Back to Results
First PageMeta Content
Computational number theory / Lattice points / Algebra / Abstract algebra / RSA / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Lattice / Mathematics / Electronic commerce / Public-key cryptography


The Insecurity of Esign in Practical Implementations Pierre-Alain Fouque1 , Nick Howgrave-Graham2 , Gwena¨elle Martinet3 , and Guillaume Poupard3 ´ Ecole
Add to Reading List

Document Date: 2008-09-15 00:54:54


Open Document

File Size: 214,27 KB

Share Result on Facebook

City

Burlington / Lattice / Paris / /

Company

AES / /

Country

France / United States / /

/

IndustryTerm

signature device / cryptographic systems / factorization algorithm / verification algorithm / approximation algorithm / reduction algorithms / low computing resources / usual applications / exhaustive search / e-th / /

Organization

DCSSI Crypto Lab / Ecole Normale Sup´erieure / /

/

Product

Harman On Time Radio / /

ProvinceOrState

Massachusetts / /

Technology

encryption / reduction algorithms / Our algorithm / factorization algorithm / 3.2 Lattice-based Factoring Algorithm / public key / LLL algorithm / verification algorithm / private key / polynomial-time CVP approximation algorithm / secret key / /

SocialTag