RSA and Rabin Functions: Certain Parts are as Hard as the Whole, SIAM Journal on Computing, vol.17, issue.2, pp.194-209, 1988. ,
DOI : 10.1137/0217013
A space/time tradeoff in exhaustive search attacks on stream ciphers, IEE Conference Publication -European Convention on Security and Detection, 1995. ,
Rigorous bounds on cryptanalytic time/memory tradeoffs Advances in Cryptology ? Crypto, LNCS, vol.4117, pp.1-21, 2006. ,
Cryptanalytic time/memory/data tradeoffs for stream ciphers Advances in Cryptology ? Asiacrypt, LNCS, vol.1976, pp.1-13, 2000. ,
A Simple Unpredictable Pseudo-Random Number Generator, SIAM Journal on Computing, vol.15, issue.2, pp.364-383, 1986. ,
DOI : 10.1137/0215025
How to generate cryptographically strong sequences of pseudo random bits, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp.850-864, 1984. ,
DOI : 10.1109/SFCS.1982.72
Why textbook ElGamal and RSA encryption are insecure Advances in Cryptology ? Asiacrypt, LNCS, vol.1976, pp.30-43, 2000. ,
Linear Recurrences with Polynomial Coefficients and Application to Integer Factorization and Cartier???Manin Operator, SIAM Journal on Computing, vol.36, issue.6, pp.1777-1806, 2007. ,
DOI : 10.1137/S0097539704443793
URL : https://hal.archives-ouvertes.fr/inria-00103401
Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers, Advances in Cryptology ? Eurocrypt 2012, pp.502-519, 2012. ,
DOI : 10.1007/978-3-642-29011-4_30
URL : https://hal.archives-ouvertes.fr/hal-00864374
Finding a Small Root of a Univariate Modular Equation, Advances in Cryptology ? Eurocrypt'96 (U. M. Maurer Advances in Cryptology ? Eurocrypt'96 (U. M. Maurer, pp.178-189, 1996. ,
DOI : 10.1007/3-540-68339-9_14
Cryptanalysis of the RSA subgroup assumption from TCC 2005, PKC 2011: 14th International Workshop on Theory and Practice in, LNCS, vol.6571, pp.147-155, 2011. ,
Rigorous Time/Space Trade-offs for Inverting Functions, SIAM Journal on Computing, vol.29, issue.3, pp.790-803, 1999. ,
DOI : 10.1137/S0097539795280512
Polynomial evaluation via the division algorithm the fast Fourier transform revisited, Proceedings of the fourth annual ACM symposium on Theory of computing , STOC '72, pp.88-93, 1972. ,
DOI : 10.1145/800152.804900
An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem, Journal of Cryptology, vol.18, issue.2, pp.91-110, 2005. ,
DOI : 10.1007/s00145-004-0215-y
Cryptanalysis of alleged A5 stream cipher Advances in Cryptology ? Eurocrypt'97, LNCS, vol.1233, pp.239-255, 1997. ,
A Pseudorandom Generator from any One-way Function, SIAM Journal on Computing, vol.28, issue.4, pp.1364-1396, 1999. ,
DOI : 10.1137/S0097539793244708
The security of all RSA and discrete log bits, Journal of the ACM, vol.51, issue.2, pp.187-230, 2004. ,
DOI : 10.1145/972639.972642
A cryptanalytic time-memory trade-off, IEEE Transactions on Information Theory, vol.26, issue.4, pp.401-406, 1980. ,
DOI : 10.1109/TIT.1980.1056220
Attacking power generators using unravelled linearization: When do we output too much? Advances in Cryptology ? Asiacrypt, LNCS, vol.5912, pp.487-504, 2009. ,
Efficient, perfect polynomial random number generators, Journal of Cryptology, vol.3, issue.3, pp.157-172, 1991. ,
DOI : 10.1007/BF00196909
Making a faster cryptanalytic time-memory trade-off Advances in Cryptology ? Crypto, LNCS, vol.2729, pp.617-630, 2003. ,
A $T = O(2^{n/2} )$, $S = O(2^{n/4} )$ Algorithm for Certain NP-Complete Problems, SIAM Journal on Computing, vol.10, issue.3, pp.456-464, 1981. ,
DOI : 10.1137/0210033
On the provable security of an efficient RSA-based pseudorandom generator Advances in Cryptology ? Asiacrypt, LNCS, vol.4284, pp.194-209, 2006. ,