-
1
-
-
84966198660
-
Explicit bounds for primality testing and related problems
-
Bach, E.: Explicit bounds for primality testing and related problems. Math. Comp. 55(191), 355-380 (1990)
-
(1990)
Math. Comp.
, vol.55
, Issue.191
, pp. 355-380
-
-
Bach, E.1
-
3
-
-
77953041787
-
Improvements in the computation of ideal class groups of imaginary quadratic number fields
-
To appear in
-
Biasse, J.-F.: Improvements in the computation of ideal class groups of imaginary quadratic number fields. To appear in Advances in Mathematics of Communications, http://www.lix.polytechnique.fr/~biasse/papers/biasseCHILE.pdf
-
Advances in Mathematics of Communications
-
-
Biasse, J.-F.1
-
4
-
-
78649887064
-
Practical improvements to class group and regulator computation of real quadratic fields
-
To appear in
-
Biasse, J.-F., Jacobson Jr., M.J.: Practical improvements to class group and regulator computation of real quadratic fields. To appear in ANTS 9 (2010)
-
(2010)
ANTS
, vol.9
-
-
Biasse, J.-F.1
Jacobson Jr., M.J.2
-
5
-
-
0011491022
-
A subexponential algorithm for the determination of class groups and regulators of algebraic number fields
-
Buchmann, J.: A subexponential algorithm for the determination of class groups and regulators of algebraic number fields. Séminaire de Théorie des Nombres (Paris), pp. 27-41 (1988-1989)
-
(1988)
Séminaire de Théorie des Nombres (Paris)
, pp. 27-41
-
-
Buchmann, J.1
-
7
-
-
0024139987
-
A key-exchange system based on imaginary quadratic fields
-
Buchmann, J., Williams, H.C.: A key-exchange system based on imaginary quadratic fields. Journal of Cryptology 1, 107-118 (1988)
-
(1988)
Journal of Cryptology
, vol.1
, pp. 107-118
-
-
Buchmann, J.1
Williams, H.C.2
-
8
-
-
0042258460
-
A key-exchange system based on real quadratic fields
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Buchmann, J., Williams, H.C.: A key-exchange system based on real quadratic fields. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 335-343. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 335-343
-
-
Buchmann, J.1
Williams, H.C.2
-
9
-
-
84946832616
-
Strategies in filtering in the number field sieve
-
Bosma, W. (ed.) ANTS 2000. Springer, Heidelberg
-
Cavallar, S.: Strategies in filtering in the number field sieve. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 209-232. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1838
, pp. 209-232
-
-
Cavallar, S.1
-
11
-
-
0003049266
-
Heuristics on class groups of number fields
-
Number Theory. Springer, New York
-
Cohen, H., Lenstra Jr., H.W.: Heuristics on class groups of number fields. In: Number Theory. Lecture Notes in Math., vol. 1068, pp. 33-62. Springer, New York (1983)
-
(1983)
Lecture Notes in Math
, vol.1068
, pp. 33-62
-
-
Cohen, H.1
Lenstra Jr., H.W.2
-
12
-
-
84968519059
-
A rigorous subexponential algorithm for computation of class groups
-
Hafner, J.L., McCurley, K.S.: A rigorous subexponential algorithm for computation of class groups. J. Amer. Math. Soc. 2, 837-850 (1989)
-
(1989)
