[1] Boneh D, Venkatesan R. Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes[C]//Proc. of Crypto’96. [S. 1.]: Springer-Verlag, 1996.
[2] Nguyen P Q, Shparlinski I E. The Insecurity of the Digital Signature Algorithm with Partially Known Nonces[EB/OL]. (2012-04-08). http://www.di.ens.fr/~pnguyen.
[3] Vasco M I G, Naslund M, Shparlinski I E. The Hidden Number Problem in Extension Fields and Its Applications[C]//Proc. of the 5th Latin American Symposium on Theoretical Informatics. London, UK: Springer-Verlag, 2002: 105-117.
[4] Hlavac M, Rosa T. Extend Hidden Number Problem and its Cryptanalytic Applications[C]//Proc. of the 13th International Conference on Selected Areas in Cryptography. Germany, Berlin: Springer-Verlag, 2007.
[5] Moreno C J, Moreno O. Exponential Sums and Goppa Codes//Proc. of AMS’91. [S. 1.]: IEEE Press, 1991: 523-531.
[6] Babai L. On Lovasz Lattice Reduction and the Nearest Lattice Point Problem[J]. Combinatorica, 1986, 6(1): 1-13.
[7] Garefalakis T. The Hidden Number Problem with Non-prime Modulus[C]//Proc. of Progress in Computer Science and Applied Logic, Basel, Switzerland: Birkhauser-Verlag, 2001.
[8] Catalano D, Nguyen P Q, Stern J. The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm[C]//Proc. of ASIACRYPT’02. Germany, Berlin: Springer-Verlag 2002: 299-310.
[9] Nguyen P Q, Stern J. Lattice Reduction in Cryptology: An Update[C]//Proc. of ANTS-IV’00. [S. 1.]: Springer-Verlag, 2000: 85-112.
[10] Nguyen P Q, Stern J. The Two Faces of Lattices in Crypto- logy[C]//Proc. of CALC’01. [S. 1.]: Springer-Verlag, 2001: 146-180.
[11] Ajtai M, Kumar R, Sivakumar D. A Sieve Algorithm for the Shortest Lattice Vector Problem[C]//Proc. of the 33rd ACM Symp. on Theory of Computation. [S. 1.]: ACM Press, 2001: 601-610.
[12] Kannan R. Algorithmic Geometry of Numbers[J]. Annual Review of Computer Science, 1987, 2: 231-267.
[13] Drmota M, Tichy R. Sequences, Discrepancies and Appli- cations[M]. Germany, Berlin: Springer-Verlag, 1997.
[14] Niederreiter H. Random Number Generation and Quasi Monte Carlo Methods[M]. Philadelphia, USA: Society for Industrial and Applied Mathematics, 1992.
(下转第54页)
(上接第43页)
[15] Kuipers R, Niederreiter H. Uniform Distribution of Seque- nces[C]//Proc. of Wiley-Interscience. New York, USA: [s. n.], 1974.
[16] Nguyen P Q, Stern J. The Two Faces of Lattices in Crypto- logy[C]//Proc. of CALC’01. [S. 1.]: Springer-Verlag, 2001.
[17] Lenstra A K, Lenstra H W, Lovasz J L. Factoring Polynomials with Rational Coefficients[J]. Journal of Mathematische Annalen, 1982, 261(4): 515-534.
[18] Grotschel M, Lovasz L, Schrijver A. Geometric Algorithms and Combinatorial Optimization[M]. [S. 1.]: Springer-Verlag, 1993.
[19] 苏 东, 王 克, 吕克伟. Paillier陷门函数的两个变体的比特安全性分析[J]. 计算机学报, 2010, 33(6): 1050-1059.
[20] 苏 东, 吕克伟. 基于隐藏数问题对广义SRA智力扑克协议的安全性研究[C]//第十八届全国信息保密学术会议论文集. 北京: 金城出版社, 2008.
[21] 谢晓蓉, 吕克伟, 王鲲鹏. ax+b mod p比特安全的列表译码证明[J]. 系统科学与数学, 2012, 32(11): 1366-1376.
[22] Shparlinski I E, Steinfeld R. Chinese Remaindering with Multiplicative Noise[D]. Sydney, Australia: Department of Computing, Macquarie University Sydney, 2005.
编辑 索书志 |