-
2
-
-
0025824903
-
An implementation for a fast public key cryptosystem
-
MR 92b:94034
-
G.B. Agnew, R.C. Mullin, I.M. Onyszchuk and S.A. Vanstone, An implementation for a fast public key cryptosystem, J. of Cryptology, 3 (1991), 63-79. MR 92b:94034
-
(1991)
J. of Cryptology
, vol.3
, pp. 63-79
-
-
Agnew, G.B.1
Mullin, R.C.2
Onyszchuk, I.M.3
Vanstone, S.A.4
-
4
-
-
85034644807
-
Efficient zero-knowledge identification scheme for smart cards
-
Advances in Cryptology (Proc. Eurocrypt '88), CMP 21:11
-
T. Beth, Efficient zero-knowledge identification scheme for smart cards, Advances in Cryptology (Proc. Eurocrypt '88), Springer LNCS 330 (1988), 77-84. CMP 21:11
-
(1988)
Springer LNCS
, vol.330
, pp. 77-84
-
-
Beth, T.1
-
5
-
-
85026752797
-
Constructive problems for irreducible polynomials over finite fields
-
A. Gulliver and N. Secord, eds, Springer LNCS MR 95c:94007
-
I.F. Blake, S. Gao and R. Lambert, Constructive problems for irreducible polynomials over finite fields, in Information Theory and Applications (A. Gulliver and N. Secord, eds), Springer LNCS 793 (1994), 1-23. MR 95c:94007
-
(1994)
Information Theory and Applications
, vol.793
, pp. 1-23
-
-
Blake, I.F.1
Gao, S.2
Lambert, R.3
-
6
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudorandom bits
-
MR 86a:68021
-
M. Blum and S. Micali, How to generate cryptographically strong sequences of pseudorandom bits, SIAM J. Computing, 13 (1984), 850-864. MR 86a:68021
-
(1984)
SIAM J. Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
7
-
-
0038076370
-
n ± 1, b = 2, 3, 5, 6, 7, 10, 11, 12 up to high powers
-
2nd ed., AMS, MR 90d:11009
-
n ± 1, b = 2, 3, 5, 6, 7, 10, 11, 12 Up to High Powers, Contemporary Mathematics, 22, 2nd ed., AMS, 1988. MR 90d:11009
-
(1988)
Contemporary Mathematics
, vol.22
-
-
Brillhart, J.1
Lehmer, D.H.2
Selfridge, J.L.3
Tuckerman, B.4
Wagstaff, S.S.5
-
8
-
-
0017018484
-
New directions in cryptography
-
MR 55:10141
-
W. Diffie and M.E. Hellman, New directions in cryptography, IEEE Trans. Info. Th., 22 (1976), 644-654. MR 55:10141
-
(1976)
IEEE Trans. Info. Th.
, vol.22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
9
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
MR 86j:94045
-
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Info. Th., 31 (1985), 469-472. MR 86j:94045
-
(1985)
IEEE Trans. Info. Th.
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
10
-
-
0040969842
-
Gauss periods, primitive normal bases, and fast exponentiation in finite fields
-
preliminary version Valparaíso, Chile, Springer LNCS full version in Technical Report 296/95, Department of Computer Science, University of Toronto, 1995
-
S. Gao, J. von zur Gathen and D. Panario, Gauss periods, primitive normal bases, and fast exponentiation in finite fields, preliminary version in Proc. Latin'95, Valparaíso, Chile, Springer LNCS 911 (1995), 311-322; full version in Technical Report 296/95, Department of Computer Science, University of Toronto, 1995.
-
(1995)
Proc. Latin'95
, vol.911
, pp. 311-322
-
-
Gao, S.1
Von Zur Gathen, J.2
Panario, D.3
-
11
-
-
0003068986
-
Tests and constructions of irreducible polynomials over finite fields
-
F. Cucker and M. Shub (Eds.), Springer Verlag
-
S. Gao and D. Panario, Tests and constructions of irreducible polynomials over finite fields, in Foundations of Computational Mathematics, F. Cucker and M. Shub (Eds.), Springer Verlag, 1997, 346-361.
