The generalized birthday problem (GBP) was introduced by Wagner in 2002 and has shown to have many applications in cryptanalysis. In its typical variant, we are given access to a function $H:\{0,1\}^{\ell} \rightarrow \{0,1\}^n$ (whose specification depends on the underlying problem) and an integer $K>0$. The goal is to find $K$ distinct inputs to $H$ (denoted by $\{x_i\}_{i=1}^{K}$) such that $\sum_{i=1}^{K}H(x_i) = 0$. Wagner\u27s K-tree algorithm solves the problem in time and memory complexities of about $N^{1/(\lfloor \log K \rfloor + 1)}$ (where $N= 2^n$). Two important open problems raised by Wagner were (1) devise efficient time-memory tradeoffs for GBP, and (2) reduce the complexity of the K-tree algorithm for $K$ which is not a p...
Abstract. In this paper3, we study the complexity of solving hard knap-sack problems, i.e., knapsack...
Proof-of-work is a central concept in modern cryptocurrencies and denial-of-service protection tools...
We propose and analyze the LIZARD-construction, a way to construct keystream generator (KSG) based s...
We study a k-dimensional generalization of the birthday problem: given k lists of n-bit values, find...
A well known birthday paradox is one the most important problems in cryptographic applications. Incr...
We study a generalization of the k-list problem, also known as the Generalized Birthday problem. In ...
International audienceThe k-xor (or generalized birthday) problem is a widely studied question with ...
International audienceThe k-xor or Generalized Birthday Problem aims at finding, given k lists of bi...
The slightly subexponential algorithm of Blum, Kalai and Wasserman (BKW) provides a basis for assess...
peer reviewedThe proof-of-work is a central concept in modern cryptocurrencies, but the requirement ...
A (k x l)-birthday repetition G^{k x l} of a two-prover game G is a game in which the two provers ar...
The 3SUM problem is a well-known problem in computer science and many geometric problems have been r...
International audienceWe present an algorithm based on the birthday paradox, which is a low-memory p...
In this paper we view the possibilities to lance a multiple (iterative) birthday attack on NTRU. Rec...
International audienceIn this article, we propose a new improvement of the rebound techniques, used ...
Abstract. In this paper3, we study the complexity of solving hard knap-sack problems, i.e., knapsack...
Proof-of-work is a central concept in modern cryptocurrencies and denial-of-service protection tools...
We propose and analyze the LIZARD-construction, a way to construct keystream generator (KSG) based s...
We study a k-dimensional generalization of the birthday problem: given k lists of n-bit values, find...
A well known birthday paradox is one the most important problems in cryptographic applications. Incr...
We study a generalization of the k-list problem, also known as the Generalized Birthday problem. In ...
International audienceThe k-xor (or generalized birthday) problem is a widely studied question with ...
International audienceThe k-xor or Generalized Birthday Problem aims at finding, given k lists of bi...
The slightly subexponential algorithm of Blum, Kalai and Wasserman (BKW) provides a basis for assess...
peer reviewedThe proof-of-work is a central concept in modern cryptocurrencies, but the requirement ...
A (k x l)-birthday repetition G^{k x l} of a two-prover game G is a game in which the two provers ar...
The 3SUM problem is a well-known problem in computer science and many geometric problems have been r...
International audienceWe present an algorithm based on the birthday paradox, which is a low-memory p...
In this paper we view the possibilities to lance a multiple (iterative) birthday attack on NTRU. Rec...
International audienceIn this article, we propose a new improvement of the rebound techniques, used ...
Abstract. In this paper3, we study the complexity of solving hard knap-sack problems, i.e., knapsack...
Proof-of-work is a central concept in modern cryptocurrencies and denial-of-service protection tools...
We propose and analyze the LIZARD-construction, a way to construct keystream generator (KSG) based s...