-
1
-
-
84929727140
-
A subexponential algorithm for discrete logarithms over the rational subgroup of the Jacobians of large genus hyperelliptic curves over finite fields
-
Lecture Notes in Comput. Sci. 877, Springer-Verlag, Berlin
-
L. Adleman, J. Demarrais, and M. Huang, A subexponential algorithm for discrete logarithms over the rational subgroup of the Jacobians of large genus hyperelliptic curves over finite fields, in Algorithmic Number Theory: First International Symposium, Lecture Notes in Comput. Sci. 877, Springer-Verlag, Berlin, 1994, pp. 28-40.
-
(1994)
Algorithmic Number Theory: First International Symposium
, pp. 28-40
-
-
Adleman, L.1
Demarrais, J.2
Huang, M.3
-
2
-
-
35248817849
-
The EM side-channel(s)
-
Lecture Notes in Comput. Sci. 2523, Springer-Verlag, Berlin
-
D. Agrawal, B. Archambeault, J. Rao, and P. Rohatgi, The EM side-channel(s), in Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Comput. Sci. 2523, Springer-Verlag, Berlin, 2002, pp. 29-45.
-
(2002)
Cryptographic Hardware and Embedded Systems - CHES 2002
, pp. 29-45
-
-
Agrawal, D.1
Archambeault, B.2
Rao, J.3
Rohatgi, P.4
-
3
-
-
0033245872
-
An algebraic method for public-key cryptography
-
I. Anshel, M. Anshel, and D. Goldfeld, An algebraic method for public-key cryptography, Math. Res. Lett., 6 (1999), pp. 1-5.
-
(1999)
Math. Res. Lett
, vol.6
, pp. 1-5
-
-
Anshel, I.1
Anshel, M.2
Goldfeld, D.3
-
4
-
-
84937563572
-
New key agreement protocol in braid group cryptography
-
Lecture Notes in Comput. Sci. 2020, Springer-Verlag, Berlin
-
I. Anshel, M. Anshel, and D. Goldfeld, New key agreement protocol in braid group cryptography, in Topics in Cryptogrgphy - CT-RSA 2001, Lecture Notes in Comput. Sci. 2020, Springer-Verlag, Berlin, 2001, pp. 13-27.
-
(2001)
Topics in Cryptogrgphy - CT-RSA 2001
, pp. 13-27
-
-
Anshel, I.1
Anshel, M.2
Goldfeld, D.3
-
5
-
-
35048858891
-
Aspects of hyperelliptic curves over large prime fields in software implementations
-
Lecture in Comput. Sci. 3156, Springer-Verlag, Berlin
-
R. Avanzi, Aspects of hyperelliptic curves over large prime fields in software implementations, in Cryptographic Hardware and Embedded Systems - CHES 2004, Lecture in Comput. Sci. 3156, Springer-Verlag, Berlin, 2004, pp. 148-162.
-
(2004)
Cryptographic Hardware and Embedded Systems - CHES 2004
, pp. 148-162
-
-
Avanzi, R.1
-
6
-
-
0343736058
-
The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm
-
R. Balasubramanian and N. Koblitz, The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm, J. Cryptology, 11 (1998), pp. 141-145.
-
(1998)
J. Cryptology
, vol.11
, pp. 141-145
-
-
Balasubramanian, R.1
Koblitz, N.2
-
7
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Lecture Notes in Comput. Sci. 1462, Springer-Verlag, Berlin
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Relations among notions of security for public-key encryption schemes, in Advances in Cryptology - CRYPTO '98, Lecture Notes in Comput. Sci. 1462, Springer-Verlag, Berlin, 1998, pp. 26-45.
-
(1998)
Advances in Cryptology - CRYPTO '98
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
8
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangalore, India
-
C. H. Bennett and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, in Proceedings of the IEEE International Conference on Computer Systems and Signal Processing, Bangalore, India, 1984, pp. 175-179.
-
(1984)
Proceedings of the IEEE International Conference on Computer Systems and Signal Processing
, pp. 175-179
-
-
Bennett, C.H.1
Brassard, G.2
-
9
-
-
0020936237
-
Quantum cryptography, or unforgeable subway tokens
-
Plenum, New York
-
C. H. Bennett, G. Brassard, S. Breidbart, and S. Wiesner, Quantum cryptography, or unforgeable subway tokens, in Advances in Cryptology - CRYPTO '82, Plenum, New York, 1983, pp. 267-275.
-
(1983)
Advances in Cryptology - CRYPTO '82
, pp. 267-275
-
-
Bennett, C.H.1
Brassard, G.2
Breidbart, S.3
Wiesner, S.4
-
10
-
-
4344711588
-
Circuits for Integer Factorization: A Proposal
-
preprint
-
D. Bernstein, Circuits for Integer Factorization: A Proposal, preprint, 2001.
-
(2001)
-
-
Bernstein, D.1
-
11
-
-
84949244035
-
Cryptographic protocols based on the discrete logarithm problem in real quadratic number fields
-
Lecture Notes in Comput. Sci. 839, Springer-Verlag, Berlin
-
I. Biehl, J. Buchmann, and C. Thiel, Cryptographic protocols based on the discrete logarithm problem in real quadratic number fields, in Advances in Cryptology - CRYPTO '94, Lecture Notes in Comput. Sci. 839, Springer-Verlag, Berlin, 1994, pp. 56-60.
