-
2
-
-
84966219173
-
Elliptic curves and primality proving
-
A. O. L. Atkin and F. Morain, "Elliptic curves and primality proving," Math. Comp., vol. 61, pp. 29-68, 1993.
-
(1993)
Math. Comp.
, vol.61
, pp. 29-68
-
-
Atkin, A.O.L.1
Morain, F.2
-
3
-
-
84966198660
-
Explicit bounds for primality testing and related problems
-
E. Bach, "Explicit bounds for primality testing and related problems," Math. Comp., vol. 55, pp. 355-380, 1990.
-
(1990)
Math. Comp.
, vol.55
, pp. 355-380
-
-
Bach, E.1
-
4
-
-
0002768224
-
On a problem of Oppenheim concerning 'Factorisatio Numerorum'
-
Aug.
-
E. R. Canfield, P. Erdös, and C. Pomerance, "On a problem of Oppenheim concerning 'Factorisatio Numerorum'," J. Number Theory, vol. 17, pp. 1-28, Aug. 1983.
-
(1983)
J. Number Theory
, vol.17
, pp. 1-28
-
-
Canfield, E.R.1
Erdös, P.2
Pomerance, C.3
-
7
-
-
84979068869
-
A new elliptic curve based analogue of RSA
-
Lecture Notes in Computer Science, vol. 765. Berlin, Germany: Springer-Verlag
-
N. Demytko, "A new elliptic curve based analogue of RSA," in Advances in Cryptology - EUROCRYPT'93 (Lecture Notes in Computer Science, vol. 765). Berlin, Germany: Springer-Verlag, 1993, pp. 40-49.
-
(1993)
Advances in Cryptology - EUROCRYPT'93
, pp. 40-49
-
-
Demytko, N.1
-
8
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inform. Theory, vol. IT-22, pp. 644-654, 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
9
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inform. Theory, vol. IT-31, pp. 469-472, 1985.
-
(1985)
IEEE Trans. Inform. Theory
, vol.IT-31
, pp. 469-472
-
-
ElGamal, T.1
-
10
-
-
0000424216
-
On the normal number of prime factors of p - 1 and some related problems concerning Euler's φ-function
-
P. Erdös, "On the normal number of prime factors of p - 1 and some related problems concerning Euler's φ-function," Quart. J. Math. Oxford, vol. 6, pp. 205-213, 1935.
-
(1935)
Quart. J. Math. Oxford
, vol.6
, pp. 205-213
-
-
Erdös, P.1
-
11
-
-
84969368443
-
An identity-based key exchange protocol
-
Lecture Notes in Computer Science, vol. 434. Berlin, Germany:Springer-Verlag
-
C. G. Günther, "An identity-based key exchange protocol," in Advances in Cryptology - EUROCRYPT'89 (Lecture Notes in Computer Science, vol. 434). Berlin, Germany:Springer-Verlag, 1989, pp. 29-37.
-
(1989)
Advances in Cryptology - EUROCRYPT'89
, pp. 29-37
-
-
Günther, C.G.1
-
13
-
-
0000605495
-
Analysis of a simple factorization algorithm
-
D. E. Knuth and L. T. Pardo, "Analysis of a simple factorization algorithm," Theor. Comput. Sci., vol. 3, pp. 321-348, 1976.
-
(1976)
Theor. Comput. Sci.
, vol.3
, pp. 321-348
-
-
Knuth, D.E.1
Pardo, L.T.2
-
14
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems," Math. Comp., vol. 48, pp. 203-209, 1987.
-
(1987)
Math. Comp.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
15
-
-
85029478766
-
n
-
Lecture Notes in Computer Science, vol. 576. Berlin, Germany: Springer-Verlag
-
n," in Advances in Cryptology - CRYPTO'91 (Lecture Notes in Computer Science, vol. 576). Berlin, Germany: Springer-Verlag, 1991, pp. 252-266.
-
(1991)
Advances in Cryptology - CRYPTO'91
, pp. 252-266
-
-
Koyama, K.1
Maurer, U.M.2
Okamoto, T.3
Vanstone, S.A.4
-
17
-
-
85009967725
-
Constructing elliptic curves with given group order over large finite fields
-
Lecture Notes in Computer Science, vol. 877. Berlin, Germay: Springer-Verlag
-
G. Lay and H. Zimmer, "Constructing elliptic curves with given group order over large finite fields," in Algorithmic Number Theory: First International Symposium (Lecture Notes in Computer Science, vol. 877). Berlin, Germay: Springer-Verlag, 1994, pp. 250-263.
