AbstractThere are many cryptographic constructions in which one uses a random power or multiple of an element in a group or a ring. We describe a fast method to compute random powers and multiples in certain important situations including powers in the Galois field F2n, multiples on Koblitz elliptic curves, and multiples in NTRU convolution polynomial rings. The underlying idea is to form a random exponent or multiplier as a product of factors, each of which has low Hamming weight when expanded as a sum of powers of some fast operation
Random numbers are useful in many applications such as Monte Carlo simulation, randomized algorithms...
Abstract. This paper studies the task of two-sources randomness ex-tractors for elliptic curves dene...
We consider the problem of minimizing the number of multiplications in computing f(x)=x n , where n ...
Abstract. There are many cryptographic constructions in which one uses a random power or multiple of...
AbstractHoffstein and Silverman suggested a use of Low Hamming Weight Product (LHWP) to compute a ra...
Hoffstein and Silverman suggested a use of Low Hamming Weight Product (LHWP) to compute a random pow...
Randomness is a key ingredient in cryptography. For instance, random numbers are used to generate ke...
We describe an attack on the family of Diffie-Hellman and El-Gamal like cryptosystems recently prese...
Modular exponentiation is core to today\u27s main stream public key cryptographic systems. In this a...
We will speak of strong analysis for an analysis which makes it possible to find the key to a cryptog...
In a recent paper, Aggarwal, Joux, Prakash, and Santha (AJPS) describe an ingenious public-key crypt...
An important attack on multi-power RSA ($N=p^rq$) was introduced by Sarkar in 2014, by extending the...
In this paper, we survey the status of attacks on the ring and polynomial learning with errors probl...
Abstract Motivated by questions about secure multi-party compu-tation, we introduce and study a new ...
Abstract. In this paper, we study a quite simple deterministic randomness extractor from random Diff...
Random numbers are useful in many applications such as Monte Carlo simulation, randomized algorithms...
Abstract. This paper studies the task of two-sources randomness ex-tractors for elliptic curves dene...
We consider the problem of minimizing the number of multiplications in computing f(x)=x n , where n ...
Abstract. There are many cryptographic constructions in which one uses a random power or multiple of...
AbstractHoffstein and Silverman suggested a use of Low Hamming Weight Product (LHWP) to compute a ra...
Hoffstein and Silverman suggested a use of Low Hamming Weight Product (LHWP) to compute a random pow...
Randomness is a key ingredient in cryptography. For instance, random numbers are used to generate ke...
We describe an attack on the family of Diffie-Hellman and El-Gamal like cryptosystems recently prese...
Modular exponentiation is core to today\u27s main stream public key cryptographic systems. In this a...
We will speak of strong analysis for an analysis which makes it possible to find the key to a cryptog...
In a recent paper, Aggarwal, Joux, Prakash, and Santha (AJPS) describe an ingenious public-key crypt...
An important attack on multi-power RSA ($N=p^rq$) was introduced by Sarkar in 2014, by extending the...
In this paper, we survey the status of attacks on the ring and polynomial learning with errors probl...
Abstract Motivated by questions about secure multi-party compu-tation, we introduce and study a new ...
Abstract. In this paper, we study a quite simple deterministic randomness extractor from random Diff...
Random numbers are useful in many applications such as Monte Carlo simulation, randomized algorithms...
Abstract. This paper studies the task of two-sources randomness ex-tractors for elliptic curves dene...
We consider the problem of minimizing the number of multiplications in computing f(x)=x n , where n ...