{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:40:07Z","timestamp":1725543607324},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540359074"},{"type":"electronic","value":"9783540359081"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11787006_21","type":"book-chapter","created":{"date-parts":[[2006,6,28]],"date-time":"2006-06-28T23:23:09Z","timestamp":1151536989000},"page":"240-251","source":"Crossref","is-referenced-by-count":8,"title":["Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes"],"prefix":"10.1007","author":[{"given":"Pierre-Alain","family":"Fouque","sequence":"first","affiliation":[]},{"given":"David","family":"Pointcheval","sequence":"additional","affiliation":[]},{"given":"Jacques","family":"Stern","sequence":"additional","affiliation":[]},{"given":"S\u00e9bastien","family":"Zimmer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"M. Bellare","year":"2001","unstructured":"Bellare, M., Rogaway, P., Abdalla, M.: The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, Springer, Heidelberg (2001)"},{"key":"21_CR2","first-page":"62","volume-title":"Proc. of the 1st CCS","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Rogaway, P.: Random Oracles Are Practical: a Paradigm for Designing Efficient Protocols. In: Proc. of the 1st CCS, pp. 62\u201373. ACM Press, New York (1993)"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s00200-005-0184-x","volume":"16","author":"I.F. Blake","year":"2006","unstructured":"Blake, I.F., Garefalakis, T., Shparlinski, I.E.: On the bit security of the Diffie-Hellman key. Appl. Algebra in Engin., Commun. and Computing\u00a016, 397\u2013404 (2006)","journal-title":"Appl. Algebra in Engin., Commun. and Computing"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/BFb0054851","volume-title":"Algorithmic Number Theory","author":"D. Boneh","year":"1998","unstructured":"Boneh, D.: The Decision Diffie-Hellman Problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol.\u00a01423, pp. 48\u201363. Springer, Heidelberg (1998)"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-68697-5_11","volume-title":"Advances in Cryptology - CRYPTO 1996","author":"D. Boneh","year":"1996","unstructured":"Boneh, D., Venkatesan, R.: Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 129\u2013142. Springer, Heidelberg (1996)"},{"key":"21_CR6","unstructured":"Boneh, D., Venkatesan, R.: Rounding in Lattices and its Cryptographic applications. In: Proc. of ACM-SIAM SODA\u201997, pp. 675\u2013681 (1997)"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/S1631-073X(03)00281-4","volume":"337","author":"J. Bourgain","year":"2003","unstructured":"Bourgain, J., Konyagin, S.V.: Estimates for the Number of Sums and Products and for Exponential Sums Over Subgroups in Fields of Prime Order. Comptes Rendus Mathematiques\u00a0337, 75\u201380 (2003)","journal-title":"Comptes Rendus Mathematiques"},{"key":"21_CR8","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s11856-000-1270-1","volume":"120","author":"R. Canetti","year":"2000","unstructured":"Canetti, R., Friedlander, J., Konyagin, S., Larsen, M., Lieman, D., Shparlinski, I.: On the Statistical Properties of Diffie-Hellman Distributions. Israel Journal of Mathematics\u00a0120, 23\u201346 (2000)","journal-title":"Israel Journal of Mathematics"},{"issue":"2","key":"21_CR9","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1112\/S002461079900736X","volume":"59","author":"R. Canetti","year":"1999","unstructured":"Canetti, R., Friedlander, J., Shparlinski, I.: On Certain Exponential Sums and the Distribution of Diffie-Hellman Triples. Journal of the London Mathematical Society\u00a059(2), 799\u2013812 (1999)","journal-title":"Journal of the London Mathematical Society"},{"key":"21_CR10","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"L. Carter","year":"1979","unstructured":"Carter, L., Wegman, M.: Universal Hash Functions. Journal of Computer and System Sciences\u00a018, 143\u2013154 (1979)","journal-title":"Journal of Computer and System Sciences"},{"key":"21_CR11","unstructured":"Chevassut, O., Fouque, P.A., Gaudry, P., Pointcheval, D.: Key derivation and randomness extraction. In: Cryptology ePrint Archive, Report 2005\/061 (2005), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/11745853_27","volume-title":"Public Key Cryptography - PKC 2006","author":"D. Pointcheval","year":"2006","unstructured":"Pointcheval, D., Gaudry, P., Fouque, P.-A., Chevassut, O.: The Twist-AUgmented Technique for Key Exchange. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 410\u2013426. Springer, Heidelberg (2006)"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1007\/11535218_26","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"J.-S. Coron","year":"2005","unstructured":"Coron, J.-S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damgard Revisited\u00a0: How to Construct a Hash Function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 430\u2013448. Springer, Heidelberg (2005)"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"R. Cramer","year":"1998","unstructured":"Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 13\u201325. Springer-Verlag, Heidelberg (1998)"},{"issue":"6","key":"21_CR15","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"21_CR16","series-title":"Lecture Notes in Computer Science","first-page":"494","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"J. H\u00e5stad","year":"2004","unstructured":"H\u00e5stad, J., Krawczyk, H., Gennaro, R., Rabin, T., Dodis, Y.: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 494\u2013510. Springer, Heidelberg (2004)"},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"469\u2013472,","author":"T. El Gamal","year":"1985","unstructured":"El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory\u00a0469\u2013472,, 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-540-24676-3_22","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"R. Gennaro","year":"2004","unstructured":"Gennaro, R., Krawczyk, H., Rabin, T.: Secure Hashed Diffie-Hellman over Non-DDH Groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 361\u2013381. Springer, Heidelberg (2004)"},{"key":"21_CR19","first-page":"25","volume-title":"Proc. of the 21st STOC","author":"O. Goldreich","year":"1989","unstructured":"Goldreich, O., Levin, L.A.: A Hard-Core Predicate for all One-Way Functions. In: Proc. of the 21st STOC, pp. 25\u201332. ACM Press, New York (1989)"},{"key":"21_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-540-24632-9_12","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"M. N\u00e4slund","year":"2004","unstructured":"N\u00e4slund, M., Shparlinski, I.E., Gonz\u00e1lez Vasco, M.I.: New Results on the Hardness of Diffie-Hellman\u00a0Bits. