-
1
-
-
84966198660
-
Explicit bounds for primality testing and related problems
-
E. Bach, Explicit bounds for primality testing and related problems, Mathematics of Computation, Vol. 55 (1990) pp. 355-380.
-
(1990)
Mathematics of Computation
, vol.55
, pp. 355-380
-
-
Bach, E.1
-
2
-
-
0003912332
-
-
The LiDIA Group, Universität des Saarlandes, Saarbrücken, Germany
-
I. Biehl, J. Buchmann and T. Papanikolaou, LiDIA - A library for computational number theory, The LiDIA Group, Universität des Saarlandes, Saarbrücken, Germany (1995).
-
(1995)
LiDIA - A Library for Computational Number Theory
-
-
Biehl, I.1
Buchmann, J.2
Papanikolaou, T.3
-
3
-
-
0242355920
-
An analysis of the reduction algorithms for binary quadratic forms
-
P. Engel and H. Syta eds., Institute of Mathematics of National Academy of Sciences, Kyiv, Ukraine
-
I. Biehl and J. Buchmann, An analysis of the reduction algorithms for binary quadratic forms, In (P. Engel and H. Syta eds.), Voronoi's Impact on Modern Science, Vol. I, Institute of Mathematics of National Academy of Sciences, Kyiv, Ukraine (1998).
-
(1998)
Voronoi's Impact on Modern Science
, vol.1
-
-
Biehl, I.1
Buchmann, J.2
-
4
-
-
84958769452
-
Convertible undeniable signatures
-
J. Boyar, D. Chaum and I. Damgård, Convertible undeniable signatures, Advances in Cryptology - CRYPTO '90, LNCS 537 (1991) pp. 189-205.
-
(1991)
Advances in Cryptology - CRYPTO '90, LNCS
, vol.537
, pp. 189-205
-
-
Boyar, J.1
Chaum, D.2
Damgård, I.3
-
5
-
-
0024139987
-
A key-exchange system based on imaginary quadratic fields
-
J. Buchmann and H. C. Williams, A key-exchange system based on imaginary quadratic fields, Journal of Cryptology, Vol. 1 (1988) pp. 107-118.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 107-118
-
-
Buchmann, J.1
Williams, H.C.2
-
7
-
-
84893342948
-
On the complexity and efficiency of a new key exchange system
-
J. Buchmann, S. Düllmann and H. C. Williams, On the complexity and efficiency of a new key exchange system, Advances in Cryptology - EUROCRYPT '89, LNCS 434 (1990) pp. 597-616.
-
(1990)
Advances in Cryptology - EUROCRYPT '89, LNCS
, vol.434
, pp. 597-616
-
-
Buchmann, J.1
Düllmann, S.2
Williams, H.C.3
-
10
-
-
0003484756
-
-
John Wiley & Sons, New York
-
2, John Wiley & Sons, New York (1989).
-
(1989)
2
-
-
Cox, D.A.1
-
13
-
-
14944351892
-
-
ECMNET Project, http://www.loria.fr/̃zimmerma/records/ecmnet.html
-
ECMNET Project
-
-
-
14
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithm in GF(p)
-
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithm in GF(p), IEEE Transactions on Information Theory, Vol. 31 (1985) pp. 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
15
-
-
84958670348
-
RSA-based undeniable signatures
-
R. Gennaro, H. Krawczyk and T. Rabin, RSA-based undeniable signatures, Advances in Cryptology - CRYPTO '97, LNCS 1294 (1997) pp. 132-149.
-
(1997)
Advances in Cryptology - CRYPTO '97, LNCS
, vol.1294
, pp. 132-149
-
-
Gennaro, R.1
Krawczyk, H.2
Rabin, T.3
-
17
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali and C. Rackoff, The knowledge complexity of interactive proof systems, SIAM J. Computing, Vol. 18 (1986) pp. 186-208.
-
(1986)
SIAM J. Computing
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
19
-
-
84957614726
-
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption
-
D. Hühnlein, M. J. Jacobson, Jr., S. Paulus and T. Takagi, A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption, Advances in Cryptology - EUROCRYPT '98, LNCS 1403 (1998) pp. 294-307.
-
(1998)
Advances in Cryptology - EUROCRYPT '98, LNCS
, vol.1403
, pp. 294-307
-
-
Hühnlein, D.1
Jacobson Jr., M.J.2
Paulus, S.3
Takagi, T.4
-
20
-
-
84968519059
-
A rigorous subexponential algorithm for computation of class groups
-
J. L. Hafner and K. S. McCurley, A rigorous subexponential algorithm for computation of class groups, J. Amer. Math. Soc., Vol. 2 (1989) pp. 837-850.
