Black-Box Models of Computation in Cryptology [electronic resource] /by Tibor Jager.
by Jager, Tibor [author.]; SpringerLink (Online service).
Material type:
Item type | Current location | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
MAIN LIBRARY | QA71-90 (Browse shelf) | Available |
Browsing MAIN LIBRARY Shelves Close shelf browser
RD597-598.7 Aortic Root Surgery | G1-922 Die Anden | QA1-939 Noncommutative Geometry and Number Theory | QA71-90 Black-Box Models of Computation in Cryptology | P98-98.5 Linguistic Identity Matching | TK7876-7876.42 Electromagnetic Field Theory | QC1-75 Computer Simulation Study of Collective Phenomena in Dense Suspensions of Red Blood Cells under Shear |
Black-Box Models of Computation -- On Black-Box Ring Extraction and Integer Factorization -- On the Analysis of Cryptographic Assumptions in the Generic Ring Model -- The Generic Composite Residuosity Problem -- Semi-Generic Groups and Their Applications.
Generic group algorithms solve computational problems defined over algebraic groups without exploiting properties of a particular representation of group elements. This is modeled by treating the group as a black-box. The fact that a computational problem cannot be solved by a reasonably restricted class of algorithms may be seen as support towards the conjecture that the problem is also hard in the classical Turing machine model. Moreover, a lower complexity bound for certain algorithms is a helpful insight for the search for cryptanalytic algorithms. Tibor Jager addresses several fundamental questions concerning algebraic black-box models of computation: Are the generic group model and its variants a reasonable abstraction? What are the limitations of these models? Can we relax these models to bring them closer to the reality?
There are no comments for this item.