-
2
-
-
84946840347
-
Short signatures from the Weil pairing
-
C. Boyd (ed.), ASIACRYPT 2001, Springer-Verlag
-
D. Boneh, B. Lynn, and H Shacham, Short signatures from the Weil pairing, in C. Boyd (ed.), ASIACRYPT 2001, Springer-Verlag LNCS 2248 (2001) 514-532.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
3
-
-
33746710825
-
-
Personal communication, July 1
-
D. Boneh, Personal communication, July 1, 2005.
-
(2005)
-
-
Boneh, D.1
-
4
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
J. Kilian (ed.), TCC 2005, Springer
-
D. Boneh, E.-J. Goh, and K. Nissim, Evaluating 2-DNF formulas on ciphertexts, in J. Kilian (ed.), TCC 2005, Springer LNCS 3378 (2005) 325-341.
-
(2005)
LNCS
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
5
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
R. Cramer and V. Shoup, Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack, SIAM Journal on Computing, 33, No. 1 (2004) 167-226.
-
(2004)
SIAM Journal on Computing
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
6
-
-
84979068869
-
A new elliptic curve based analogue of RSA
-
T. Helleseth (ed.), EUROCRYPT 1993, Springer-Verlag
-
N. Demytko, A new elliptic curve based analogue of RSA, in T. Helleseth (ed.), EUROCRYPT 1993, Springer-Verlag LNCS 765 (1994) 40-49.
-
(1994)
LNCS
, vol.765
, pp. 40-49
-
-
Demytko, N.1
-
7
-
-
20344395307
-
How to disguise an elliptic curve (Weil descent)
-
G. Frey, How to disguise an elliptic curve (Weil descent), Talk at ECC 1998. Slides available from: http://www.cacr.math.uwaterloo.ca/conferences/1998/ecc98/frey.ps
-
Talk at ECC 1998
-
-
Frey, G.1
-
8
-
-
84968502759
-
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
-
G. Frey and H.-G. Rück, A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves, Math. Comp., 62, No. 206 (1994) 865-874.
-
(1994)
Math. Comp.
, vol.62
, Issue.206
, pp. 865-874
-
-
Frey, G.1
Rück, H.-G.2
-
9
-
-
33646834785
-
Pairings on elliptic curves over finite commutative rings
-
N. P. Smart (ed.), Cryptography and Coding: 10th IM A International Conference, Springer-Verlag
-
S. D. Galbraith and J. F. McKee, Pairings on elliptic curves over finite commutative rings, in N. P. Smart (ed.), Cryptography and Coding: 10th IM A International Conference, Springer-Verlag LNCS 3796 (2005) 392-409.
-
(2005)
LNCS
, vol.3796
, pp. 392-409
-
-
Galbraith, S.D.1
McKee, J.F.2
-
11
-
-
0038629591
-
Designing and detecting trapdoors for discrete log cryptosystems
-
E. F. Brickell (ed.), CRYPTO 92, Springer-Verlag
-
D. M. Gordon, Designing and detecting trapdoors for discrete log cryptosystems, in E. F. Brickell (ed.), CRYPTO 92, Springer-Verlag LNCS 740 (1993) 66-75.
-
(1993)
LNCS
, vol.740
, pp. 66-75
-
-
Gordon, D.M.1
-
12
-
-
84949219772
-
Towards practical non-interactive public key cryptosystems using non-maximal imaginary quadratic orders
-
D. R. Stinson and S. Tavares (eds.), SAC 2000, Springer-Verlag
-
D. Hühnlein, M. J. Jacobson, D. Weber, Towards practical non-interactive public key cryptosystems using non-maximal imaginary quadratic orders, in D. R. Stinson and S. Tavares (eds.), SAC 2000, Springer-Verlag LNCS 2012 (2001) 275-297.
-
(2001)
LNCS
, vol.2012
, pp. 275-297
-
-
Hühnlein, D.1
Jacobson, M.J.2
Weber, D.3
-
13
-
-
21144454271
-
Separating decision Diffie-Hellman from diffie-hellman in cryptographic groups
-
A. Joux and K. Nguyen, Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups, J. Crypt. 16 (2003) 239-248.
-
(2003)
J. Crypt.
, vol.16
, pp. 239-248
-
-
Joux, A.1
Nguyen, K.2
-
15
-
-
0001258323
-
Factoring integers with elliptic curves
-
H. W. Lenstra Jr., Factoring integers with elliptic curves, Annals of Mathematics, 126 (1987) 649-673.
-
(1987)
Annals of Mathematics
, vol.126
, pp. 649-673
-
-
Lenstra Jr., H.W.1
-
16
-
-
0346017864
-
Elliptic curves and number theoretic algorithms
-
Berkeley 1986, AMS
-
H. W. Lenstra Jr., Elliptic curves and number theoretic algorithms, Proc. International Congr. Math., Berkeley 1986, AMS (1988) 99-120.
-
(1988)
Proc. International Congr. Math.
, pp. 99-120
-
-
Lenstra Jr., H.W.1
-
17
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. J. Menezes, T. Okamoto and S. A. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Trans. Inf. Theory, 39, No. 5 (1993) 1639-1646.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.J.1
Okamoto, T.2
Vanstone, S.A.3
-
19
-
-
84956852274
-
A new public key cryptosystem as secure as factoring
-
K. Nyberg (ed.), EUROCRYPT '98, Springer-Verlag
-
T. Okamoto and S. Uchiyama, A new public key cryptosystem as secure as factoring, in K. Nyberg (ed.), EUROCRYPT '98, Springer-Verlag LNCS 1403 (1998) 308-318.
-
(1998)
LNCS
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
20
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
J. Stern (ed.), EUROCRYPT 1999, Springer-Verlag
-
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in J. Stern (ed.), EUROCRYPT 1999, Springer-Verlag LNCS 1592 (1999) 223-238.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
22
-
-
29644436612
-
An elliptic curve trapdoor scheme
-
E. Teske, An elliptic curve trapdoor scheme, J. Crypt., 19 (2006) 115-133.
-
(2006)
J. Crypt.
, vol.19
, pp. 115-133
-
-
Teske, E.1
-
23
-
-
84946825430
-
607)
-
C. Boyd (ed.), ASIACRYPT 2001, Springer-Verlag
-
607), in C. Boyd (ed.), ASIACRYPT 2001, Springer-Verlag LNCS 2248 (2001) 107-124.
-
(2001)
LNCS
, vol.2248
, pp. 107-124
-
-
Thomé, E.1
-
24
-
-
33746719961
-
-
Personal communication, January 9
-
E. Thomé, Personal communication, January 9, 2006.
-
(2006)
-
-
Thomé, E.1
|