-
(1989)
J. Amer. Math. Soc.
, vol.2
, pp. 837-850
-
-
Hafner, J.L.1
McCurley, K.S.2
-
21
-
-
0001258323
-
Factoring integers with elliptic curves
-
H. W. Lenstra, Jr., Factoring integers with elliptic curves, Annals of Mathematics, Vol. 126 (1987) pp. 649-673.
-
(1987)
Annals of Mathematics
, vol.126
, pp. 649-673
-
-
Lenstra Jr., H.W.1
-
22
-
-
1242336535
-
Fast and rigorous factorization under the generalized Riemann hypothesis
-
University of Chicago
-
H. W. Lenstra, Jr., Fast and rigorous factorization under the generalized Riemann hypothesis, Tech. Report 87-007, University of Chicago (1987).
-
(1987)
Tech. Report
, vol.87
, Issue.7
-
-
Lenstra Jr., H.W.1
-
23
-
-
0003638131
-
The development of the number field sieve
-
Springer-Verlag, Berlin, Heidelberg
-
A. K. Lenstra and H. W. Lenstra, Jr. (eds.), The development of the number field sieve, Lecture Notes in Mathematics, 1554, Springer-Verlag, Berlin, Heidelberg (1991).
-
(1991)
Lecture Notes in Mathematics
, vol.1554
-
-
Lenstra, A.K.1
Lenstra Jr., H.W.2
-
24
-
-
0024139776
-
A key distribution system equivalent to factoring
-
K. S. McCurley, A key distribution system equivalent to factoring, Journal of Cryptology, Vol. 1 (1988) pp. 95-105.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 95-105
-
-
McCurley, K.S.1
-
25
-
-
84944878354
-
-
CRC Press, Boca Raton, New York, London, Tokyo
-
A. J. Menezes, P. C. van Oorschot and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, New York, London, Tokyo (1996).
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
27
-
-
0024983231
-
Public key cryptoSystems provably secure against chosen ciphertext attacks
-
M. Naor and M. Yung, Public key cryptoSystems provably secure against chosen ciphertext attacks, Proceedings of STOC 22 (1990) pp. 427-437.
-
(1990)
Proceedings of STOC
, vol.22
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
28
-
-
0842327115
-
A new public-key cryptosystem over quadratic orders with quadratic decryption time
-
S. Paulus and T. Takagi, A new public-key cryptosystem over quadratic orders with quadratic decryption time, Journal of Cryptology, Vol. 13, No. 2 (2000) pp. 263-272.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.2
, pp. 263-272
-
-
Paulus, S.1
Takagi, T.2
-
29
-
-
0030123384
-
Faster factoring of integers of a special form
-
R. Peralta and E. Okamoto, Faster factoring of integers of a special form, IEICE Trans. Fundamentals, Vol. E79-A, No. 4 (1996) pp. 489-493.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.4
, pp. 489-493
-
-
Peralta, R.1
Okamoto, E.2
-
31
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. Rivest, A. Shamir and L. M. Adleman, A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, Vol. 21, No. 2 (1978) pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.M.3
-
33
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
J. Rompel, One-way functions are necessary and sufficient for secure signatures, Proceedings of STOC 22 (1990) pp. 387-394.
-
(1990)
Proceedings of STOC
, vol.22
, pp. 387-394
-
-
Rompel, J.1
-
34
-
-
0038933271
-
Quadratic fields and factorization
-
H. W. Lenstra and R. Tijdeman eds., Math. Centrum Tracts 155, Part II, Amsterdam
-
R. J. Schoof, Quadratic fields and factorization, In (H. W. Lenstra and R. Tijdeman eds.), Computational Methods in Number Theory, Math. Centrum Tracts 155, Part II, Amsterdam (1983) pp. 235-286.
-
(1983)
Computational Methods in Number Theory
, pp. 235-286
-
-
Schoof, R.J.1
-
35
-
-
1242268990
-
On Gauss and composition I, II
-
R. A. Mollin ed., Kluwer Academic Press
-
D. Shanks, On Gauss and composition I, II, In (R. A. Mollin ed.), NATO ASI on Number Theory and Applications, Kluwer Academic Press (1989) pp. 163-179.
-
(1989)
NATO ASI on Number Theory and Applications
, pp. 163-179
-
-
Shanks, D.1
|