Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science
DOI: 10.1109/fscs.1990.89551
|View full text |Cite
|
Sign up to set email alerts
|

Efficiently inverting bijections given by straight line programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Acknowledgments: Thanks go to Erich Kaltofen for communicating to me his paper [22] and to an anonymous referee for pointing out the reference [38]. I am grateful to Alan Selman for answering my questions about the complexity of one-way functions.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Acknowledgments: Thanks go to Erich Kaltofen for communicating to me his paper [22] and to an anonymous referee for pointing out the reference [38]. I am grateful to Alan Selman for answering my questions about the complexity of one-way functions.…”
Section: Resultsmentioning
confidence: 99%
“…Coming back to the discussion of one-way functions, we remark that Sturtivant and Zhang [38] obtained the following related result, which excludes the existence of certain one-way functions in the algebraic framework of computation. Let ψ : k n → k n be bijective such that ψ as well as ψ −1 are polynomial mappings.…”
Section: Remark 14mentioning
confidence: 95%
“…Straight-line programs, or equivalently algebraic circuits, are important both as a computational model and as a data structure for polynomial computation. Their rich history includes both algorithmic advances and practical implementations (Kaltofen, 1989;Sturtivant and Zhang, 1990;Bruno et al, 2002).…”
Section: Previous Workmentioning
confidence: 99%
“…One of the most fundamental questions in cryptanalysis is to characterize the class of permutations (or functions) whose inverse can be computed in polynomial time or by a polynomial-size circuit [1], [16], [18], [25]. Much research in theoretical cryptography has centered around finding the weakest possible cryptographic assumptions that enable the implementation of major cryptographic primitives [8], [7], [ 17]; however, little progress has been made on the characterization of permutations with small inversion circuits [18].…”
Section: Introductionmentioning
confidence: 99%