-
(1994)
Algorithmic Number Theory: First International Symposium
, pp. 250-263
-
-
Lay, G.1
Zimmer, H.2
-
18
-
-
0001258323
-
Factoring with elliptic curves
-
H. W. Lenstra, Jr., "Factoring with elliptic curves," Ann. Math., vol. 126, pp. 649-673, 1987.
-
(1987)
Ann. Math.
, vol.126
, pp. 649-673
-
-
Lenstra Jr., H.W.1
-
20
-
-
84947597805
-
On the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
-
Lecture Notes in Computer Science, vol. 839. Berlin, Germany: Springer-Verlag
-
U. M. Maurer, "On the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms," in Advances in Cryptology - CRYPTO'94 (Lecture Notes in Computer Science, vol. 839). Berlin, Germany: Springer-Verlag, 1994, pp. 271-281.
-
(1994)
Advances in Cryptology - CRYPTO'94
, pp. 271-281
-
-
Maurer, U.M.1
-
21
-
-
3042553102
-
Non-interactive public key cryptography
-
Lecture Notes in Computer Science, vol. 547. Berlin, Germany: Springer-Verlag
-
U. M. Maurer and Y. Yacobi, "Non-interactive public key cryptography," in Advances in Cryptology - EUROCRYPT'91 (Lecture Notes in Computer Science, vol. 547). Berlin, Germany: Springer-Verlag, 1991, pp. 498-507.
-
(1991)
Advances in Cryptology - EUROCRYPT'91
, pp. 498-507
-
-
Maurer, U.M.1
Yacobi, Y.2
-
22
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Lecture Notes in Computer Science, vol. 218. Berlin, Germany: Springer-Verlag
-
V. Miller, "Uses of elliptic curves in cryptography," in Advances in Cryptology - CRYPTO'85 (Lecture Notes in Computer Science, vol. 218). Berlin, Germany: Springer-Verlag, 1986, pp. 417-426.
-
(1986)
Advances in Cryptology - CRYPTO'85
, pp. 417-426
-
-
Miller, V.1
-
24
-
-
0003508570
-
Data encryption standard
-
U.S. Dept. Commerce, FIPS PUB 46, Washington, DC
-
National Bureau of Standards, "Data encryption standard," in Federal Information Processing Standard, U.S. Dept. Commerce, FIPS PUB 46, Washington, DC, 1977.
-
(1977)
Federal Information Processing Standard
-
-
-
25
-
-
35848959662
-
A proposed federal information processing standard for digital signature standard (DSS)
-
Draft, Aug.
-
National Institute for Standards and Technology, "A proposed federal information processing standard for digital signature standard (DSS)," Tech. Rep. FIPS PUB XX, Draft, Aug. 1991.
-
(1991)
Tech. Rep. FIPS PUB XX
-
-
-
26
-
-
84919085619
-
An improved algorithm for computing logarithms over GF (p) and its cryptographic significance
-
S. Pohlig and M. Hellman, "An improved algorithm for computing logarithms over GF (p) and its cryptographic significance," IEEE Trans. Inform. Theory, vol. IT-24, pp. 106-110, 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.IT-24
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
27
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. Assoc. Comput. Mach., vol. 21, pp. 120-126, 1978.
-
(1978)
Commun. Assoc. Comput. Mach.
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
28
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. Schnorr, "Efficient signature generation by smart cards," J. Cryptol., vol. 4, pp. 161-174, 1991.
-
(1991)
J. Cryptol.
, vol.4
, pp. 161-174
-
-
Schnorr, C.1
-
29
-
-
84966233278
-
Elliptic curves over finite fields and the computation of square roots mod p
-
R. Schoof, "Elliptic curves over finite fields and the computation of square roots mod p," Math. Comp., vol. 44, pp. 483-494, 1985.
-
(1985)
Math. Comp.
, vol.44
, pp. 483-494
-
-
Schoof, R.1
-
31
-
-
0029272081
-
Short RSA keys and their generation
-
S. A. Vanstone and R. J. Zuccherato, "Short RSA keys and their generation," J. Cryptol., vol. 8, pp. 101-114, 1995.
-
(1995)
J. Cryptol.
, vol.8
, pp. 101-114
-
-
Vanstone, S.A.1
Zuccherato, R.J.2
|