-
1
-
-
84929727140
-
A subexponential algorithm for discrete logarithms over the rational subgroup of the jacobians of large genus hyperelliptic curves over finite fields
-
Springer-Verlag, Algorithmic Number Theory: First International Symposium
-
Adleman L., DeMarrais J., Huang M. A subexponential algorithm for discrete logarithms over the rational subgroup of the jacobians of large genus hyperelliptic curves over finite fields. Lecture Notes in Comput. Sci. 1994, vol. 877:28-40. Springer-Verlag.
-
(1994)
Lecture Notes in Comput. Sci.
, vol.877
, pp. 28-40
-
-
Adleman, L.1
DeMarrais, J.2
Huang, M.3
-
2
-
-
35248817849
-
The EM side-channel(s)
-
Cryptographic Hardware and Embedded Systems - CHES 2002
-
Agrawal D., Archambeault B., Rao J., Rohatgi P. The EM side-channel(s). Lecture Notes in Comput. Sci. 2002, vol. 2523:29-45.
-
(2002)
Lecture Notes in Comput. Sci.
, vol.2523
, pp. 29-45
-
-
Agrawal, D.1
Archambeault, B.2
Rao, J.3
Rohatgi, P.4
-
3
-
-
79551597862
-
-
American National Standards Institute (ANSI) X9.62, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
American National Standards Institute (ANSI) X9.62, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), 1999.
-
(1999)
-
-
-
4
-
-
0343736058
-
The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm
-
Balasubramanian R., Koblitz N. The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm. J. Cryptology 1998, 11:141-145.
-
(1998)
J. Cryptology
, vol.11
, pp. 141-145
-
-
Balasubramanian, R.1
Koblitz, N.2
-
6
-
-
84947928286
-
Practice-oriented provable-security
-
Proc. First International Workshop on Information Security (ISW '97)
-
Bellare M. Practice-oriented provable-security. Lecture Notes in Comput. Sci. 1998, vol. 1396:221-231.
-
(1998)
Lecture Notes in Comput. Sci.
, vol.1396
, pp. 221-231
-
-
Bellare, M.1
-
7
-
-
5044240231
-
A gendered socio-technical construction: The smart house
-
Open Univ. Press
-
Berg A.-J. A gendered socio-technical construction: The smart house. The Social Shaping of Technology 1999, 301-313. Open Univ. Press. second ed.
-
(1999)
The Social Shaping of Technology
, pp. 301-313
-
-
Berg, A.-J.1
-
8
-
-
38149009170
-
Short signatures without random oracles and the SDH assumption on bilinear groups
-
Boneh D., Boyen X. Short signatures without random oracles and the SDH assumption on bilinear groups. J. Cryptology 2008, 21:149-177.
-
(2008)
J. Cryptology
, vol.21
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
9
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Advances in Cryptology - EUROCRYPT '97
-
Boneh D., DeMillo R., Lipton R. On the importance of checking cryptographic protocols for faults. Lecture Notes in Comput. Sci. 1997, vol. 1233:37-51.
-
(1997)
Lecture Notes in Comput. Sci.
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.2
Lipton, R.3
-
10
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
Boneh D., Franklin M. Identity-based encryption from the Weil pairing. SIAM J. Comput. 2003, 32:586-615.
-
(2003)
SIAM J. Comput.
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
84946840347
-
Short signatures from the Weil pairing
-
Progress in Cryptology - ASIACRYPT 2001
-
Boneh D., Lynn B., Shacham H. Short signatures from the Weil pairing. Lecture Notes in Comput. Sci. 2001, vol. 2248:514-532.
-
(2001)
Lecture Notes in Comput. Sci.
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
15
-
-
52149109140
-
Evaluating large degree isogenies and applications to pairing based cryptography
-
Pairing-Based Cryptography - Pairing 2008
-
Bröker R., Charles D., Lauter K. Evaluating large degree isogenies and applications to pairing based cryptography. Lecture Notes in Comput. Sci. 2008, vol. 5209:100-112.
-
(2008)
Lecture Notes in Comput. Sci.
, vol.5209
, pp. 100-112
-
-
Bröker, R.1
Charles, D.2
Lauter, K.3
-
17
-
-
33746042561
-
Security analysis of the strong Diffie-Hellman problem
-
Advances in Cryptology - EUROCRYPT 2006
-
Cheon J. Security analysis of the strong Diffie-Hellman problem. Lecture Notes in Comput. Sci. 2006, vol. 4004:1-11.
-
(2006)
Lecture Notes in Comput. Sci.
, vol.4004
, pp. 1-11
-
-
Cheon, J.1
-
18
-
-
0021468777
-
Fast evaluation of logarithms in fields of characteristic two
-
Coppersmith D. Fast evaluation of logarithms in fields of characteristic two. IEEE Trans. Inform. Theory 1984, 30:587-594.
-
(1984)
IEEE Trans. Inform. Theory
, vol.30
, pp. 587-594
-
-
Coppersmith, D.1
-
20
-
-
33746706217
-
An index calculus algorithm for plane curves of small degree
-
Algorithmic Number Theory: Seventh International Conference
-
Diem C. An index calculus algorithm for plane curves of small degree. Lecture Notes in Comput. Sci. 2006, vol. 4076:543-557.