-
(1994)
Advances in Cryptology - CRYPTO '94
, pp. 56-60
-
-
Biehl, I.1
Buchmann, J.2
Thiel, C.3
-
12
-
-
0003483256
-
-
Princeton University Press, Princeton, NJ
-
J. Birman, Braids, Links, and Mapping Class Groups, Princeton University Press, Princeton, NJ, 1975.
-
(1975)
Braids, Links, and Mapping Class Groups
-
-
Birman, J.1
-
13
-
-
0003442756
-
-
Cambridge University Press, Cambridge, UK
-
I. Blake, G. Seroussi, and N. Smart, Elliptic Curves in Cryptography Cambridge University Press, Cambridge, UK, 1999.
-
(1999)
Elliptic Curves in Cryptography
-
-
Blake, I.1
Seroussi, G.2
Smart, N.3
-
14
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
-
Lecture Notes in Comput. Sci. 1462, Springer-Verlag, Berlin
-
D. Bleichenbacher, Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1, in Advances in Cryptology - CRYPTO '98, Lecture Notes in Comput. Sci. 1462, Springer-Verlag, Berlin, 1998, pp. 1-12.
-
(1998)
Advances in Cryptology - CRYPTO '98
, pp. 1-12
-
-
Bleichenbacher, D.1
-
15
-
-
0000552770
-
Twenty years of attacks on the RSA cryptosystem
-
D. Boneh, Twenty years of attacks on the RSA cryptosystem, Notices Amer. Math. Soc., 46 (1999), pp. 203-213.
-
(1999)
Notices Amer. Math. Soc.
, vol.46
, pp. 203-213
-
-
Boneh, D.1
-
16
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Lecture Notes in Comput. Sci. 1233, Springer-Verlag, Berlin
-
D. Boneh, R. Demillo, and R. Lipton, On the importance of checking cryptographic protocols for faults, in Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Comput. Sci. 1233, Springer-Verlag, Berlin, 1997, pp. 37-51.
-
(1997)
Advances in Cryptology - EUROCRYPT '97
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.2
Lipton, R.3
-
18
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, SIAM J. Comput., 32 (2003), pp. 586-615.
-
(2003)
SIAM J. Comput.
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
19
-
-
84955604812
-
Algorithms for black-box fields and their applications to cryptography
-
Lecture Notes in Comput. Sci. 1109, Springer-Verlag, Berlin
-
D. Boneh and R. Lipton, Algorithms for black-box fields and their applications to cryptography, in Advances in Cryptology - CRYPTO '96, Lecture Notes in Comput. Sci. 1109, Springer-Verlag, Berlin, 1996, pp. 283-297.
-
(1996)
Advances in Cryptology - CRYPTO '96
, pp. 283-297
-
-
Boneh, D.1
Lipton, R.2
-
20
-
-
84946840347
-
Short signatures from the Weil pairing
-
Lecture Notes in Comput. Sci. 2248, Springer-Verlag, Berlin
-
D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, in Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Comput. Sci. 2248, Springer-Verlag, Berlin, 2001, pp. 514-532.
-
(2001)
Advances in Cryptology - ASIACRYPT 2001
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
21
-
-
84957634529
-
Breaking RSA may not be equivalent to factoring
-
Lecture Notes in Comput. Sci. 1403, Springer-Verlag, Berlin
-
D. Boneh and R. Venkatesan, Breaking RSA may not be equivalent to factoring, in Advances in Cryptology - EUROCRYPT '98, Lecture Notes in Comput. Sci. 1403, Springer-Verlag, Berlin, 1998, pp. 59-71.
-
(1998)
Advances in Cryptology - EUROCRYPT '98
, pp. 59-71
-
-
Boneh, D.1
Venkatesan, R.2
-
22
-
-
85034633063
-
Breaking iterated knapsacks
-
Lecture Notes in Comput. Sci. 196, Springer-Verlag, Berlin
-
E. Brickell, Breaking iterated knapsacks, in Advances in Cryptology - CRYPTO '84, Lecture Notes in Comput. Sci. 196, Springer-Verlag, Berlin, 1985, pp. 342-358.
-
(1985)
Advances in Cryptology - CRYPTO '84
, pp. 342-358
-
-
Brickell, E.1
-
23
-
-
0024012468
-
Cryptanalysis: A survey of recent results
-
E. Brickell and A. Odlyzko, Cryptanalysis: A survey of recent results Proc. IEEE, 76 (1988), pp. 578-593.
-
(1988)
Proc. IEEE
, vol.76
, pp. 578-593
-
-
Brickell, E.1
Odlyzko, A.2
-
24
-
-
11344249589
-
A survey on IQ cryptography
-
Walter de Gruyter, Berlin
-
J. Buchmann and S. Hamdy, A survey on IQ cryptography, in Public-Key Cryptography and Computational Number Theory, Walter de Gruyter, Berlin, 2001, pp. 1-15.
-
(2001)
Public-Key Cryptography and Computational Number Theory
, pp. 1-15
-
-
Buchmann, J.1
Hamdy, S.2
-
25
-
-
0028444535
-
A key exchange protocol using real quadratic fields
-
J. Buchmann, R. Scheidler, and H. C. Williams, A key exchange protocol using real quadratic fields, J. Cryptology, 7 (1994), pp. 171-199.
-
(1994)
J. Cryptology
, vol.7
, pp. 171-199
-
-
Buchmann, J.1
Scheidler, R.2
Williams, H.C.3
-
26
-
-
0024139987
-
A key exchange system based on imaginary quadratic fields
-
J. Buchmann and H. C. Williams, A key exchange system based on imaginary quadratic fields, J. Cryptology, 1 (1988), pp. 107-118.
-
(1988)
J. Cryptology
, vol.1
, pp. 107-118
-
-
Buchmann, J.1
Williams, H.C.2
-
27
-
-
0024079003
-
A knapsack-type public key cryptosystem based on arithmetic in finite fields
-
B. Chor and R. Rivest, A knapsack-type public key cryptosystem based on arithmetic in finite fields, IEEE Trans. Inform. Theory, 34 (1988), pp. 901-909.
-
(1988)
IEEE Trans. Inform. Theory
, vol.34
, pp. 901-909
-
-
Chor, B.1
Rivest, R.2
-
29
-
-
0021468777
-
Fast evaluation of logarithms in fields of characteristic two
-
D. Coppersmith, Fast evaluation of logarithms in fields of characteristic two, IEEE Trans. Inform. Theory, 30 (1984), pp. 587-594.
