Cryptography Reference
In-Depth Information
One can perform lattice basis reduction and apply the nearest plane algorithm. For
improved methods and experimental results see Lindner and Peikert [ 352 ]. As in Exam-
ple 19.7.5 , one can work with a subset of m rows of A ; see Section 5.1 of [ 352 ]for
details.
19.8 Further applications of lattice reduction
There are a number of other applications of lattices in cryptography. We briefly list some
of them.
The improvement by Boneh and Durfee of Wiener's attack on small private exponent
RSA. This is briefly mentioned in Section 24.5.1 .
Solving the hidden number problem in finite fields and its applications to bit security of
Diffie-Hellman key exchange. See Section 21.7.1 .
The attack by Howgrave-Graham and Smart on digital signature schemes in finite fields
when there is partial information available about the random nonces. See Section 22.3 .
The deterministic reduction by Coron and May from knowing Ï• ( N ) to factoring N .This
is briefly mentioned in Section 24.1.3 .
Search WWH ::




Custom Search