-
1
-
-
84988764691
-
A subexponential algorithm for discrete logarithms over all finite fields
-
Lecture Notes in Computer Science, no. 773. Berlin, Germany: Springer-Verlag
-
L. M. Adleman and J. DeMarrais, "A subexponential algorithm for discrete logarithms over all finite fields," in P roc. Crypto'93 (Lecture Notes in Computer Science, no. 773). Berlin, Germany: Springer-Verlag, 1994, pp. 147-158.
-
(1994)
Proc. Crypto'93
, pp. 147-158
-
-
Adleman, L.M.1
DeMarrais, J.2
-
3
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inform. Theory, vol. IT-22, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
4
-
-
84963060268
-
On the asymptotic distribution of large prime factors
-
P. Donnelly and G. Grimmett, "On the asymptotic distribution of large prime factors," J. London Math. Soc. (2), vol. 47, pp. 395-404, 1993.
-
(1993)
J. London Math. Soc. (2)
, vol.47
, pp. 395-404
-
-
Donnelly, P.1
Grimmett, G.2
-
5
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inform. Theory, vol. IT- 31, pp. 469-472, July 1985.
-
(1985)
IEEE Trans. Inform. Theory
, vol.IT- 31
, pp. 469-472
-
-
Elgamal, T.1
-
7
-
-
0022011265
-
An efficient formula for linear recurrences
-
C. M. Fiduccia, "An efficient formula for linear recurrences," SIAM J. Comput., vol. 14, pp. 106-112, 1985.
-
(1985)
SIAM J. Comput.
, vol.14
, pp. 106-112
-
-
Fiduccia, C.M.1
-
9
-
-
0000303380
-
Discrete logarithms in GF (p) suing the number field sieve
-
D. Gordon, "Discrete logarithms in GF (p) suing the number field sieve," SIAM J. Discr. Math., vol. 6, pp. 124-138, 1993.
-
(1993)
SIAM J. Discr. Math.
, vol.6
, pp. 124-138
-
-
Gordon, D.1
-
10
-
-
0003657590
-
-
Reading, MA: Addison-Wesley
-
D. E. Knuth, The Art of Computer Programming, vol. 2, Seminumerical Algorithms. Reading, MA: Addison-Wesley, 1969.
-
(1969)
The Art of Computer Programming, Vol. 2, Seminumerical Algorithms
, vol.2
-
-
Knuth, D.E.1
-
11
-
-
0003638131
-
-
A. K. Lenstra and H. W. Lenstra, Jr., Eds., Lecture Notes in Mathematics, no. 1554. Berlin, Germany: Springer-Verlag
-
A. K. Lenstra and H. W. Lenstra, Jr., Eds., The Development of the Number Field Sieve (Lecture Notes in Mathematics, no. 1554). Berlin, Germany: Springer-Verlag, 1993.
-
(1993)
The Development of the Number Field Sieve
-
-
-
13
-
-
4344604739
-
-
New York: Wiley
-
R. Lidl, G. L. Mullen, and G. Turnwald, Dickson Polynomials, Pitman Monographs and Surveys in Pure and Applied Mathematics 65. New York: Wiley, 1993.
-
(1993)
Dickson Polynomials, Pitman Monographs and Surveys in Pure and Applied Mathematics
, vol.65
-
-
Lidl, R.1
Mullen, G.L.2
Turnwald, G.3
-
14
-
-
85042331636
-
Cryptanalysis of the Dickson-scheme
-
Berlin, Germany: Springer-Verlag
-
W. B. Müller and W. Nöbauer, "Cryptanalysis of the Dickson-scheme," in Proc. Eurocrypt'85. Berlin, Germany: Springer-Verlag, 1986, pp. 71-76.
-
(1986)
Proc. Eurocrypt'85
, pp. 71-76
-
-
Müller, W.B.1
Nöbauer, W.2
-
15
-
-
0002919666
-
Cryptanalysis of a public-key cryptosystem based on Dickson polynomials
-
W. Nöbauer, "Cryptanalysis of a public-key cryptosystem based on Dickson polynomials," Math. Slovaca, vol. 38, pp. 309-323, 1989.
-
(1989)
Math. Slovaca
, vol.38
, pp. 309-323
-
-
Nöbauer, W.1
-
16
-
-
0000758345
-
A proposed federal information processing standard for digital signature standard (DSS)
-
NIST, "A proposed federal information processing standard for digital signature standard (DSS)," Federal Register, vol. 56, pp. 42980-42982, 1991.
-
(1991)
Federal Register
, vol.56
, pp. 42980-42982
-
-
-
17
-
-
0042065225
-
-
Leipzig, Germany: Geest & Portig, 1959; London, U.K.: Pergamon
-
L. Rédei, Algebra. Leipzig, Germany: Geest & Portig, 1959; London, U.K.: Pergamon, 1967.
-
(1967)
Algebra
-
-
Rédei, L.1
-
18
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Feb.
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
20
-
-
0013587778
-
LUC public-key encryption
-
Jan.
-
P. Smith, "LUC public-key encryption," Dr. Dobb's J., pp. 44-49, Jan. 1993.
-
(1993)
Dr. Dobb's J.
, pp. 44-49
-
-
Smith, P.1
-
21
-
-
5044249037
-
A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms
-
Nov.
-
P. Smith and C. Skinner, "A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms," in Proc. Asiacrypt'94, Nov. 1994, pp. 298-306.
-
(1994)
Proc. Asiacrypt'94
, pp. 298-306
-
-
Smith, P.1
Skinner, C.2
|