-
(1984)
IEEE Trans. Inform. Theory
, vol.30
, pp. 587-594
-
-
Coppersmith, D.1
-
30
-
-
84957355408
-
Lattice attacks on NTRU
-
Lecture Notes in Comput. Sci. 1233, Springer-Verlag, Berlin
-
D. Coppersmith and A. Shamir, Lattice attacks on NTRU, in Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Comput. Sci. 1233, Springer-Verlag, Berlin, 1997, pp. 52-61.
-
(1997)
Advances in Cryptology - EUROCRYPT '97
, pp. 52-61
-
-
Coppersmith, D.1
Shamir, A.2
-
33
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. Elgamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory, 31 (1985), pp. 469-472.
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
34
-
-
0001782990
-
Combinatorial cryptosystems galore!
-
M. Fellows and N. Koblitz, Combinatorial cryptosystems galore!, Contemp. Math., 168 (1994), pp. 51-61.
-
(1994)
Contemp. Math
, vol.168
, pp. 51-61
-
-
Fellows, M.1
Koblitz, N.2
-
35
-
-
0001113371
-
An extension of Satoh's algorithm and its implementation
-
M. Fouquet, P. Gaudry, and R. Harley, An extension of Satoh's algorithm and its implementation, J. Ramanujan Math. Soc., 15 (2000), pp. 281-318.
-
(2000)
J. Ramanujan Math. Soc.
, vol.15
, pp. 281-318
-
-
Fouquet, M.1
Gaudry, P.2
Harley, R.3
-
36
-
-
84968502759
-
A remark A concerning m-divisibility and the discrete logarithm in the divisor class group of curves
-
G. Frey and H. Rück, A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves, Math. Comp., 62 (1994), pp. 865-874.
-
(1994)
Math. Comp.
, vol.62
, pp. 865-874
-
-
Frey, G.1
Rück, H.2
-
37
-
-
84948978775
-
An algorithm for solving the discrete log problem on hyperelliptic curves
-
Lecture Notes in Comput. Sci. 1807, Springer-Verlag, Berlin
-
P. Gaudry, An algorithm for solving the discrete log problem on hyperelliptic curves, in Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Comput. Sci. 1807, Springer-Verlag, Berlin, 2000, pp. 19-34.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000
, pp. 19-34
-
-
Gaudry, P.1
-
38
-
-
84958773354
-
A comparison and a combination of SST and AGM algorithms for counting points of elliptic curves in characteristic 2
-
Lecture Notes in Comput. Sci. 2656, Springer-Verlag, Berlin
-
P. Gaudry, A comparison and a combination of SST and AGM algorithms for counting points of elliptic curves in characteristic 2, in Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Comput. Sci. 2656, Springer-Verlag, Berlin, 2003, pp. 311-327.
-
(2003)
Advances in Cryptology - EUROCRYPT 2003
, pp. 311-327
-
-
Gaudry, P.1
-
40
-
-
0001788567
-
Constructive and destructive facets of Weil descent on elliptic curves
-
P. Gaudry, F. Hess, and N. Smart, Constructive and destructive facets of Weil descent on elliptic curves, J. Cryptology, 15 (2002), pp. 19-34.
-
(2002)
J. Cryptology
, vol.15
, pp. 19-34
-
-
Gaudry, P.1
Hess, F.2
Smart, N.3
-
42
-
-
35248821952
-
Cryptanalysis of the NTRU signature scheme (NSS) from Eurocrypt 2001
-
Lecture Notes in Comput. Sci. 2248, Springer-Verlag, Berlin
-
C. Gentry, J. Jonsson, M. Szydlo, and J. Stern, Cryptanalysis of the NTRU signature scheme (NSS) from Eurocrypt 2001, in Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Comput. Sci. 2248, Springer-Verlag, Berlin, 2001, pp. 1-20.
-
(2001)
Advances in Cryptology - ASIACRYPT 2001
, pp. 1-20
-
-
Gentry, C.1
Jonsson, J.2
Szydlo, M.3
Stern, J.4
-
43
-
-
84947222499
-
Analysis of the revised NTRU signature scheme R-NSS
-
Lecture Notes in Comput. Sci. 2332, Springer-Verlag, Berlin
-
C. Gentry and M. Szydlo, Analysis of the revised NTRU signature scheme R-NSS, in Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Comput. Sci. 2332, Springer-Verlag, Berlin, 2002, pp. 299-320.
-
(2002)
Advances in Cryptology - EUROCRYPT 2002
, pp. 299-320
-
-
Gentry, C.1
Szydlo, M.2
-
45
-
-
0033321914
-
Public-key cryptosystems based on cubic finite field extensions
-
G. Gong and L. Harn, Public-key cryptosystems based on cubic finite field extensions, IEEE Trens. Inform. Theory, 45 (1999), pp. 2601-2605.
-
(1999)
IEEE Trens. Inform. Theory
, vol.45
, pp. 2601-2605
-
-
Gong, G.1
Harn, L.2
-
46
-
-
0000303380
-
Discrete logarithms in GF(p) using the number field sieve
-
D. M. Gordon, Discrete logarithms in GF(p) using the number field sieve, SIAM J. Discrete Math., 6 (1993), pp. 124-138.
-
(1993)
SIAM J. Discrete Math
, vol.6
, pp. 124-138
-
-
Gordon, D.M.1
-
47
-
-
84968519059
-
A rigorous subexponential algorithm for computation of class groups
-
J. L. Hafner and K. S. McCurley, A rigorous subexponential algorithm for computation of class groups, J. Amer. Math. Soc., 2 (1989), pp. 839-850.