-
(2006)
Lecture Notes in Comput. Sci.
, vol.4076
, pp. 543-557
-
-
Diem, C.1
-
21
-
-
79551584033
-
-
On arithmetic and the discrete logarithm problem in class groups of curves, Habilitationsschrift, Universität Leipzig, available from .
-
C. Diem, On arithmetic and the discrete logarithm problem in class groups of curves, Habilitationsschrift, Universität Leipzig, available from http://www.math.uni-leipzig.de/~diem/preprints/habil.pdf.
-
-
-
Diem, C.1
-
22
-
-
38049124867
-
A double large prime variation for small genus hyperelliptic index calculus
-
Diem C., Gaudry P., Thériault N., Thomé E. A double large prime variation for small genus hyperelliptic index calculus. Math. Comp. 2007, 76:475-492.
-
(2007)
Math. Comp.
, vol.76
, pp. 475-492
-
-
Diem, C.1
Gaudry, P.2
Thériault, N.3
Thomé, E.4
-
23
-
-
51249084603
-
Index calculus in class groups of non-hyperelliptic curves of genus three
-
Diem C., Thomé E. Index calculus in class groups of non-hyperelliptic curves of genus three. J. Cryptology 2008, 21:593-611.
-
(2008)
J. Cryptology
, vol.21
, pp. 593-611
-
-
Diem, C.1
Thomé, E.2
-
28
-
-
84968502759
-
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
-
Frey G., Rück H. A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Math. Comp. 1994, 62:865-874.
-
(1994)
Math. Comp.
, vol.62
, pp. 865-874
-
-
Frey, G.1
Rück, H.2
-
29
-
-
23044503196
-
Constructing isogenies between elliptic curves over finite fields
-
Galbraith S. Constructing isogenies between elliptic curves over finite fields. LMS J. Comput. Math. 1999, 2:118-138.
-
(1999)
LMS J. Comput. Math.
, vol.2
, pp. 118-138
-
-
Galbraith, S.1
-
31
-
-
0034409205
-
Improving the parallelized Pollard lambda search on an anomalous binary curve
-
Gallant R., Lambert R., Vanstone S. Improving the parallelized Pollard lambda search on an anomalous binary curve. Math. Comp. 2000, 69:1699-1705.
-
(2000)
Math. Comp.
, vol.69
, pp. 1699-1705
-
-
Gallant, R.1
Lambert, R.2
Vanstone, S.3
-
32
-
-
79551589789
-
-
Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem, J. Symbolic Comput., in press, available from .
-
P. Gaudry, Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem, J. Symbolic Comput., in press, available from http://www.loria.fr/~gaudry/papers.en.html.
-
-
-
Gaudry, P.1
-
33
-
-
0001788567
-
Constructive and destructive facets of Weil descent on elliptic curves
-
Gaudry P., Hess F., Smart N. Constructive and destructive facets of Weil descent on elliptic curves. J. Cryptology 2002, 15:19-34.
-
(2002)
J. Cryptology
, vol.15
, pp. 19-34
-
-
Gaudry, P.1
Hess, F.2
Smart, N.3
-
36
-
-
0000303380
-
Discrete logarithms in GF(p) using the number field sieve
-
Gordon D. Discrete logarithms in GF(p) using the number field sieve. SIAM J. Discrete Math. 1993, 6:124-138.
-
(1993)
SIAM J. Discrete Math.
, vol.6
, pp. 124-138
-
-
Gordon, D.1
-
39
-
-
79952678925
-
Race: Universal Donors in a Vampire Culture
-
Routledge.
-
Haraway D. Race: Universal Donors in a Vampire Culture. The Haraway Reader 2003, Routledge, pp. 251-293.
-
(2003)
The Haraway Reader
, pp. 251-293
-
-
Haraway, D.1
-
40
-
-
23044512900
-
Generalizing the GHS attack on the elliptic curve discrete logarithm problem
-
Hess F. Generalizing the GHS attack on the elliptic curve discrete logarithm problem. LMS J. Comput. Math. 2004, 7:167-192.
-
(2004)
LMS J. Comput. Math.
, vol.7
, pp. 167-192
-
-
Hess, F.1
-
43
-
-
0343792080
-
The seamless web: Technology, science, et cetera, et cetera
-
Edinburgh Univ. Press
-
Hughes T. The seamless web: Technology, science, et cetera, et cetera. Technology and Social Processes 1988, 9-19. Edinburgh Univ. Press.
-
(1988)
Technology and Social Processes
, pp. 9-19
-
-
Hughes, T.1
-
44
-
-
0242316628
-
Edison and electric light
-
Open Univ. Press
-
Hughes T. Edison and electric light. The Social Shaping of Technology 1999, 50-63. Open Univ. Press. second ed.
-
(1999)
The Social Shaping of Technology
, pp. 50-63
-
-
Hughes, T.1
-
46
-
-
0346111862
-
Analysis of the xedni calculus attack
-
Jacobson M., Koblitz N., Silverman J., Stein A., Teske E. Analysis of the xedni calculus attack. Des. Codes Cryptogr. 2000, 20:41-64.
