2002
DOI: 10.1007/3-540-45708-9_19
|View full text |Cite
|
Sign up to set email alerts
|

A Generalized Birthday Problem

Abstract: Abstract. We study a k-dimensional generalization of the birthday problem: given k lists of n-bit values, find some way to choose one element from each list so that the resulting k values xor to zero. For k = 2, this is just the extremely well-known birthday problem, which has a square-root time algorithm with many applications in cryptography. In this paper, we show new algorithms for the case k > 2: we show a cube-root time algorithm for the case of k = 4 lists, and we give an algorithm with subexponential r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
363
0
7

Year Published

2005
2005
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 388 publications
(371 citation statements)
references
References 27 publications
1
363
0
7
Order By: Relevance
“…We can not currently provide an analytical proof of this starting from equation 4, but note related results for interested readers [22,23,45]. This can be left for future work, since successive levels of redundancy yield diminishing returns, and even dual-redundant computation is not yet an accepted supercomputing resilience strategy.…”
Section: Birthday Problemmentioning
confidence: 99%
“…We can not currently provide an analytical proof of this starting from equation 4, but note related results for interested readers [22,23,45]. This can be left for future work, since successive levels of redundancy yield diminishing returns, and even dual-redundant computation is not yet an accepted supercomputing resilience strategy.…”
Section: Birthday Problemmentioning
confidence: 99%
“…We will survey the results on Information Set Decoding algorithm, which has been studied in [1]. As for Wagner's Generalized Birthday Paradox [19], we will give an extended analysis: first we slightly generalize Wagner's algorithm, then we describe how its complexity is exponential when the length of the hash value goes to infinity.…”
Section: Practical Securitymentioning
confidence: 99%
“…We now describe the attack from Coron and Joux [4], which relies on the Generalized Birthday Problem introduced by Wagner [19], who established:…”
Section: Wagner's Generalized Birthday Problemmentioning
confidence: 99%
See 2 more Smart Citations