-
(1989)
J. Amer. Math. Soc.
, vol.2
, pp. 839-850
-
-
Hafner, J.L.1
McCurley, K.S.2
-
48
-
-
11244267013
-
-
Springer-Verlag, New York
-
D. Hankerson, A. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer-Verlag, New York, 2003.
-
Guide to Elliptic Curve Cryptography
, vol.2003
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
49
-
-
0023985175
-
Solving simultaneous modular equations of low degree
-
J. Håstad, Solving simultaneous modular equations of low degree SIAM J. Comput., 17 (1988), pp. 336-341.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 336-341
-
-
Håstad, J.1
-
50
-
-
0018019325
-
Hiding information and signatures in trapdoor knapsacks
-
M. E. Hellman and R. C. Merkle, Hiding information and signatures in trapdoor knapsacks, IEEE Trans. Inform. Theory, 24 (1978), pp. 525-530.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, pp. 525-530
-
-
Hellman, M.E.1
Merkle, R.C.2
-
51
-
-
35248867395
-
The GHS attack revisited
-
Lecture Notes in Comput. Sci. 2656, Springer-Verlag, Berlin
-
F. Hess, The GHS attack revisited, in Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Comput. Sci. 2656, Springer-Verlag, Berlin, 2003, pp. 374-387.
-
(2003)
Advances in Cryptology - EUROCRYPT 2003
, pp. 374-387
-
-
Hess, F.1
-
52
-
-
84947808606
-
NTRU: A public key cryptosystem
-
Lecture Notes in Comput. Sci. 1423, Springer-Verlag, Berlin
-
J. Hoffstein, J. Pipher, and J. Silverman, NTRU: A ring-based public key cryptosystem, in Algorithmic Number Theory: Third International Symposium, Lecture Notes in Comput. Sci. 1423, Springer-Verlag, Berlin, 1998, pp. 267-288.
-
(1998)
Algorithmic Number Theory: Third International Symposium
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.3
-
53
-
-
38049018110
-
NSS: An NTRU lattice-based signature scheme
-
Lecture Notes in Comput. Sci. 2045, Springer-Verlag, Berlin
-
J. Hoffstein, J. Pipher, and J. Silverman, NSS: An NTRU lattice-based signature scheme, in Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Comput. Sci. 2045, Springer-Verlag, Berlin, 2001, pp. 211-228.
-
(2001)
Advances in Cryptology - EUROCRYPT 2001
, pp. 211-228
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.3
-
54
-
-
35248868901
-
The impact of decryption failures on the security of NTRU encryption
-
Lecture Notes in Comput. Sci. 2729, Springer-Verlag, Berlin
-
N. Howgrave-Graham, P. Nguyen, D. Pointcheval, J. Proos, J. Silverman, A. Singer, and W. Whyte, The impact of decryption failures on the security of NTRU encryption, in Advances in Cryptology - CRYPTO 2003, Lecture Notes in Comput. Sci. 2729, Springer-Verlag, Berlin, 2003, pp. 226-246.
-
(2003)
Advances in Cryptology - CRYPTO 2003
, pp. 226-246
-
-
Howgrave-Graham, N.1
Nguyen, P.2
Pointcheval, D.3
Proos, J.4
Silverman, J.5
Singer, A.6
Whyte, W.7
-
55
-
-
84947423684
-
A linear algebraic attack on the AAFG1 braid group cryptosystem
-
Lecture Notes in Comput. Sci. 2384, Springer-Verlag, Berlin
-
J. Hughes, A linear algebraic attack on the AAFG1 braid group cryptosystem, in Proceedings of the 7th Australian Conference on Information Security and Privacy ACISP 2002, Lecture Notes in Comput. Sci. 2384, Springer-Verlag, Berlin, 2002, pp. 176-189.
-
(2002)
Proceedings of the 7th Australian Conference on Information Security and Privacy ACISP 2002
, pp. 176-189
-
-
Hughes, J.1
-
56
-
-
84947711740
-
Efficient implementation of Schoof's algorithm
-
Lecture Notes in Comput. Sci. 1514, Springer-Verlag, Berlin
-
T. Izu, J. Kogure, M. Noro, and K. Yokoyama, Efficient implementation of Schoof's algorithm, in Advances in Cryptology - ASIACRYPT '98, Lecture Notes in Comput. Sci. 1514, Springer-Verlag, Berlin, 1998, pp. 66-79.
-
(1998)
Advances in Cryptology - ASIACRYPT '98
, pp. 66-79
-
-
Izu, T.1
Kogure, J.2
Noro, M.3
Yokoyama, K.4
-
57
-
-
0346111862
-
Analysis of the xedni calculus attack
-
M. Jacobson, N. Koblitz, J. Silverman, A. Stein, and E. Teske, Analysis of the xedni calculus attack, Des. Codes Cryptogr., 20 (2000), pp. 41-64.
-
(2000)
Des. Codes Cryptogr.
, vol.20
, pp. 41-64
-
-
Jacobson, M.1
Koblitz, N.2
Silverman, J.3
Stein, A.4
Teske, E.5
-
58
-
-
11344293445
-
Solving elliptic curve discrete logarithm problems using Weil descent
-
M. Jacobson, A. Menezes, and A. Stein, Solving elliptic curve discrete logarithm problems using Weil descent, J. Ramanujan Math. Soc., 16 (2001), pp. 231-260.
-
(2001)
J. Ramanujan Math. Soc.
, vol.16
, pp. 231-260
-
-
Jacobson, M.1
Menezes, A.2
Stein, A.3
-
59
-
-
84974588978
-
A chosen ciphertext attack against NTRU
-
Lecture Notes in Comput. Sci. 1880, Springer-Verlag, Berlin
-
E. Jaulmes and A. Joux, A chosen ciphertext attack against NTRU, in Advances in Cryptology - CRYPTO 2000, Lecture Notes in Comput. Sci. 1880, Springer-Verlag, Berlin, 2000, pp. 20-35.
