-
1
-
-
35048858891
-
Aspects of hyperelliptic curves over large prime fields in software implementations
-
LNCS
-
R.M. Avanzi. Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations. CHES'04, LNCS 3156, 148-162.
-
CHES'04
, vol.3156
, pp. 148-162
-
-
Avanzi, R.M.1
-
3
-
-
85015231653
-
Comparison of three modular reduction functions
-
LNCS
-
A. Bosselaers, R. Govaerts and J. Vandewalle. Comparison of Three Modular Reduction Functions. Crypto'94, LNCS 773, 175-186.
-
Crypto'94
, vol.773
, pp. 175-186
-
-
Bosselaers, A.1
Govaerts, R.2
Vandewalle, J.3
-
5
-
-
63449103075
-
A length-flexible threshold cryptosystem with applications
-
LNCS
-
I. Damgard and M. Jurik. A Length-Flexible Threshold Cryptosystem with Applications ACISP'03, LNCS 2727, 350-364.
-
ACISP'03
, vol.2727
, pp. 350-364
-
-
Damgard, I.1
Jurik, M.2
-
6
-
-
33745131994
-
Asymptotically optimal communication for torus-based cryptography
-
LNCS
-
M. van Dijk and D. Woodruff. Asymptotically Optimal Communication for Torus-Based Cryptography. Crypto'04, LNCS 3152, 157-178.
-
Crypto'04
, vol.3152
, pp. 157-178
-
-
Van Dijk, M.1
Woodruff, D.2
-
7
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali. Probabilistic Encryption. In Comp. Sys. Sci, 28(1), 270-299, 1984.
-
(1984)
Comp. Sys. Sci
, vol.28
, Issue.1
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
9
-
-
24144449163
-
A comparison of CEILIDH and XTR
-
LNCS
-
R. Granger, D. Page, and M. Stam. A comparison of CEILIDH and XTR. ANTS-VI, LNCS 3076, 235-249, 2004.
-
(2004)
ANTS-VI
, vol.3076
, pp. 235-249
-
-
Granger, R.1
Page, D.2
Stam, M.3
-
10
-
-
0000827611
-
m) using normal bases
-
m) Using Normal Bases. In Info. and Comp., 78(3), 171-177, 1988.
-
(1988)
Info. and Comp.
, vol.78
, Issue.3
, pp. 171-177
-
-
Itoh, T.1
Tsujii, S.2
-
11
-
-
84958969942
-
Self-tallying elections and perfect ballot secrecy
-
LNCS
-
A. Kiayias and M. Yung. Self-Tallying Elections and Perfect Ballot Secrecy. PKC'02, LNCS 2274, 141-158.
-
PKC'02
, vol.2274
, pp. 141-158
-
-
Kiayias, A.1
Yung, M.2
-
12
-
-
24944452869
-
On the rationality of tori with cyclic splitting field
-
Kuybyshev Univ. Press
-
A.A. Klyachko. On the Rationality of Tori with Cyclic Splitting Field (Russian). In Arithmetic and Geometry of Varieties, Kuybyshev Univ. Press, 73-78, 1988.
-
(1988)
Arithmetic and Geometry of Varieties
, pp. 73-78
-
-
Klyachko, A.A.1
-
13
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
IEEE Press
-
E. Kushilevitz and R. Ostrovsky. Replication is not needed: single database, computationally-private information retrieval. In Foundations of Computer Science (FOCS), IEEE Press, 364-373, 1997.
-
(1997)
Foundations of Computer Science (FOCS)
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
15
-
-
84974628135
-
The XTR public key system
-
LNCS
-
A.K. Lenstra and E.R. Verheul. The XTR Public Key System. Crypto'00, LNCS 1880, 1-19.
-
Crypto'00
, vol.1880
, pp. 1-19
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
17
-
-
84966243285
-
Modular multiplication without trial division
-
P.L. Montgomery. Modular Multiplication Without Trial Division. In Math. Comp., 44, 519-521, 1985.
-
(1985)
Math. Comp.
, vol.44
, pp. 519-521
-
-
Montgomery, P.L.1
-
19
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuaosity classes
-
LNCS
-
P. Paillier. Public-key cryptosystems based on composite degree residuaosity classes. Eurocrypt'99, LNCS 1592, 223-238.
-
Eurocrypt'99
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
20
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
S.C. Pohlig and M.E. Hellman. An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance. In IEEE Trans. on IT, 24, 106-110, 1978.
-
(1978)
IEEE Trans. on IT
, vol.24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
21
-
-
4344578717
-
Joint sparse forms and generating zero columns when combing
-
J. Proos. Joint Sparse Forms and Generating Zero Columns when Combing. University of Waterloo, Technical Report CORR 2003-23.
-
University of Waterloo, Technical Report
, vol.CORR 2003-23
-
-
Proos, J.1
-
22
-
-
84937426999
-
Supersingular abelian varieties in cryptology
-
LNCS
-
K. Rubin and A. Silverberg. Supersingular Abelian Varieties in Cryptology. Crypto'02, LNCS 2442, 336-353.
-
Crypto'02
, vol.2442
, pp. 336-353
-
-
Rubin, K.1
Silverberg, A.2
-
23
-
-
35248861712
-
Torus-based cryptography
-
LNCS
-
K. Rubin and A. Silverberg. Torus-Based Cryptography. Crypto'03, LNCS 2729, 349-365.
-
Crypto'03
, vol.2729
, pp. 349-365
-
-
Rubin, K.1
Silverberg, A.2
-
25
-
-
24944518198
-
Using primitive subgroups to do more with fewer bits
-
LNCS
-
K. Rubin and A. Silverberg. Using Primitive Subgroups to Do More with Fewer Bits. ANTS-VI, LNCS 3076, 18-41, 2004.
-
(2004)
ANTS-VI
, vol.3076
, pp. 18-41
-
-
Rubin, K.1
Silverberg, A.2
-
26
-
-
35048828873
-
Practical two-party computation based on the conditional gate
-
LNCS
-
B. Schoenmakers and P. Tuyls, Practical Two-Party Computation Based on the Conditional Gate, Asiacrypt'04, LNCS 3329, 119-136.
-
Asiacrypt'04
, vol.3329
, pp. 119-136
-
-
Schoenmakers, B.1
Tuyls, P.2
-
28
-
-
35248854585
-
Efficient subgroup exponentiation in quadratic and sixth degree extensions
-
LNCS
-
M. Stam and A.K. Lenstra. Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions. CHES'02, LNCS 2523, 318-332.
-
CHES'02
, vol.2523
, pp. 318-332
-
-
Stam, M.1
Lenstra, A.K.2
-
30
-
-
0003199344
-
Algebraic groups and their birational invariants
-
American Mathematical Society
-
V.E. Voskresenskiǐ. Algebraic Groups and Their Birational Invariants. Translations of Mathematical Monographs 179, American Mathematical Society, 1998.
-
(1998)
Translations of Mathematical Monographs
, vol.179
-
-
Voskresenskiǐ, V.E.1
-
31
-
-
84958777058
-
Private information retrieval based on the subgroup membership problem
-
LNCS
-
A. Yamamura and T. Saito. Private Information Retrieval Based on the Subgroup Membership Problem. ACISP'01, LNCS 2119, 206-220.
-
ACISP'01
, vol.2119
, pp. 206-220
-
-
Yamamura, A.1
Saito, T.2
|