-
(1997)
Foundations of Computational Mathematics
, pp. 346-361
-
-
Gao, S.1
Panario, D.2
-
12
-
-
84968467386
-
On orders of optimal normal basis generators
-
MR 95j:11117
-
S. Gao and S.A. Vanstone, On orders of optimal normal basis generators, Math. Comp., 64 (1995), 1227-1233. MR 95j:11117
-
(1995)
Math. Comp.
, vol.64
, pp. 1227-1233
-
-
Gao, S.1
Vanstone, S.A.2
-
14
-
-
84955575768
-
Orders of Gauss periods in finite fields
-
Springer LNCS MR 97b:11153
-
J. von zur Gathen and I.E. Shparlinski, Orders of Gauss periods in finite fields, in Proc ISAAC '95, Springer LNCS 1004 (1995), 208-215. MR 97b:11153
-
(1995)
Proc ISAAC '95
, vol.1004
, pp. 208-215
-
-
Von Zur Gathen, J.1
Shparlinski, I.E.2
-
15
-
-
0003439018
-
-
Braunschweig, English Edition, Springer-Verlag, MR 87f:01105
-
C.F. Gauss, Disquisitiones Arithmeticae, Braunschweig, 1801. English Edition, Springer-Verlag, 1986. MR 87f:01105
-
(1801)
Disquisitiones Arithmeticae
-
-
Gauss, C.F.1
-
16
-
-
84968480565
-
Primitive polynomials over finite fields
-
MR 93a:11101
-
T. Hansen and G.L. Mullen, Primitive polynomials over finite fields, Math. Comp., 59 (1992), 639-643. MR 93a:11101
-
(1992)
Math. Comp.
, vol.59
, pp. 639-643
-
-
Hansen, T.1
Mullen, G.L.2
-
18
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, Password authentication with insecure communication, Comm. ACM, 24 (1981), 770-772.
-
(1981)
Comm. ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
19
-
-
84937578837
-
Another method for attaining security against adaptively chosen ciphertext attacks
-
Springer LNCS
-
C.H. Lim and P.J. Lee, Another method for attaining security against adaptively chosen ciphertext attacks. Advances in Cryptology (Proc. Crypto '93), Springer LNCS 773 (1994), 420-434.
-
(1994)
Advances in Cryptology (Proc. Crypto '93)
, vol.773
, pp. 420-434
-
-
Lim, C.H.1
Lee, P.J.2
-
20
-
-
0023985034
-
The discrete logarithm hides O(log n) bits
-
MR 89e:68026
-
D.L. Long and A. Wigderson, The discrete logarithm hides O(log n) bits, SIAM J. Computing, 17 (1988), 363-372. MR 89e:68026
-
(1988)
SIAM J. Computing
, vol.17
, pp. 363-372
-
-
Long, D.L.1
Wigderson, A.2
-
21
-
-
0004129394
-
-
Kluwer Academic Publishers
-
A.J. Menezes, I.F. Blake, X.H. Gao, R.C. Mullin, S.A. Vanstone, and T. Yaghoobian, Applications of Finite Fields, Kluwer Academic Publishers, 1993.
-
(1993)
Applications of Finite Fields
-
-
Menezes, A.J.1
Blake, I.F.2
Gao, X.H.3
Mullin, R.C.4
Vanstone, S.A.5
Yaghoobian, T.6
-
22
-
-
21844503667
-
Primitive normal polynomials over finite fields
-
MR 95a:11106
-
I.H. Morgan and G.L. Mullen, Primitive normal polynomials over finite fields, Math. Comp., 63 (1994), 759-765. MR 95a:11106
-
(1994)
Math. Comp.
, vol.63
, pp. 759-765
-
-
Morgan, I.H.1
Mullen, G.L.2
-
24
-
-
85033881759
-
-
National Institute for Standard and Technology, Federal Information Processing Standard for Digital Signature Standard (DSS), FIPS 186, May
-
National Institute for Standard and Technology, Federal Information Processing Standard for Digital Signature Standard (DSS), FIPS 186, May 1994.