-
(2000)
Advances in Cryptology - CRYPTO 2000
, pp. 20-35
-
-
Jaulmes, E.1
Joux, A.2
-
60
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
Lecture Notes in Comput. Sci. 1838, Springer-Verlag, Berlin
-
A. Joux, A one round protocol for tripartite Diffie-Hellman, in Algorithmic Number Theory: Fourth International Symposium, Lecture Notes in Comput. Sci. 1838, Springer-Verlag, Berlin, 2000, pp. 385-393.
-
(2000)
Algorithmic Number Theory: Fourth International Symposium
, pp. 385-393
-
-
Joux, A.1
-
61
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, Elliptic curve cryptosystems, Math. Comp., 48 (1987), pp. 203-209.
-
(1987)
Math. Comp.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
62
-
-
0024864204
-
Hyperelliptic cryptosystems
-
N. Koblitz, Hyperelliptic cryptosystems, J. Cryptology, 1 (1989), pp. 139-150.
-
(1989)
J. Cryptology
, vol.1
, pp. 139-150
-
-
Koblitz, N.1
-
63
-
-
85030323959
-
Constructing elliptic curve cryptosystems in characteristic 2
-
Lecture Notes in Comput. Sci. 537, Springer-Verlag, Berlin
-
N. Koblitz, Constructing elliptic curve cryptosystems in characteristic 2, in Advances in Cryptology - CRYPTO '90, Lecture Notes in Comput. Sci. 537, Springer-Verlag, Berlin, 1991, pp. 156-167.
-
(1991)
Advances in Cryptology - CRYPTO '90
, pp. 156-167
-
-
Koblitz, N.1
-
64
-
-
0348022988
-
Elliptic curve implementation of zero-knowledge blobs
-
N. Koblitz, Elliptic curve implementation of zero-knowledge blobs, J. Cryptology, 4 (1991), pp. 207-213.
-
(1991)
J. Cryptology
, vol.4
, pp. 207-213
-
-
Koblitz, N.1
-
65
-
-
85024567680
-
CM-curves with good cryptographic properties
-
Lecture Notes in Comput. Sci. 576, Springer-Verlag, Berlin
-
N. Koblitz, CM-curves with good cryptographic properties, in Advances in Cryptology - CRYPTO '91, Lecture Notes in Comput. Sci. 576, Springer-Verlag, Berlin, 1992, pp. 279-287.
-
(1992)
Advances in Cryptology - CRYPTO '91
, pp. 279-287
-
-
Koblitz, N.1
-
68
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Lecture Notes in Comput. Sci. 1109, Springer-Verlag, Berlin
-
P. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, in Advances in Cryptology - CRYPTO '96, Lecture Notes in Comput. Sci. 1109, Springer-Verlag, Berlin, 1996, pp. 104-113.
-
(1996)
Advances in Cryptology - CRYPTO '96
, pp. 104-113
-
-
Kocher, P.1
-
69
-
-
84939573910
-
Differential power analysis
-
Lecture Notes in Comput. Sci. 1666, Springer-Verlag, Berlin
-
P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, in Advances in Cryptology - CRYPTO '99, Lecture Notes in Comput. Sci. 1666, Springer-Verlag, Berlin, 1999, pp. 388-397.
-
(1999)
Advances in Cryptology - CRYPTO '99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
70
-
-
85009967725
-
Constructing elliptic curves with given group order over large finite fields
-
Lecture Notes in Comput. Sci. 877, Springer-Verlag, Berlin
-
G. Lay and H. Zimmer, Constructing elliptic curves with given group order over large finite fields, in Algorithmic Number Theory: First International Symposium, Lecture Notes in Comput. Sci. 877, Springer-Verlag, Berlin, 1994, pp. 250-263.
-
(1994)
Algorithmic Number Theory: First International Symposium
, pp. 250-263
-
-
Lay, G.1
Zimmer, H.2
-
71
-
-
34250244723
-
Factoring polynomials with integer coefficients
-
A. K. Lenstra, H. W. Lenstra, Jr., and L. Lovasz, Factoring polynomials with integer coefficients, Math. Ann., 261 (1982), pp. 513-534.
-
(1982)
Math. Ann.
, vol.261
, pp. 513-534
-
-
Lenstra, A.K.1
Lenstra Jr., H.W.2
Lovasz, L.3
-
72
-
-
84948989672
-
Analysis and optimization of the TWINKLE factoring device
-
Lecture Notes in Comput. Sci. 1807, Springer-Verlag, Berlin
-
A. K. Lenstra and A. Shamir, Analysis and optimization of the TWINKLE factoring device, in Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Comput. Sci. 1807, Springer-Verlag, Berlin, 2000, pp. 35-52.
-
(2000)
Advances in Cryptology - EUROCRYPT 2000
, pp. 35-52
-
-
Lenstra, A.K.1
Shamir, A.2
-
73
-
-
84974628135
-
The XTR public key system
-
Lecture Notes in Comput. Sci. 1880, Springer-Verlag, Berlin
-
A. K. Lenstra and E. R. Verheul, The XTR public key system, in Advances in Cryptology - CRYPTO 2000, Lecture Notes in Comput. Sci. 1880, Springer-Verlag, Berlin, 2000, pp. 1-19.
-
(2000)
Advances in Cryptology - CRYPTO 2000
, pp. 1-19
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
74
-
-
0001258323
-
Factoring integers with elliptic curves
-
H. W. Lenstra, Jr., Factoring integers with elliptic curves, Ann. of Math. (2), 126 (1987), pp. 649-673.
-
(1987)
Ann. of Math.
, vol.126
, Issue.2
, pp. 649-673
-
-
Lenstra Jr., H.W.1
-
75
-
-
85034665565
-
A public key cryptosystem based on the word problem Berlin
-
Lecture Notes in Comput. Sci. 196, Springer-Verlag
-
M. Magyarik and N. Wagner, A public key cryptosystem based on the word problem, in Advances in Cryptology - CRYPTO '84, Lecture Notes in Comput. Sci. 196, Springer-Verlag, Berlin, 1985, pp. 19-36.