J. Amer. Math. Soc.
, vol.2
, pp. 837-850
-
-
Hafner, J.L.1
McCurley, K.S.2
-
14
-
-
84937401446
-
Security of cryptosystems based on class groups of imaginary quadratic orders
-
Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
-
Hamdy, S., Möller, B.: Security of cryptosystems based on class groups of imaginary quadratic orders. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 234-247. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 234-247
-
-
Hamdy, S.1
Möller, B.2
-
15
-
-
17644440160
-
Towards practical non-interactive public-key cryptosystems using non-maximal imaginary quadratic orders
-
Hühnlein, D., Jacobson Jr., M.J., Weber, D.: Towards practical non-interactive public-key cryptosystems using non-maximal imaginary quadratic orders. Designs, Codes and Cryptography 30(3), 281-299 (2003)
-
(2003)
Designs, Codes and Cryptography
, vol.30
, Issue.3
, pp. 281-299
-
-
Hühnlein, D.1
Jacobson Jr., M.J.2
Weber, D.3
-
17
-
-
0242324505
-
Computing discrete logarithms in quadratic orders
-
Jacobson Jr., M.J.: Computing discrete logarithms in quadratic orders. Journal of Cryptology 13, 473-492 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, pp. 473-492
-
-
Jacobson Jr., M.J.1
-
18
-
-
33746368205
-
The efficiency and security of a real quadratic field based key exchange protocol
-
Warsaw, Poland, de Gruyter
-
Jacobson Jr., M.J., Scheidler, R., Williams, H.C.: The efficiency and security of a real quadratic field based key exchange protocol. In: Public-Key Cryptography and Computational Number Theory, Warsaw, Poland, pp. 89-112. de Gruyter (2001)
-
(2001)
Public-Key Cryptography and Computational Number Theory
, pp. 89-112
-
-
Jacobson Jr., M.J.1
Scheidler, R.2
Williams, H.C.3
-
19
-
-
32844467722
-
An improved real quadratic field based key exchange procedure
-
Jacobson Jr., M.J., Scheidler, R., Williams, H.C.: An improved real quadratic field based key exchange procedure. Journal of Cryptology 19, 211-239 (2006)
-
(2006)
Journal of Cryptology
, vol.19
, pp. 211-239
-
-
Jacobson Jr., M.J.1
Scheidler, R.2
Williams, H.C.3
-
21
-
-
77956488974
-
-
Eprint archive no. 2010/006
-
Kleinjung, T., Aoki, K., Franke, J., Lenstra, A.K., Thomé, E., Bos, J.W., Gaudry, P., Kruppa, A., Montgomery, P.L., Osvik, D.A., te Riele, H., Timofeev, A., Zimmerman, P.: Factorization of a 768-bit RSA modulus, Eprint archive no. 2010/006 (2010)
-
(2010)
Factorization of a 768-bit RSA Modulus
-
-
Kleinjung, T.1
Aoki, K.2
Franke, J.3
Lenstra, A.K.4
Thomé, E.5
Bos, J.W.6
Gaudry, P.7
Kruppa, A.8
Montgomery, P.L.9
Osvik, D.A.10
Te Riele, H.11
Timofeev, A.12
Zimmerman, P.13
-
23
-
-
84957812088
-
Selecting cryptographic key sizes
-
Imai, H., Zheng, Y. (eds.) PKC 2000. Springer, Heidelberg
-
Lenstra, A.K., Verheul, E.: Selecting cryptographic key sizes. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 446-465. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1751
, pp. 446-465
-
-
Lenstra, A.K.1
Verheul, E.2
-
25
-
-
77953904148
-
Recommendation for Key Management - Part 1: General
-
(Revised) March
-
National Institute of Standards and Technology (NIST), Recommendation for Key Management - Part 1: General (Revised), NIST Special Publication 800-57 (March 2007), http://csrc.nist.gov/groups/ST/toolkit/documents/ SP800-57Part1 3-8-07.pdf
-
(2007)
NIST Special Publication 800-57
-
-
-
26
-
-
84946819289
-
Asymptotically fast discrete logarithms in quadratic number fields
-
Bosma, W. (ed.) ANTS 2000. Springer, Heidelberg
-
Vollmer, U.: Asymptotically fast discrete logarithms in quadratic number fields. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 581-594. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1838
, pp. 581-594
-
-
Vollmer, U.1
-
27
-
-
84958554059
-
An accelerated Buchmann algorithm for regulator computation in real quadratic fields
-
Fieker, C., Kohel, D.R. (eds.) ANTS 2002. Springer, Heidelberg
-
Vollmer, U.: An accelerated Buchmann algorithm for regulator computation in real quadratic fields. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 148-162. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2369
, pp. 148-162
-
-
Vollmer, U.1
|