Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
RSA and Rabin Functions: Certain Parts are as Hard as the Whole - MaRDI portal

RSA and Rabin Functions: Certain Parts are as Hard as the Whole

From MaRDI portal
Publication:3787913

DOI10.1137/0217013zbMath0644.94011OpenAlexW2108104892MaRDI QIDQ3787913

Benny Chor, Oded Goldreich, Werner Alexi, Claus Peter Schnorr

Publication date: 1988

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/0217013




Related Items

Another Look at TightnessThe Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?All Bits in ax + b mod p are HardHardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related SchemesMore efficient DDH pseudorandom generatorsPractical and provably secure release of a secret and exchange of signaturesEnhancements of trapdoor permutationsPaillier's trapdoor function hides \(\Theta(n)\) bitsMathematical problems in cryptologySome consequences of cryptographical conjectures for \(S_2^1\) and EFRSA and Elliptic Curve Least Significant Bit SecurityThe Multivariate Hidden Number ProblemSuper-Perfect Zero-Knowledge ProofsSome consequences of cryptographical conjectures for S 2 1 and EFThe hidden number problem with small unknown multipliers: cryptanalyzing MEGA in six queries and other applicationsCryptographic Applications of Capacity Theory: On the Optimality of Coppersmith’s Method for Univariate PolynomialsParadigms for Unconditional Pseudorandom GeneratorsIndividual simulationsPractical chosen ciphertext secure encryption from factoringCriteria for the assessment of random number generatorsOn pseudorandomness in families of sequences derived from the Legendre symbolSecure simultaneous bit extraction from Koblitz curvesPractical construction and analysis of pseudo-randomness primitivesA unified approach to deterministic encryption: new constructions and a connection to computational entropyBit Security of the CDH Problems over Finite FieldsPractical Chosen Ciphertext Secure Encryption from FactoringComparative Analysis of Random GeneratorsThree XOR-Lemmas — An ExpositionBasing Non-Interactive Zero-Knowledge on (Enhanced) Trapdoor Permutations: The State of the ArtSynthesizers and their application to the parallel construction of pseudo-random functionsUnnamed ItemImproved algorithms via approximations of probability distributionsEfficient, perfect polynomial random number generators