-
(1985)
Advances in Cryptology - CRYPTO '84
, pp. 19-36
-
-
Magyarik, M.1
Wagner, N.2
-
76
-
-
33846862428
-
A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1 v2.0
-
Lecture Notes in Comput. Sci. 2139, Springer-Verlag, Berlin
-
J. Manger, A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1 v2.0, in Advances in Cryptology - CRYPTO 2001, Lecture Notes in Comput. Sci. 2139, Springer-Verlag, Berlin, 2001, pp. 230-238.
-
(2001)
Advances in Cryptology - CRYPTO 2001
, pp. 230-238
-
-
Manger, J.1
-
78
-
-
11344252143
-
Analysis of the GHS Weil descent attack on the ECDLP over characteristic two finite fields of composite degree
-
M. Maurer, A. Menezes, and E. Teske, Analysis of the GHS Weil descent attack on the ECDLP over characteristic two finite fields of composite degree, LMS J. Comput. Math., 5 (2002), pp. 127-174.
-
(2002)
LMS J. Comput. Math.
, vol.5
, pp. 127-174
-
-
Maurer, M.1
Menezes, A.2
Teske, E.3
-
79
-
-
0032621240
-
The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms
-
U. M. Maurer and S. Wolf, The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms, SIAM J. Comput., 28 (1999), pp. 1689-1721.
-
(1999)
SIAM J. Comput.
, vol.28
, pp. 1689-1721
-
-
Maurer, U.M.1
Wolf, S.2
-
80
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. Menezes, T. Okamoto, and S. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Trans. Inform. Theory, 39 (1993), pp. 1639-1646.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
81
-
-
33847320580
-
Analysis of the Weil descent attack of Gaudry, Hess and Smart
-
Lecture Notes in Comput. Sci. 2020, Springer-Verlag, Berlin
-
A. Menezes and M. Qu, Analysis of the Weil descent attack of Gaudry, Hess and Smart, in Topics in Cryptology - CT-RSA 2001, Lecture Notes in Comput. Sci. 2020, Springer-Verlag, Berlin, 2001, pp. 308-318.
-
(2001)
Topics in Cryptology - CT-RSA 2001
, pp. 308-318
-
-
Menezes, A.1
Qu, M.2
-
82
-
-
35048833769
-
Weak fields for ECC
-
Lecture Notes in Comput. Sci. 2964, Springer-Verlag, Berlin
-
A. Menezes, E. Teske, and A. Weng, Weak fields for ECC, in Topics in Cryptology - CT-RSA 2004, Lecture Notes in Comput. Sci. 2964, Springer-Verlag, Berlin, 2004, pp. 366-386.
-
(2004)
Topics in Cryptology - CT-RSA 2004
, pp. 366-386
-
-
Menezes, A.1
Teske, E.2
Weng, A.3
-
83
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
A. Menezes, P. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1996.
-
Handbook of Applied Cryptography
, vol.1996
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.A.3
-
84
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Lecture Notes in Comput. Sci. 218, Springer-Verlag, Berlin
-
V. Miller, Uses of elliptic curves in cryptography, in Advances in Cryptology - CRYPTO '85, Lecture Notes in Comput. Sci. 218, Springer-Verlag, Berlin, 1986, pp. 417-426.
-
(1986)
Advances in Cryptology - CRYPTO '85
, pp. 417-426
-
-
Miller, V.1
-
86
-
-
84889062986
-
Building cyclic elliptic curves modulo large primes
-
Lecture Notes in Comput. Sci. 547, Springer-Verlag, Berlin
-
F. Morain, Building cyclic elliptic curves modulo large primes, in Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Comput. Sci. 547, Springer-Verlag, Berlin, 1991, pp. 328-336.
-
(1991)
Advances in Cryptology - EUROCRYPT '91
, pp. 328-336
-
-
Morain, F.1
-
87
-
-
0002996665
-
On the algorithmic unsolvability of the word problem in group theory
-
P. S. Novikov, On the algorithmic unsolvability of the word problem in group theory, Trudy Mat. Inst. im. Steklov., 44 (1955), pp. 1-143.
-
(1955)
Trudy Mat. Inst. Im. Steklov
, vol.44
, pp. 1-143
-
-
Novikov, P.S.1
-
88
-
-
0002114928
-
The rise and fall of knapsack cryptosystems
-
AMS, Providence, RI
-
A. Odlyzko, The rise and fall of knapsack cryptosystems, in Cryptology and Computational Number Theory, Proc. Sympos. Appl. Math. 42, AMS, Providence, RI, 1990, pp. 75-88.
-
(1990)
Cryptology and Computational Number Theory, Proc. Sympos. Appl. Math. 42
, pp. 75-88
-
-
Odlyzko, A.1
-
89
-
-
84957640013
-
Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt '88
-
Lecture Notes in Comput. Sci. 963, Springer-Verlag, Berlin
-
J. Patarin, Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt '88, in Advances in Cryptology - CRYPTO '95, Lecture Notes in Comput. Sci. 963, Springer-Verlag, Berlin, 1995, pp. 248-261.
-
(1995)
Advances in Cryptology - CRYPTO '95
, pp. 248-261
-
-
Patarin, J.1
-
90
-
-
84947932132
-
Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms
-
Lecture Notes in Comput. Sci. 1070, Springer-Verlag, Berlin
-
J. Patarin, Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms, in Advances in Cryptology - EUROCRYPT '96, Lecture Notes in Comput. Sci. 1070, Springer-Verlag, Berlin, 1996, pp. 33-48.