-
(1994)
-
-
-
25
-
-
0039783282
-
Simultaneous security of bits in the discrete log
-
Springer LNCS CMP 18:16
-
R. Peralta, Simultaneous security of bits in the discrete log, Advances in Cryptology (Proc. Eurocrypt '85), Springer LNCS 219 (1986), 62-72. CMP 18:16
-
(1986)
Advances in Cryptology (Proc. Eurocrypt '85)
, vol.219
, pp. 62-72
-
-
Peralta, R.1
-
26
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Springer LNCS MR 92e:94024
-
C.P. Schnorr, Efficient identification and signatures for smart cards, Advances in Cryptology (Proc. Crypto '89), Springer LNCS 435 (1990), 239-252. MR 92e:94024
-
(1990)
Advances in Cryptology (Proc. Crypto '89)
, vol.435
, pp. 239-252
-
-
Schnorr, C.P.1
-
27
-
-
12344258539
-
Efficient signature generation by smart cards
-
C.P. Schnorr, Efficient signature generation by smart cards, J. of Cryptology, 4 (1991), 161-174.
-
(1991)
J. of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
-
29
-
-
0011888118
-
Konstruktion von normalbasen
-
MR 91h:11145
-
A. Wassermann, Konstruktion von Normalbasen, Bayreuther Mathematische Schriften, 31 (1990), 155-164. MR 91h:11145
-
(1990)
Bayreuther Mathematische Schriften
, vol.31
, pp. 155-164
-
-
Wassermann, A.1
-
30
-
-
0040557251
-
Zur arithmetik in endlichen körpern
-
MR 94g:11114
-
A. Wassermann, Zur Arithmetik in endlichen Körpern, Bayreuther Mathematische Schriften, 44 (1993), 147-251. MR 94g:11114
-
(1993)
Bayreuther Mathematische Schriften
, vol.44
, pp. 147-251
-
-
Wassermann, A.1
-
31
-
-
85028933312
-
Practical approaches for attaining security against adaptively chosen ciphertext attacks
-
Springer LNCS
-
Y. Zheng and J. Seberry, Practical approaches for attaining security against adaptively chosen ciphertext attacks, Advances in Cryptology (Proc. Crypto '92), Springer LNCS 740 (1993), 292-304.
-
(1993)
Advances in Cryptology (Proc. Crypto '92)
, vol.740
, pp. 292-304
-
-
Zheng, Y.1
Seberry, J.2
-
32
-
-
0027614629
-
Immunizing public key cryptosystems against chosen ciphertext attacks
-
Y. Zheng and J. Seberry, Immunizing public key cryptosystems against chosen ciphertext attacks, IEEE J. on Selected Areas in Communications, 11 (1993), 715-724.
-
(1993)
IEEE J. on Selected Areas in Communications
, vol.11
, pp. 715-724
-
-
Zheng, Y.1
Seberry, J.2
-
33
-
-
49949120525
-
On primitive trinomials (mod 2)
-
MR 38:5750
-
N. Zierler and J. Brillhart, On primitive trinomials (mod 2), Information and Control, 13 (1968), 541-554. MR 38:5750
-
(1968)
Information and Control
, vol.13
, pp. 541-554
-
-
Zierler, N.1
Brillhart, J.2
-
34
-
-
0001159015
-
On primitive trinomials (mod 2), H
-
MR 39:5521
-
N. Zierler and J. Brillhart, On primitive trinomials (mod 2), H, Information and Control, 14 (1969), 566-569. MR 39:5521
-
(1969)
Information and Control
, vol.14
, pp. 566-569
-
-
Zierler, N.1
Brillhart, J.2
-
35
-
-
84968521711
-
A table of primitive binary polynomials
-
MR 94d:11099
-
M. Živković, A table of primitive binary polynomials, Math. Comp., 62 (1994a), 385-386. MR 94d:11099
-
(1994)
Math. Comp.
, vol.62
, pp. 385-386
-
-
Živković, M.1
-
36
-
-
84968500066
-
Table of primitive binary polynomials, II
-
MR 94i:11099
-
M. Živković, Table of primitive binary polynomials, II, Math. Cornp., 63 (1994b), 301-306. MR 94i:11099
-
(1994)
Math. Cornp.
, vol.63
, pp. 301-306
-
-
Živković, M.1
|