找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cryptographic Applications of Analytic Number Theory; Complexity Lower Bou Igor Shparlinski Book 2003 Springer Basel AG 2003 Cryptography.D

[复制链接]
查看: 45494|回复: 55
发表于 2025-3-21 16:11:10 | 显示全部楼层 |阅读模式
书目名称Cryptographic Applications of Analytic Number Theory
副标题Complexity Lower Bou
编辑Igor Shparlinski
视频video
丛书名称Progress in Computer Science and Applied Logic
图书封面Titlebook: Cryptographic Applications of Analytic Number Theory; Complexity Lower Bou Igor Shparlinski Book 2003 Springer Basel AG 2003 Cryptography.D
描述The book introduces new techniques that imply rigorous lower bounds on the com­ plexity of some number-theoretic and cryptographic problems. It also establishes certain attractive pseudorandom properties of various cryptographic primitives. These methods and techniques are based on bounds of character sums and num­ bers of solutions of some polynomial equations over finite fields and residue rings. Other number theoretic techniques such as sieve methods and lattice reduction algorithms are used as well. The book also contains a number of open problems and proposals for further research. The emphasis is on obtaining unconditional rigorously proved statements. The bright side of this approach is that the results do not depend on any assumptions or conjectures. On the downside, the results are much weaker than those which are widely believed to be true. We obtain several lower bounds, exponential in terms of logp, on the degrees and orders of o polynomials; o algebraic functions; o Boolean functions; o linear recurrence sequences; coinciding with values of the discrete logarithm modulo a prime p at sufficiently many points (the number of points can be as small as pI/2+O:). These funct
出版日期Book 2003
关键词Cryptography; Digital Signature Algorithm; Nonce; Sage; complexity; complexity theory; computer science; fi
版次1
doihttps://doi.org/10.1007/978-3-0348-8037-4
isbn_softcover978-3-0348-9415-9
isbn_ebook978-3-0348-8037-4Series ISSN 2297-0576 Series E-ISSN 2297-0584
issn_series 2297-0576
copyrightSpringer Basel AG 2003
The information of publication is updating

书目名称Cryptographic Applications of Analytic Number Theory影响因子(影响力)




书目名称Cryptographic Applications of Analytic Number Theory影响因子(影响力)学科排名




书目名称Cryptographic Applications of Analytic Number Theory网络公开度




书目名称Cryptographic Applications of Analytic Number Theory网络公开度学科排名




书目名称Cryptographic Applications of Analytic Number Theory被引频次




书目名称Cryptographic Applications of Analytic Number Theory被引频次学科排名




书目名称Cryptographic Applications of Analytic Number Theory年度引用




书目名称Cryptographic Applications of Analytic Number Theory年度引用学科排名




书目名称Cryptographic Applications of Analytic Number Theory读者反馈




书目名称Cryptographic Applications of Analytic Number Theory读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 21:17:05 | 显示全部楼层
Lattices and the Hidden Number Problemts in both cryptanalysis and design of new cryptosystems. However traditionally only heuristic results have obtained with their help. Here we outline some tools which, combined with other number-theoretic techniques, allow us to give rigorous proofs to some of these results, see also a brief survey
发表于 2025-3-22 04:13:16 | 显示全部楼层
发表于 2025-3-22 07:30:32 | 显示全部楼层
Boolean Complexity of the Diffie-Hellman Secret Keyoolean model (and in some situations it is), but there is no proof that this is really the case for our particular situation. Moreover, as a dual question of computing powers in parallel shows in some cases (over finite fields of small characteristic), the Boolean model of computation is exponential
发表于 2025-3-22 11:41:04 | 显示全部楼层
Bit Security of the Diffie—Hellman Secret Keyeady mentioned that the proof of Theorem 2 of [64] is not quite correct and it applies only to some special inputs. Using the bounds of exponential sums, namely Lemmas 3.15 and 3.16, allows us to complete the proof and also extend the result to more general settings. Accordingly, the bound of Lemma
发表于 2025-3-22 14:41:02 | 显示全部楼层
发表于 2025-3-22 19:53:34 | 显示全部楼层
Shiban Kishen Koul,Richa Bharadwajts in both cryptanalysis and design of new cryptosystems. However traditionally only heuristic results have obtained with their help. Here we outline some tools which, combined with other number-theoretic techniques, allow us to give rigorous proofs to some of these results, see also a brief survey
发表于 2025-3-23 00:29:31 | 显示全部楼层
Sridhar P. Arjunan,Arockia Vijay Josephol, is based on the still unproved assumption that recovering the value of the Diffie-Hellman secret key . from the known values of g.and g.is essentially equivalent to the discrete logarithm problem and therefore is hard. Here we show that even computation of . from g.cannot be realized by a polyno
发表于 2025-3-23 04:04:17 | 显示全部楼层
发表于 2025-3-23 06:48:35 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-1 23:29
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表