-
(1996)
Advances in Cryptology - EUROCRYPT '96
, pp. 33-48
-
-
Patarin, J.1
-
91
-
-
84955622221
-
Asymmetric cryptography with a hidden monomial
-
Lecture Notes in Comput. Sci. 1109, Springer-Verlag, Berlin
-
J. Patarin, Asymmetric cryptography with a hidden monomial, in Advances in Cryptology - CRYPTO '96, Lecture Notes in Comput. Sci. 1109, Springer-Verlag, Berlin, 1996, pp. 45-60.
-
(1996)
Advances in Cryptology - CRYPTO '96
, pp. 45-60
-
-
Patarin, J.1
-
92
-
-
35248899925
-
Hyperelliptic curve cryptosystems: Closing the performance gap to elliptic curves
-
Lecture Notes in Comput. Sci. 2779, Springer-Verlag, Berlin
-
J. Pelzl, T. Wollinger, J. Guajardo, and C. Paar, Hyperelliptic curve cryptosystems: Closing the performance gap to elliptic curves, in Cryptographic Hardware and Embedded Systems - CHES 2003, Lecture Notes in Comput. Sci. 2779, Springer-Verlag, Berlin, 2003, pp. 351-365.
-
(2003)
Cryptographic Hardware and Embedded Systems - CHES 2003
, pp. 351-365
-
-
Pelzl, J.1
Wollinger, T.2
Guajardo, J.3
Paar, C.4
-
93
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
S. Poslig and M. Hellman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Trans. Inform. Theory, 24 (1978), pp. 106-110.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, pp. 106-110
-
-
Poslig, S.1
Hellman, M.2
-
94
-
-
84966238549
-
Monte Carlo methods for index computation mod p
-
J. Pollard, Monte Carlo methods for index computation mod p, Math. Comp., 32 (1978), pp. 918-924.
-
(1978)
Math. Comp.
, vol.32
, pp. 918-924
-
-
Pollard, J.1
-
95
-
-
33645002788
-
Factoring with cubic integers
-
Lecture Notes in Math. 1554, Springer-Verlag, Berlin
-
J. Pollard, Factoring with cubic integers, in The Development of the Number Field Sieve, Lecture Notes in Math. 1554, Springer-Verlag, Berlin, 1993, pp. 4-10.
-
(1993)
The Development of the Number Field Sieve
, pp. 4-10
-
-
Pollard, J.1
-
96
-
-
0141457783
-
Shor's discrete logarithm quantum algorithm for elliptic curves
-
J. Proos and C. Zalka, Shor's discrete logarithm quantum algorithm for elliptic curves, Quantum Inf. Comput., 3 (2003), pp. 317-344.
-
(2003)
Quantum Inf. Comput.
, vol.3
, pp. 317-344
-
-
Proos, J.1
Zalka, C.2
-
97
-
-
0016090968
-
A high-security log-in procedure
-
G. Purdy, A high-security log-in procedure, Coram. ACM, 17 (1974), pp. 442-445.
-
(1974)
Coram. ACM
, vol.17
, pp. 442-445
-
-
Purdy, G.1
-
98
-
-
0017930809
-
A Method for obtaining digital signatures and public key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Comm. ACM, 21 (1978), pp. 120-126.
-
(1978)
Comm. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
100
-
-
0001100056
-
The canonical lift of an ordinary elliptic curve over a prime field and its point counting
-
T. Satoh, The canonical lift of an ordinary elliptic curve over a prime field and its point counting, J. Ramanujan Math. Soc., 15 (2000), pp. 247-270.
-
(2000)
J. Ramanujan Math. Soc.
, vol.15
, pp. 247-270
-
-
Satoh, T.1
-
101
-
-
0343623059
-
Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves
-
T. satoh and K. Araki, Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves, Comment. Math. Univ. St. Paul., 47 (1998), pp. 81-92.
-
(1998)
Comment. Math. Univ. St. Paul
, vol.47
, pp. 81-92
-
-
Satoh, T.1
Araki, K.2
-
102
-
-
0037273463
-
Fast computation of canonical lifts of elliptic curves and its application to point counting
-
T. Satoh, B. Skjernaa, and Y. Taguchi, Fast computation of canonical lifts of elliptic curves and its application to point counting, Finite Fields Appl., 9 (2003), pp. 89-101.
-
(2003)
Finite Fields Appl.
, vol.9
, pp. 89-101
-
-
Satoh, T.1
Skjernaa, B.2
Taguchi, Y.3
-
104
-
-
84966233278
-
Elliptic curves over finite fields and the computation of square roots mod p
-
R. Schoof, Elliptic curves over finite fields and the computation of square roots mod p, Math. Comp., 44 (1985), pp. 483-494.
-
(1985)
Math. Comp.
, vol.44
, pp. 483-494
-
-
Schoof, R.1
-
105
-
-
38249034734
-
Nonsingular plane cubic curves
-
R. Schoof, Nonsingular plane cubic curves, J. Combin. Theory Ser. A, 46 (1987), pp. 183-211.
-
(1987)
J. Combin. Theory Ser. A
, vol.46
, pp. 183-211
-
-
Schoof, R.1
-
106
-
-
0032352723
-
Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p
-
I. Semaev, Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p, Math. Comp., 67 (1998), pp. 353-356
-
(1998)
Math. Comp.
, vol.67
, pp. 353-356
-
-
Semaev, I.1
-
107
-
-
0020250504
-
A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem
-
IEEE Computer Society Press, New York
-
A. Shamir, A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem, in Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, IEEE Computer Society Press, New York, 1982, pp. 145-152.
-
(1982)
Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
, pp. 145-152
-
-
Shamir, A.1
-
108
-
-
35248849882
-
Factoring large numbers with the TWIRL device
-
Lecture Notes in Comput. Sci. 2729, Springer-Verlag, Berlin
-
A. Shamir and E. Tromer, Factoring large numbers with the TWIRL device, in Advances in Cryptology - CRYPTO 2003, Lecture Notes in Comput. Sci. 2729, Springer-Verlag, Berlin, 2003, pp. 1-26.
