently, researchers have proposed many LWE estimators, such as lattice-estimator (Albrecht et al, Asiacrypt 2017) and leaky-LWE-Estimator (Dachman-Soled et al, Crypto 2020), while the latter has already been used in... 详细信息
来源: 评论
Solving Generalized Small Inverse Problems
Solving Generalized Small Inverse Problems
收藏 引用
15th Australasian conference, ACISP 2010
作者: Kunihiro, Noboru Univ Tokyo Tokyo 1138654 Japan
We introduce a "generalized small inverse problem (GSIP)" and present an algorithm for solving this problem. GSIP is formulated as finding small solutions of f(x(0), x(1), . . , x(n)) = x(0)h(x(1), . . . , x... 详细信息
来源: 评论
Analyzing Blockwise lattice Algorithms Using Dynamical Systems
收藏 引用
31st Annual International Cryptology Conference (CRYPTO)
作者: Hanrot, Guillaume Pujol, Xavier Stehle, Damien Univ Lyon CNRS ENS Lyon Lab LIPINRIAUCBL 46 Allee Italie F-69364 Lyon 07 France
Strong lattice reduction is the key element for most attacks against lattice-based cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast LLL reduction, there have been several attemp... 详细信息
来源: 评论
Heterogeneous Implementation of a Voronoi Cell-based SVP Solver
收藏 引用
IEEE ACCESS 2019年 7卷 127012-127023页
作者: Falcao, Gabriel Cabeleira, Filipe Mariano, Artur Santos, Luis Paulo Univ Coimbra Inst Telecomunicacoes Dept Elect & Comp Engn P-3030290 Coimbra Portugal INESC TEC P-4200465 Porto Portugal Univ Minho Dept Informat P-4710057 Braga Portugal
This paper presents a new, heterogeneous CPU+GPU attacks against lattice-based (post-quantum) cryptosystems based on the Shortest Vector Problem (SVP), a central problem in lattice-based cryptanalysis. To the best of ... 详细信息
来源: 评论