-
1
-
-
0018724062
-
A subexponential algorithm for the discrete logarithm problem with applications to cryptography
-
Adleman, L. M. (1979), A subexponential algorithm for the discrete logarithm problem with applications to cryptography, in "Proc. 20th IEEE Found. Comp. Sci. Symp.," pp. 55-60.
-
(1979)
Proc. 20th IEEE Found. Comp. Sci. Symp.
, pp. 55-60
-
-
Adleman, L.M.1
-
2
-
-
85000722592
-
The function field sieve
-
"Algorithmic Number Theory (ANTS-I)," Springer-Verlag, New York/Berlin
-
Adleman, L. M. (1994), The function field sieve, in "Algorithmic Number Theory (ANTS-I)," Lecture Notes in Computer Science, Vol. 877, pp. 108-121, Springer-Verlag, New York/Berlin.
-
(1994)
Lecture Notes in Computer Science
, vol.877
, pp. 108-121
-
-
Adleman, L.M.1
-
3
-
-
0013415910
-
Factoring integers with the number field sieve
-
"The Development of the Number Field Sieve," Springer-Verlag, New York/Berlin
-
Buhler, J. P., Lenstra Jr., H. W., and Pomerance, C. (1993), Factoring integers with the number field sieve, in "The Development of the Number Field Sieve," Lecture Notes in Mathematics, Vol. 1554, pp. 50-94, Springer-Verlag, New York/Berlin.
-
(1993)
Lecture Notes in Mathematics
, vol.1554
, pp. 50-94
-
-
Buhler, J.P.1
Lenstra H.W., Jr.2
Pomerance, C.3
-
4
-
-
0008828012
-
The complexity of constructing the ring of integers of a global field
-
Chistov, A. L. (1989), The complexity of constructing the ring of integers of a global field, Soviet Math. Dokl. 39, No. 3, 597-600.
-
(1989)
Soviet Math. Dokl.
, vol.39
, Issue.3
, pp. 597-600
-
-
Chistov, A.L.1
-
5
-
-
84976003626
-
Construction of rational functions on a curve
-
Coates, J. (1970), Construction of rational functions on a curve, Proc. Camb. Phil. Soc. 68, 105-123.
-
(1970)
Proc. Camb. Phil. Soc.
, vol.68
, pp. 105-123
-
-
Coates, J.1
-
6
-
-
0021468777
-
Fast evaluation of discrete logarithms in fields of characteristic two
-
Coppersmith, D. (1984), Fast evaluation of discrete logarithms in fields of characteristic two, IEEE Trans. Inform. Theory IT-39, 587-594.
-
(1984)
IEEE Trans. Inform. Theory
, vol.IT-39
, pp. 587-594
-
-
Coppersmith, D.1
-
7
-
-
85025494304
-
Computations on curves
-
"Eurosam 84: Proc. Int'l Symp. on Symbolic and Algebraic Computation," Springer-Verlag, New York/Berlin
-
Dicrescenzo, C., and Duval, D. (1984), Computations on curves, in "Eurosam 84: Proc. Int'l Symp. on Symbolic and Algebraic Computation," Lecture Notes in Computer Science, Vol. 174, pp. 100-107, Springer-Verlag, New York/Berlin.
-
(1984)
Lecture Notes in Computer Science
, vol.174
, pp. 100-107
-
-
Dicrescenzo, C.1
Duval, D.2
-
8
-
-
0017018484
-
New directions in cryptography
-
Diffie, W., and Hellman, M. (1976), New directions in cryptography, IEEE Trans. Inform. Theory 22, 472-492.
-
(1976)
IEEE Trans. Inform. Theory
, vol.22
, pp. 472-492
-
-
Diffie, W.1
Hellman, M.2
-
9
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T. (1985), A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory 31, 469-472.
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
11
-
-
0000303380
-
Discrete logarithms in GF(p) using the number field sieve
-
Gordon, D. (1993), Discrete logarithms in GF(p) using the number field sieve, SIAM J. Discrete Math. 6, 124-138.
-
(1993)
SIAM J. Discrete Math.
, vol.6
, pp. 124-138
-
-
Gordon, D.1
-
12
-
-
0003291192
-
The Development of the Number Field Sieve
-
Springer-Verlag, New York/Berlin
-
Lenstra, A. K., and Lenstra Jr., H. W. (Eds.) (1993), "The Development of the Number Field Sieve," Lecture Notes in Mathematics, Vol. 1554, Springer-Verlag, New York/Berlin.
-
(1993)
Lecture Notes in Mathematics
, vol.1554
-
-
Lenstra, A.K.1
Lenstra H.W., Jr.2
-
13
-
-
0024984432
-
The number field sieve
-
Lenstra, A. K., Lenstra Jr., H. W., Manasse, M. S., and Pollard, J. M. (1990), The number field sieve, in "Proc. 22nd ACM Symp. on Theory of Computing," pp. 564-572.