-
(2003)
Advances in Cryptology - CRYPTO 2003
, pp. 1-26
-
-
Shamir, A.1
Tromer, E.2
-
109
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
P. W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Comput., 26 (1997), 1484-1509.
-
(1997)
SIAM J. Comput.
, vol.26
, pp. 1484-1509
-
-
Shor, P.W.1
-
110
-
-
0003474033
-
The Arithmetic of Elliptic Curves
-
Springer-Verlag, New York
-
J. Silverman, The Arithmetic of Elliptic Curves, Springer-Verlag, New York, 1986.
-
, vol.1986
-
-
Silverman, J.1
-
111
-
-
0012234171
-
The xedni calculus and the elliptic curve discrete logarithm problem
-
J. Silverman, The xedni calculus and the elliptic curve discrete logarithm problem, Des. Codes Cryptogr., 20 (2000), pp. 5-40.
-
(2000)
Des. Codes Cryptogr.
, vol.20
, pp. 5-40
-
-
Silverman, J.1
-
112
-
-
84947727672
-
Elliptic curve discrete logarithms and the index calculus
-
Lecture Notes in Comput. Sci. 1514, Springer-Verlag, Berlin
-
J. Silverman and J. Suzuki, Elliptic curve discrete logarithms and the index calculus, Advances in Cryptology - ASIACRYPT '98, Lecture Notes in Comput. Sci. 1514, Springer-Verlag, Berlin, 1998, pp. 110-125.
-
(1998)
Advances in Cryptology - ASIACRYPT '98
, pp. 110-125
-
-
Silverman, J.1
Suzuki, J.2
-
113
-
-
0003539458
-
The discrete logarithm problem on elliptic curves of trace one
-
N. Smart, The discrete logarithm problem on elliptic curves of trace one, J. Cryptology, 12 (1999), pp. 193-196.
-
(1999)
J. Cryptology
, vol.12
, pp. 193-196
-
-
Smart, N.1
-
114
-
-
0010029876
-
Efficient arithmetic on Koblitz curves
-
J. Solinas, Efficient arithmetic on Koblitz curves, Des. Codes Cryptogr., 19 (2000), pp. 195-249.
-
(2000)
Des. Codes Cryptogr.
, vol.19
, pp. 195-249
-
-
Solinas, J.1
-
115
-
-
0003987443
-
-
2nd ed., Chapman & Hall/CRC, Boca Raton, FL
-
D. Stinson, Cryptography: Theory and Practice, 2nd ed., Chapman & Hall/CRC, Boca Raton, FL, 2002.
-
(2002)
Cryptography: Theory and Practice
-
-
Stinson, D.1
-
116
-
-
84947761194
-
Speeding up Pollard's rho method for computing discrete logarithms
-
Lecture Notes in Comput. Sci. 1423, Springer-Verlag, Berlin
-
E. Teske, Speeding up Pollard's rho method for computing discrete logarithms, in Algorithmic Number Theory: Third International Symposium, Lecture Notes in Comput. Sci. 1423, Springer-Verlag, Berlin, 1998, pp. 541-554.
-
(1998)
Algorithmic Number Theory: Third International Symposium
, pp. 541-554
-
-
Teske, E.1
-
117
-
-
0345058968
-
Index calculus attack for hyperelliptic curves of small genus
-
Lecture Notes in Comput. Sci. 2894, Springer-Verlag, Berlin
-
N. Thériault, Index calculus attack for hyperelliptic curves of small genus, in Advances in Cryptology - ASIACRYPT 2003, Lecture Notes in Comput. Sci. 2894, Springer-Verlag, Berlin, 2003, pp. 75-92.
-
(2003)
Advances in Cryptology - ASIACRYPT 2003
, pp. 75-92
-
-
Thériault, N.1
-
118
-
-
11344293442
-
Public key cryptosystems based on word problems
-
Ho Chi Minh City
-
D. L. Van, A. Jeyanthi, R. Siromoney and K. G. Subramanian, Public key cryptosystems based on word problems, in Proceedings of the ICOMIDC Symposium on Mathematics of Computation, Ho Chi Minh City, 1988.
-
(1988)
Proceedings of the ICOMIDC Symposium on Mathematics of Computation
-
-
Van, D.L.1
Jeyanthi, A.2
Siromoney, R.3
Subramanian, K.G.4
-
119
-
-
84957701870
-
Cryptanalysis of the Chor-Rivest cryptosystem
-
Lecture Notes in Comput. Sci. 1462, Springer-Verlag, Berlin
-
S. Vaudenay, Cryptanalysis of the Chor-Rivest cryptosystem, in Advances in Cryptology - CRYPTO '98, Lecture Notes in Comput. Sci. 1462, Springer-Verlag, Berlin, 1998, pp. 243-256.
-
(1998)
Advances in Cryptology - CRYPTO '98
, pp. 243-256
-
-
Vaudenay, S.1
-
120
-
-
84945129491
-
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
-
Lecture Notes in Comput. Sci. 2045, Springer-Verlag, Berlin
-
E. Verheul, Evidence that XTR is more secure than supersingular elliptic curve cryptosystems, in Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Comput. Sci. 2045, Springer-Verlag, Berlin, 2001, pp. 195-210.
-
(2001)
Advances in Cryptology - EUROCRYPT 2001
, pp. 195-210
-
-
Verheul, E.1
-
122
-
-
0001556633
-
Abelian varieties over finite fields
-
W. Waterhouse, Abelian varieties over finite fields, Ann. Sci. École Norm. Sup. (4), 2 (1969), pp. 521-560.
-
(1969)
Ann. Sci. École Norm. Sup.
, vol.2
, Issue.4
, pp. 521-560
-
-
Waterhouse, W.1
-
123
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents
-
M. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Trans. Inform. Theory, 36 (1990), pp. 553-558.
-
(1990)
IEEE Trans. Inform. Theory
, vol.36
, pp. 553-558
-
-
Wiener, M.1
|