38 pages matching round in this book
Results 1-3 of 38
What people are saying - Write a review
We haven't found any reviews in the usual places.
A generalization of linear cryptanalysis and the applicability of Matsuis
3 other sections not shown
3PASS access structure Advances in Cryptology adversary Alice assume attack authentication blind signature Blum integer bound broadcast Chaum ciphers ciphertext codes codeword coefficient coin commitment scheme Computer Science construction correlation CRYPTO cryptographic cryptosystems dealer decryption defined definition denote digital signature discrete logarithm distribution efficient elliptic curves encryption EUROCRYPT FCSR feedback polynomial given hash functions I/O sum identification scheme imbalance information dispersal algorithm input keystream lattice Lecture Notes Lemma LFSR linear cryptanalysis LNCS matrix mod q modulo multiplications non-interactive nonlinear nonzero Notes in Computer Oblivious Transfer output pair participants players polynomial preprocessing probability problem Proceedings properties prove public key quadratic randomly receiver residuosity resilient functions round Schnorr secret key secret sharing scheme Section secure sender sends sharing protocol shrunk polynomials signer simulator Springer Springer-Verlag string subset sum subset sum problems technique Theorem threefold sums untraceability vector verifier