Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1942427 - MaRDI portal

scientific article; zbMATH DE number 1942427

From MaRDI portal
Publication:4409125

zbMath1026.94541MaRDI QIDQ4409125

David Wagner

Publication date: 30 June 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420288.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

On the hardness of the Lee syndrome decoding problemS-semantics -- an exampleSolving the learning parity with noise problem using quantum algorithmsFinding low-weight polynomial multiples using the rho methodOn pairing-free blind signature schemes in the algebraic group modelSR-MuSig2: a scalable and reconfigurable multi-signature scheme and its applicationsAnalysis of (U,U+V)-code problem with Gramian over binary and ternary fieldsNon-interactive Mimblewimble transactions, revisitedA non-heuristic approach to time-space tradeoffs and optimizations for BKW\textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twistCorrelated pseudorandomness from expand-accumulate codesLifting standard model reductions to common setup assumptionsUniversally composable \(\varSigma \)-protocols in the global random-oracle modelInformation set decoding for Lee-metric codes using restricted ballsStatistical decoding 2.0: reducing decoding to LPNCorrelated pseudorandomness from the hardness of quasi-abelian decodingOn elliptic curve $L$-functions integrated encryption schemeTwo-round trip Schnorr multi-signatures via delinearized witnessesMuSig2: simple two-round Schnorr multi-signaturesWalsh transforms and cryptographic applications in bias computingImprovements to RSA key generation and CRT on embedded devicesBoomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVALImproved Analysis of ECHO-256Boomerang Attacks on Hash Function Using Auxiliary DifferentialsSilver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codesStreebog compression function as PRF in secret-key settingsFROST: Flexible round-optimized Schnorr threshold signaturesQuantum algorithms for the \(k\)-XOR problemA survey on fast correlation attacksBoomerang Attack on Step-Reduced SHA-512A discrete logarithm-based approach to compute low-weight multiples of binary polynomialsOne-more unforgeability of blind ECDSAA new approach for finding low-weight polynomial multiplesA digital signature scheme $\mathrm{mCFS}^{\mathrm{QC{-}LDPC}}$ based on $\mathrm{QC}$-$\mathrm{LDPC}$ codesAdventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functionsInformation-set decoding with hintsA Ring-LWE-based digital signature inspired by Lindner-Peikert schemeOn the security of ECDSA with additive key derivation and presignaturesRefined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2McEliece needs a break -- solving McEliece-1284 and quasi-cyclic-2918 with modern ISDTime-Memory Tradeoffs for Large-Weight Syndrome Decoding in Ternary CodesSyndrome Decoding EstimatorCharacterizing collision and second-preimage resistance in LinicryptA pseudorandom number generator based on worst-case lattice problemsAsymptotically efficient lattice-based digital signaturesImproved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x\) and some cryptographic applications] ⋮ On the (im)possibility of secure ElGamal blind signaturesOn the hardness of module learning with errors with short distributionsAttacks on a double length blockcipher-based hash proposalGeneric attacks on hash combinersPseudorandom correlation functions from variable-density LPN, revisitedContext discovery and commitment attacks. How to break CCM, EAX, SIV, and moreNew time-memory trade-offs for subset sum -- improving ISD in theory and practiceRai-Choo! Evolving blind signatures to the next levelA new diversity estimatorAsymptotic results for the number of Wagner's solutions to a generalised birthday problemThe extended \(k\)-tree algorithmFast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3GComputational aspects of retrieving a representation of an algebraic geometry codeNew Features of Latin Dances: Analysis of Salsa, ChaCha, and RumbaImproved combinatorial algorithms for the inhomogeneous short integer solution problemA method of evaluating the security of Snow 2.0-like ciphers against correlation attacks over the finite extensions of two element fieldSyndrome Based Collision Resistant HashingTowards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\)Integral distinguishers for reduced-round StribogKnown-Key Distinguishers for Some Block CiphersAn Improved Multi-set Algorithm for the Dense Subset Sum ProblemA generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequencesRobust and timely communication over highly dynamic sensor networksОрбитальные производные над кольцом вычетов. Часть I. Общие свойстваEspresso: a stream cipher for 5G wireless communication systemsReally Fast Syndrome-Based HashingFast Correlation Attacks: Methods and CountermeasuresAnalysis of Reduced-SHAvite-3-256 v2GENERALIZED BIRTHDAY PROBLEMS IN THE LARGE-DEVIATIONS REGIMEAn algorithmic framework for the generalized birthday problemTinyKeys: a new approach to efficient multi-party computationImproved Algorithms for the Approximate k-List Problem in Euclidean NormEnhancing the security of perfect blind DL-signaturesUnnamed ItemImproved Zero-Knowledge Identification with LatticesInterpreting Hash Function Security ProofsSlidex attacks on the Even-Mansour encryption schemeCryptanalysis of the GOST Hash FunctionOne-Round ID-Based Blind Signature Scheme without ROS AssumptionSafe-Errors on SPA Protected Implementations with the Atomicity TechniqueНекоторые методы анализа функций хэширования и их применение к алгоритму ГОСТ Р 34.11-94Linearization Attacks Against Syndrome Based HashesBetter Key Sizes (and Attacks) for LWE-Based EncryptionCryptanalysis of a Hash Function Based on Quasi-cyclic CodesLinear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic AttacksOn the (in)security of ROSTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesHard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent SecurityOn the (in)security of ROSZero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256Parallel-CFSSubspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash FunctionCryptanalysis of Luffa v2 ComponentsTight time-space lower bounds for finding multiple collision pairs and their applicationsCompactness of hashing modes and efficiency beyond Merkle treeCryptanalysis of an E0-like combiner with memoryCryptanalysis of Tweaked Versions of SMASH and ReparationDecoding One Out of ManyAn overview of distinguishing attacks on stream ciphersSimple Schnorr multi-signatures with applications to bitcoinQuantum Hardness of Learning Shallow Classical CircuitsRevisiting Gilbert's known-key distinguisherResults on multiples of primitive polynomials and their products over GF(2)Lattice-based blind signatures, revisitedConstructing Carmichael numbers through improved subset-product algorithmsClassical and quantum algorithms for generic syndrome decoding problems and applications to the Lee metricAttacks on beyond-birthday-bound MACs in the quantum settingBlind Schnorr signatures and signed ElGamal encryption in the algebraic group modelOptimal merging in quantum \(k\)-xor and \(k\)-sum algorithms