-
1
-
-
84966236672
-
A subexponential algorithm for discrete logarithms over all finite fields
-
L. Adleman and J. DeMarrais, "A subexponential algorithm for discrete logarithms over all finite fields", Mathematics of Computation, 61 (1993), 1-15.
-
(1993)
Mathematics of Computation
, vol.61
, pp. 1-15
-
-
Adleman, L.1
DeMarrais, J.2
-
3
-
-
0024139987
-
A key-exchange system based on imaginary quadratic fields
-
J. Buchmann and H. Williams, "A key-exchange system based on imaginary quadratic fields" Journal of Cryptology, 1 (1988), 107-118.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 107-118
-
-
Buchmann, J.1
Williams, H.2
-
5
-
-
0022953575
-
Discrete logarithms in GF(p)
-
D. Coppersmith, A. Odlyzko and R. Schroeppel, "Discrete logarithms in GF(p)", Algorithmica, 1 (1986), 1-15.
-
(1986)
Algorithmica
, vol.1
, pp. 1-15
-
-
Coppersmith, D.1
Odlyzko, A.2
Schroeppel, R.3
-
8
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation, 48 (1987), 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
9
-
-
0024864204
-
Hyperelliptic cryptosystems
-
N. Koblitz, "Hyperelliptic cryptosystems", Journal of Cryptology, 1 (1989), 139-150.
-
(1989)
Journal of Cryptology
, vol.1
, pp. 139-150
-
-
Koblitz, N.1
-
10
-
-
0002139049
-
The discrete logarithm problem
-
Cryptology and Computational Number Theory
-
K. McCurley, "The discrete logarithm problem", Cryptology and Computational Number Theory, Proceedings of Symposia in Applied Mathematics, 42 (1990), 49-74.
-
(1990)
Proceedings of Symposia in Applied Mathematics
, vol.42
, pp. 49-74
-
-
McCurley, K.1
-
11
-
-
0039809527
-
A note on cyclic groups, finite fields, and the discrete logarithm problem
-
A. Menezes and S. Vanstone, "A note on cyclic groups, finite fields, and the discrete logarithm problem", Applicable Algebra in Engineering, Communication and Computing, 3 (1992), 67-74.
-
(1992)
Applicable Algebra in Engineering, Communication and Computing
, vol.3
, pp. 67-74
-
-
Menezes, A.1
Vanstone, S.2
-
12
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Advances in Cryptology - Proceedings of Crypto '85, Springer-Verlag
-
V. Miller, "Uses of elliptic curves in cryptography", Advances in Cryptology - Proceedings of Crypto '85, Lecture Notes in Computer Science, 218 (1986), Springer-Verlag, 417-426.
-
(1986)
Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
13
-
-
0039217637
-
Fermat's theorem for matrices
-
I. Niven, "Fermat's theorem for matrices", Duke Mathematical Journal, 15 (1948), 823-826.
-
(1948)
Duke Mathematical Journal
, vol.15
, pp. 823-826
-
-
Niven, I.1
-
14
-
-
84957014368
-
Discrete logarithms in finite fields and their cryptographic significance
-
Advances in Cryptology - Proceedings of Eurocrypt '84, Springer- Verlag
-
A. Odlyzko, "Discrete logarithms in finite fields and their cryptographic significance", Advances in Cryptology - Proceedings of Eurocrypt '84, Lecture Notes in Computer Science, 209 (1985), Springer- Verlag, 224-314.
-
(1985)
Lecture Notes in Computer Science
, vol.209
, pp. 224-314
-
-
Odlyzko, A.1
-
15
-
-
0021406079
-
Public key distribution in matrix rings
-
R. Odoni, V. Varadharajan and R. Sanders, "Public key distribution in matrix rings", Electronics Letters, 20 (1984), 386-387.
-
(1984)
Electronics Letters
, vol.20
, pp. 386-387
-
-
Odoni, R.1
Varadharajan, V.2
Sanders, R.3
-
16
-
-
84972540003
-
Approximate formulas for some functions of prime numbers
-
J. Rosser and L. Schoenfeld, "Approximate formulas for some functions of prime numbers", Illinois Journal of Mathematics, 6 (1962), 64-94.
-
(1962)
Illinois Journal of Mathematics
, vol.6
, pp. 64-94
-
-
Rosser, J.1
Schoenfeld, L.2
|