International audienceIn this paper, we study the security of the Micali-Schnorr pseudorandom number generator. The security of this cryptographic scheme is based on two computational problems which are variants of the RSA problem. The RSA problem essentially aims at recovering the plaintext from a random ciphertext. In the analysis of the Micali-Schnorr pseudorandom generator, we are interested in instances of this problem where the plaintext is small and where the ciphertext is not entirely known. We will describe time / memory tradeoff techniques to solve these hard problems which provides the first analysis of this pseudoran-dom generator 25 years after its publication
Randomness is a key ingredient in cryptography. For instance, random numbers are used to generate ke...
The recent innovations in network application and the internet have made data and network security t...
In this paper, secure two-party protocols are provided in order to securely generate a random $k$-bi...
International audienceIn this paper, we study the security of the Micali-Schnorr pseudorandom number...
Abstract. In this paper, we study the security of the Micali-Schnorr pseudorandom number generator. ...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
International audienceIn this paper, we study some computational security assump-tions involve in tw...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensive...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
[[abstract]]In 1982, Quisquater and Couvreur proposed an RSA variant, called RSA-CRT, based on the C...
Applications of extended and combined formant analysis of modern number theory are consi...
This paper reports four new cryptanalytic attacks which show that t instances of RSA moduli Ns = psq...
The book introduces new ways of using analytic number theory in cryptography and related areas, such...
Abstract: The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the diffic...
Randomness is a key ingredient in cryptography. For instance, random numbers are used to generate ke...
The recent innovations in network application and the internet have made data and network security t...
In this paper, secure two-party protocols are provided in order to securely generate a random $k$-bi...
International audienceIn this paper, we study the security of the Micali-Schnorr pseudorandom number...
Abstract. In this paper, we study the security of the Micali-Schnorr pseudorandom number generator. ...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
International audienceIn this paper, we study some computational security assump-tions involve in tw...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensive...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
[[abstract]]In 1982, Quisquater and Couvreur proposed an RSA variant, called RSA-CRT, based on the C...
Applications of extended and combined formant analysis of modern number theory are consi...
This paper reports four new cryptanalytic attacks which show that t instances of RSA moduli Ns = psq...
The book introduces new ways of using analytic number theory in cryptography and related areas, such...
Abstract: The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the diffic...
Randomness is a key ingredient in cryptography. For instance, random numbers are used to generate ke...
The recent innovations in network application and the internet have made data and network security t...
In this paper, secure two-party protocols are provided in order to securely generate a random $k$-bi...