-
(1990)
Proc. 22nd ACM Symp. on Theory of Computing
, pp. 564-572
-
-
Lenstra, A.K.1
Lenstra H.W., Jr.2
Manasse, M.S.3
Pollard, J.M.4
-
16
-
-
0002139049
-
The discrete logarithm problem
-
"Cryptology and Computational Number Theory," AMS, Providence, RI
-
McCurley, K. (1990), The discrete logarithm problem, in "Cryptology and Computational Number Theory," Proc. Symp. in Applied Math., Vol. 42, pp. 49-74, AMS, Providence, RI.
-
(1990)
Proc. Symp. in Applied Math.
, vol.42
, pp. 49-74
-
-
McCurley, K.1
-
17
-
-
0003455038
-
-
Ph.D. thesis, Stanford University
-
Merkle, R. (1979), "Secrecy, Authentication, and Public Key Systems," Ph.D. thesis, Stanford University.
-
(1979)
Secrecy, Authentication, and Public Key Systems
-
-
Merkle, R.1
-
18
-
-
0003508564
-
-
FIPS Publication 186, Washington, DC
-
National Bureau of Standards, (1994), "Digital signature standard," FIPS Publication 186, Washington, DC.
-
(1994)
Digital Signature Standard
-
-
-
19
-
-
84957014368
-
Discrete logarithms in finite fields and their cryptographic significance
-
"Advances in Cryptology-Eurocrypt '84," Springer-Verlag, New York/Berlin
-
Odlyzko, A. (1985), Discrete logarithms in finite fields and their cryptographic significance, in "Advances in Cryptology-Eurocrypt '84," Lecture Notes in Computer Science, Vol. 209, pp. 224-314, Springer-Verlag, New York/Berlin.
-
(1985)
Lecture Notes in Computer Science
, vol.209
, pp. 224-314
-
-
Odlyzko, A.1
-
20
-
-
84966238549
-
Monte Carlo methods for index computations (mod p)
-
Pollard, J. (1978), Monte Carlo methods for index computations (mod p), Math. Comp. 32, 918-924.
-
(1978)
Math. Comp.
, vol.32
, pp. 918-924
-
-
Pollard, J.1
-
21
-
-
0040235097
-
Fast rigorous factorization and discrete logarithms algorithms
-
D. S. Johnson, T. Nishizeki, A. Nozaki, and H. Wilf, Eds, Academic Press, New York
-
Pomerance, C. (1987), Fast rigorous factorization and discrete logarithms algorithms, in "Discrete Algorithms and Complexity" (D. S. Johnson, T. Nishizeki, A. Nozaki, and H. Wilf, Eds), pp. 119-143, Academic Press, New York.
-
(1987)
Discrete Algorithms and Complexity
, pp. 119-143
-
-
Pomerance, C.1
-
22
-
-
0001443138
-
Discrete logarithms and local units
-
Schirokauer, O. (1993), Discrete logarithms and local units, Phil. Trans. R. Soc. Lond. A 345, 409-423.
-
(1993)
Phil. Trans. R. Soc. Lond. A
, vol.345
, pp. 409-423
-
-
Schirokauer, O.1
-
23
-
-
84958036387
-
Discrete logarithms: The effectiveness of the index calculus method
-
"Algorithmic Number Theory (ANTS-II)," Springer-Verlag, New York/Berlin
-
Schirokauer, O., Weber, D., and Denny, T. (1996), Discrete logarithms: The effectiveness of the index calculus method, in "Algorithmic Number Theory (ANTS-II)," Lecture Notes in Computer Science, Vol. 1122, pp. 337-362, Springer-Verlag, New York/Berlin.
-
(1996)
Lecture Notes in Computer Science
, vol.1122
, pp. 337-362
-
-
Schirokauer, O.1
Weber, D.2
Denny, T.3
-
26
-
-
0004055955
-
-
Springer-Verlag, New York/Berlin
-
Walker, R. (1978), "Algebraic Curves," Springer-Verlag, New York/Berlin.
-
(1978)
Algebraic Curves
-
-
Walker, R.1
-
27
-
-
84966236672
-
A subexponential algorithm for discrete logarithms over all finite fields
-
Adleman, L. M., and DeMarrais, J. (1993), A subexponential algorithm for discrete logarithms over all finite fields, Math. Comp. 63.
-
(1993)
Math. Comp.
, vol.63
-
-
Adleman, L.M.1
DeMarrais, J.2
-
28
-
-
0002768224
-
On a problem of Oppenheim concerning "Favtorisatio Numerorum"
-
Canfield, E. R., Erdös, P., and Pomerance, P. (1983), On a problem of Oppenheim concerning "Favtorisatio Numerorum", J. Number Theory 17, 1-28.
-
(1983)
J. Number Theory
, vol.17
, pp. 1-28
-
-
Canfield, E.R.1
Erdös, P.2
Pomerance, P.3
-
29
-
-
0022953575
-
Discrete logarithms in GF(p)
-
Coppersmith, D., Odlyzko, A., and Schroeppel, R. (1986), Discrete logarithms in GF(p), Algorithmica 1, 1-15.
-
(1986)
Algorithmica
, vol.1
, pp. 1-15
-
-
Coppersmith, D.1
Odlyzko, A.2
Schroeppel, R.3
-
30
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest, R., Shamir, A., and Adleman, L. (1978), A method for obtaining digital signatures and public key cryptosystems, Communication ACM 21, 120-126.
-
(1978)
Communication ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
|