Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/167088.167291acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

On the generation of multivariate polynomials which are hard to factor

Published: 01 June 1993 Publication History
  • Get Citation Alerts
  • First page of PDF

    References

    [1]
    A. S. Fraenkel and Y. Yesha{1977}, "Complexity of Problems in Games, Graphs, and Algebraic Equations", unpublished manuscript.
    [2]
    K. Manders and L. Adleman{1978}, "NP- Complete Decision Problems for Binary Quadratics", J. Comput. System Sci. 16, 168-184.
    [3]
    Y. Matijasevic and J. Robinson{1975}, "Reduction of an arbitrary Diophantine Equation to One in 13 Unknowns", Acta Arith. 27, 521-553.
    [4]
    R. Rivest, A. Shamir and L. Adleman{1978}, " A Method for Obtaining Digital Signatures and Public Key Cryptosystems", Comm. ACM 21, 120-126.

    Cited By

    View all
    • (2019)Counting basic-irreducible factors mod p in deterministic poly-time and p-adic applicationsProceedings of the 34th Computational Complexity Conference10.4230/LIPIcs.CCC.2019.15(1-29)Online publication date: 17-Jul-2019
    • (2019)Efficiently Factoring Polynomials Modulo p4Proceedings of the 2019 International Symposium on Symbolic and Algebraic Computation10.1145/3326229.3326233(139-146)Online publication date: 8-Jul-2019
    • (2014)A New Additive Homomorphic Encryption based on the co-ACD ProblemProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660335(287-298)Online publication date: 3-Nov-2014
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC '93: Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing
    June 1993
    812 pages
    ISBN:0897915917
    DOI:10.1145/167088
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 June 1993

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Conference

    STOC93
    Sponsor:
    STOC93: 25th Annual ACM Symposium on the Theory of Computing
    May 16 - 18, 1993
    California, San Diego, USA

    Acceptance Rates

    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)27
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 26 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Counting basic-irreducible factors mod p in deterministic poly-time and p-adic applicationsProceedings of the 34th Computational Complexity Conference10.4230/LIPIcs.CCC.2019.15(1-29)Online publication date: 17-Jul-2019
    • (2019)Efficiently Factoring Polynomials Modulo p4Proceedings of the 2019 International Symposium on Symbolic and Algebraic Computation10.1145/3326229.3326233(139-146)Online publication date: 8-Jul-2019
    • (2014)A New Additive Homomorphic Encryption based on the co-ACD ProblemProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660335(287-298)Online publication date: 3-Nov-2014
    • (2014)Bivariate Polynomials Modulo Composites and Their ApplicationsAdvances in Cryptology – ASIACRYPT 201410.1007/978-3-662-45611-8_3(42-62)Online publication date: 2014
    • (2014)Invertible Polynomial Representation for Private Set OperationsInformation Security and Cryptology -- ICISC 201310.1007/978-3-319-12160-4_17(277-292)Online publication date: 19-Oct-2014
    • (2009)Obfuscating straight line arithmetic programsProceedings of the nineth ACM workshop on Digital rights management10.1145/1655048.1655057(47-58)Online publication date: 9-Nov-2009
    • (2004)Public key cryptography with matricesProceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.10.1109/IAW.2004.1437810(146-152)Online publication date: 2004
    • (2001)Computing all factorizations in ***Proceedings of the 2001 international symposium on Symbolic and algebraic computation10.1145/384101.384111(64-71)Online publication date: 1-Jul-2001
    • (2001)Efficient Signature Schemes Based on Birational PermutationsAdvances in Cryptology — CRYPTO’ 9310.1007/3-540-48329-2_1(1-12)Online publication date: 13-Jul-2001
    • (2001)How to Break Shamir’s Asymmetric BasisAdvances in Cryptology — CRYPT0’ 9510.1007/3-540-44750-4_11(136-147)Online publication date: 13-Jul-2001
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media