Estamos realizando la búsqueda. Por favor, espere...
1446
37
174
31455
4620
2687
362
415
Abstract: In this paper we study the linear congruential generator on elliptic curves from the cryptographic point of view. We show that if sufficiently many of the most significant bits of the composer and of three consecutive values of the sequence are given, then one can recover the seed and the composer (even in the case where the elliptic curve is private). The results are based on lattice reduction techniques and improve some recent approaches of the same security problem. We also estimate limits of some heuristic approaches, which still remain much weaker than those known for nonlinear congruential generators. Several examples are tested using implementations of ours algorithms.
Autoría: Gutierrez J.,
Fuente: Cryptography and Communications, 2022, 14(3), 505-525
Editorial: Springer
Fecha de publicación: 12/09/2022
Nº de páginas: 21
Tipo de publicación: Artículo de Revista
DOI: 10.1007/s12095-021-00535-6
ISSN: 1936-2447,1936-2455
Url de la publicación: https://doi.org/10.1007/s12095-021-00535-6
SCOPUS
Citas
Google Scholar
Métricas
Repositorio UCrea Leer publicación
JAIME GUTIERREZ GUTIERREZ
Volver