Abstract
Let
References
[1] M. Anokhin, Constructing a pseudo-free family of finite computational groups under the general integer factoring intractability assumption, Groups Complex. Cryptol. 5 (2013), no. 1, 53–74. 10.1515/gcc-2013-0003Search in Google Scholar
[2] M. Anokhin, Pseudo-free families of finite computational elementary abelian p-groups, Groups Complex. Cryptol. 9 (2017), no. 1, 1–18. 10.1515/gcc-2017-0001Search in Google Scholar
[3] S. Arora and B. Barak, Computational Complexity. A Modern Approach, Cambridge University Press, Cambridge, 2009. 10.1017/CBO9780511804090Search in Google Scholar
[4] D. J. Bernstein, Detecting perfect powers in essentially linear time, Math. Comp. 67 (1998), no. 223, 1253–1283. 10.1090/S0025-5718-98-00952-1Search in Google Scholar
[5] D. Catalano, D. Fiore and B. Warinschi, Adaptive pseudo-free groups and applications, Advances in Cryptology—EUROCRYPT 2011, Lecture Notes in Comput. Sci. 6632, Springer, Heidelberg (2011), 207–223. 10.1007/978-3-642-20465-4_13Search in Google Scholar
[6] M. Dietzfelbinger, Primality Testing in Polynomial Time: From Randomized Algorithms to “PRIMES is in P”, Lecture Notes in Comput. Sci. 3000, Springer, Berlin, 2004. 10.1007/b12334Search in Google Scholar
[7] M. Fukumitsu, Pseudo-free groups and cryptographic assumptions, PhD thesis, Tohoku University, 2014. Search in Google Scholar
[8] S. R. Hohenberger, The cryptographic impact of groups with infeasible inversion, Master’s thesis, Massachusetts Institute of Technology, 2003. Search in Google Scholar
[9] M. P. Jhanwar and R. Barua, Sampling from signed quadratic residues: RSA group is pseudofree, Progress in Cryptology—INDOCRYPT 2009, Lecture Notes in Comput. Sci. 5922, Springer, Berlin (2009), 233–247. 10.1007/978-3-642-10628-6_16Search in Google Scholar
[10] D. Micciancio, The RSA group is pseudo-free, J. Cryptology 23 (2010), no. 2, 169–186. 10.1007/s00145-009-9042-5Search in Google Scholar
[11] M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information, Cambridge University Press, Cambridge, 2000; errata list available at www.michaelnielsen.org/qcqi/. Search in Google Scholar
[12] K. Prachar, Primzahlverteilung, Springer, Berlin, 1957. Search in Google Scholar
[13] R. L. Rivest, On the notion of pseudo-free groups, Theory of Cryptography, Lecture Notes in Comput. Sci. 2951, Springer, Berlin (2004), 505–521. 10.1007/978-3-540-24638-1_28Search in Google Scholar
[14] R. L. Rivest, On the notion of pseudo-free groups, presentation (2004), https://people.csail.mit.edu/rivest/pubs/Riv04e.slides.pdf, https://people.csail.mit.edu/rivest/pubs/Riv04e.slides.ppt, http://people.csail.mit.edu/rivest/Rivest-TCC04-PseudoFreeGroups.ppt; presentation of the conference paper. 10.1007/978-3-540-24638-1_28Search in Google Scholar
[15] V. Shoup, A Computational Introduction to Number Theory and Algebra, 2nd ed., Cambridge University Press, Cambridge, 2008. 10.1017/CBO9780511814549Search in Google Scholar
© 2018 Walter de Gruyter GmbH, Berlin/Boston