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 159\u2013172. Springer, Heidelberg (2004)"},{"key":"21_CR21","first-page":"331","volume-title":"Proc. Workshop on Cryptography and Computational Number Theory","author":"M.I. Gonzalez Vasco","year":"2001","unstructured":"Gonzalez Vasco, M.I., Shparlinski, I.E.: On the security of Diffie-Hellman bits. In: Proc. Workshop on Cryptography and Computational Number Theory, Singapore, 1999, pp. 331\u2013342. Birkh\u00e4user, Basel (2001)"},{"key":"21_CR22","unstructured":"G\u00fcrel, N.: Extracting bits from coordinates of a point of an elliptic curve. In: Cryptology ePrint Archive, Report 2005\/324 (2005), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"issue":"4","key":"21_CR23","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.1137\/S0097539793244708","volume":"28","author":"J. H\u00e5stad","year":"1999","unstructured":"H\u00e5stad, J., Impagliazzo, R., Levin, L., Luby, M.: A Pseudorandom Generator from any One-Way Function. SIAM Journal of Computing\u00a028(4), 1364\u20131396 (1999)","journal-title":"SIAM Journal of Computing"},{"issue":"2","key":"21_CR24","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1093\/qjmath\/51.2.221","volume":"51","author":"D.R. Heath-Brown","year":"2000","unstructured":"Heath-Brown, D.R., Konyagin, S.: New bounds for Gauss sums derived from k\n                           th powers, and for Heilbronn\u2019s exponential sum. Q. J. Math.\u00a051(2), 221\u2013235 (2000)","journal-title":"Q. J. Math."},{"key":"21_CR25","first-page":"248","volume-title":"Proc. of the 30th FOCS","author":"R. Impagliazzo","year":"1989","unstructured":"Impagliazzo, R., Zuckerman, D.: How to recycle random bits. In: Proc. of the 30th FOCS, pp. 248\u2013253. IEEE, New York (1989)"},{"key":"21_CR26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511542930","volume-title":"Character Sums With Exponential Functions and Their Applications","author":"S.V. Konyagin","year":"1999","unstructured":"Konyagin, S.V., Shparlinski, I.: Character Sums With Exponential Functions and Their Applications. Cambridge University Press, Cambridge (1999)"},{"key":"21_CR27","first-page":"32","volume-title":"Proc. of the 41st FOCS","author":"L. Trevisan","year":"2000","unstructured":"Trevisan, L., Vadhan, S.: Extracting Randomness from Samplable Distributions. In: Proc. of the 41st FOCS, New York, pp. 32\u201342. IEEE, Los Alamitos (2000)"},{"issue":"131","key":"21_CR28","first-page":"654","volume":"89","author":"N.M. Korobov","year":"1972","unstructured":"Korobov, N.M.: The distribution of digits in periodic fractions. Mat. Sb (N.S.)\u00a089(131), 654\u2013670 (1972)","journal-title":"Mat. Sb. (N.S.)"},{"key":"21_CR29","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - CRYPTO 1998","author":"S. Patel","year":"1998","unstructured":"Patel, S., Sundaram, G.: An Efficient Discrete Log Pseudo Random Generator. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, Springer, Heidelberg (1998)"},{"key":"21_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/3-540-69053-0_18","volume-title":"Advances in Cryptology - EUROCRYPT 1997","author":"V. Shoup","year":"1997","unstructured":"Shoup, V.: Lower Bounds for Discrete Logarithms and Related Problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 256\u2013266. Springer, Heidelberg (1997)"},{"key":"21_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/3-540-45539-6_19","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Shoup","year":"2000","unstructured":"Shoup, V.: Using Hash Functions as a Hedge against Chosen Ciphertext Attack. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 275\u2013288. Springer, Heidelberg (2000)"},{"key":"21_CR32","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139165464","volume-title":"A Computational Introduction to Number Theory and Algebra","author":"V. Shoup","year":"2005","unstructured":"Shoup, V.: A Computational Introduction to Number Theory and Algebra. Cambridge University Press, Cambridge (2005)"},{"key":"21_CR33","unstructured":"Shoup, V., Schweinberger, T.: ACE: The Advanced Cryptographic Engine. In: Manuscript (March 2000)(Revised August 14, 2000)"},{"key":"21_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/3-540-68339-9_29","volume-title":"Advances in Cryptology - EUROCRYPT 1996","author":"P.C. Oorschot van","year":"1996","unstructured":"van Oorschot, P.C., Wiener, M.J.: On Diffie-Hellman Key Agreement with Short Exponents. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 332\u2013343. Springer, Heidelberg (1996)"}],"container-title":["Lecture Notes in Computer Science","Automata, Languages and Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11787006_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:20:06Z","timestamp":1619508006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11787006_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540359074","9783540359081"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/11787006_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}