• Keine Ergebnisse gefunden

Vortrag in der AG ”Diskrete Mathematik und Mathematische Informatik”

N/A
N/A
Protected

Academic year: 2021

Aktie "Vortrag in der AG ”Diskrete Mathematik und Mathematische Informatik”"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

FACHBEREICH INFORMATIK 01. Februar 2007 UND MATHEMATIK (ISMI)

Prof. Dr. C.P. Schnorr Prof. Dr. T. Theobald

R. Hartung, C. Riener, A. Scemama, R. Steffens

Vortrag in der AG ”Diskrete Mathematik und Mathematische Informatik”

AmMontag, den 26. Februar 2007, um 10 Uhr s.t. h¨alt Dr. I. Shparlinski,Macquarie University, Australien einen Vortrag zum Thema

Playing ”Hide-and-Seek” in Finite Fields:

Hidden Number Problem and Its Applications.

Der Vortrag findet in Raum 612, Robert–Mayer–Str. 10, statt.

Interessenten sind herzlich eingeladen.

Abstract We describe several recent results on the hidden number problem introduced by Boneh and Venkatesan in 1996.

The method is based on a rather surprising, yet powerful, combination of two famous number theoretic techniques: bounds of exponential sums and lattice reduction algorithms. This combination has led to a number of cryptographic applications, helping to make rigorous several heuristic approaches. It provides a two edge sword which can be used both to prove certain security results and also to design rather powerful attacks.

The examples of the first group include results about the bit security of the Diffie-Hellman key exchange system, of the Shamir message passing scheme and of the XTR and LUC cryptosystems. The examples of the second group include attacks on the Digital Signature Algorithm and its modifications which are provably insecure under certain conditions.

gez. C. P. Schnorr, T. Theobald

Referenzen

ÄHNLICHE DOKUMENTE

Wilson has exploited this ambiguity by adding a new term to the naive lattice action in order to lift the mass of the doublers by an amount proportional to the inverse lattice

Hereafter, we describe the following lattice-based signature schemes: the signature scheme (LYU12) by Lyubashevsky [16], the signature scheme (BLISS) by Ducas, Durmus, Lepoint

We shall parallel this, and combine spectral proper- ties of automorphic forms with properties of the zeta function attached to the sums K j (m, n, c) to obtain a summation formula

SIRIUS performs metabolite identification in a two step approach: Firstly, the molecular formula of the query compound is determined via isotope pattern analysis and

To be specific, we derive the irreducible representations of the group D 4 ⋉ ( Z n × Z n ) and show the existence of bifurcating solutions expressing square patterns by two

Qädi Sä'id al-Andalusi's Account of Science in Ancient Persia 35.. The Chief virtues of the Persian monarchs that made

1. The firmware must recognize and decode the input SelBUS transfer that has occurred. If the input transfer requested Con- troller or Peripheral Device status,

The multi-GPU implementation presented in this thesis was precisely tailored to the require- ments of GPUs and MPI: via host pointer it uses spezialized buffers for a fast