-
(2000)
Des. Codes Cryptogr.
, vol.20
, pp. 41-64
-
-
Jacobson, M.1
Koblitz, N.2
Silverman, J.3
Stein, A.4
Teske, E.5
-
47
-
-
33646781591
-
Do all elliptic curves of the same order have the same difficulty of discrete log?
-
Advances in Cryptology - ASIACRYPT 2005
-
Jao D., Miller S., Venkatesan R. Do all elliptic curves of the same order have the same difficulty of discrete log?. Lecture Notes in Comput. Sci. 2005, vol. 3788:21-40.
-
(2005)
Lecture Notes in Comput. Sci.
, vol.3788
, pp. 21-40
-
-
Jao, D.1
Miller, S.2
Venkatesan, R.3
-
48
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
Algorithmic Number Theory: Fourth International Symposium
-
Joux A. A one round protocol for tripartite Diffie-Hellman. Lecture Notes in Comput. Sci. 2000, vol. 1838:385-393.
-
(2000)
Lecture Notes in Comput. Sci.
, vol.1838
, pp. 385-393
-
-
Joux, A.1
-
50
-
-
0002261720
-
The social construction of technology
-
Open Univ. Press
-
Kline R., Pinch T. The social construction of technology. The Social Shaping of Technology 1999, 113-115. Open Univ. Press. second ed.
-
(1999)
The Social Shaping of Technology
, pp. 113-115
-
-
Kline, R.1
Pinch, T.2
-
51
-
-
26444471639
-
A historian looks at gender and science
-
Koblitz A.H. A historian looks at gender and science. Internat. J. Sci. Ed. 1987, 9:399-407.
-
(1987)
Internat. J. Sci. Ed.
, vol.9
, pp. 399-407
-
-
Koblitz, A.H.1
-
52
-
-
33744931948
-
Male bonding around the campfire: Constructing myths of Hohokam militarism
-
Koblitz A.H. Male bonding around the campfire: Constructing myths of Hohokam militarism. Men Masculinities 2006, 9:95-107.
-
(2006)
Men Masculinities
, vol.9
, pp. 95-107
-
-
Koblitz, A.H.1
-
53
-
-
79551575779
-
Warriors, campfires, and a big stick: Modern male fantasies of Hohokam militarism
-
Koblitz A.H. Warriors, campfires, and a big stick: Modern male fantasies of Hohokam militarism. Bull. Old Pueblo Archaeology Center 2008, 53:2-5.
-
(2008)
Bull. Old Pueblo Archaeology Center
, vol.53
, pp. 2-5
-
-
Koblitz, A.H.1
-
54
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz N. Elliptic curve cryptosystems. Math. Comp. 1987, 48:203-209.
-
(1987)
Math. Comp.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
55
-
-
0024864204
-
Hyperelliptic cryptosystems
-
Koblitz N. Hyperelliptic cryptosystems. J. Cryptology 1989, 1:139-150.
-
(1989)
J. Cryptology
, vol.1
, pp. 139-150
-
-
Koblitz, N.1
-
56
-
-
85024567680
-
CM-curves with good cryptographic properties
-
Advances in Cryptology - CRYPTO '91
-
Koblitz N. CM-curves with good cryptographic properties. Lecture Notes in Comput. Sci. 1992, vol. 576:279-287.
-
(1992)
Lecture Notes in Comput. Sci.
, vol.576
, pp. 279-287
-
-
Koblitz, N.1
-
57
-
-
84957705004
-
An elliptic curve implementation of the finite field Digital Signature Algorithm
-
Advances in Cryptology - CRYPTO '98
-
Koblitz N. An elliptic curve implementation of the finite field Digital Signature Algorithm. Lecture Notes in Comput. Sci. 1998, vol. 1462:327-337.
-
(1998)
Lecture Notes in Comput. Sci.
, vol.1462
, pp. 327-337
-
-
Koblitz, N.1
-
58
-
-
31344437951
-
Pairing-based cryptography at high security levels
-
Proceedings of the Tenth IMA International Conference on Cryptography and Coding
-
Koblitz N., Menezes A. Pairing-based cryptography at high security levels. Lecture Notes in Comput. Sci. 2005, vol. 3796:13-36.
-
(2005)
Lecture Notes in Comput. Sci.
, vol.3796
, pp. 13-36
-
-
Koblitz, N.1
Menezes, A.2
-
59
-
-
38149025069
-
Another look at 'provable security'. II
-
Progress in Cryptology - INDOCRYPT 2006
-
Koblitz N., Menezes A. Another look at 'provable security'. II. Lecture Notes in Comput. Sci. 2006, vol. 4329:148-175.
-
(2006)
Lecture Notes in Comput. Sci.
, vol.4329
, pp. 148-175
-
-
Koblitz, N.1
Menezes, A.2
-
60
-
-
33846856917
-
Another look at 'provable security'
-
Koblitz N., Menezes A. Another look at 'provable security'. J. Cryptology 2007, 3-37.
-
(2007)
J. Cryptology
, pp. 3-37
-
-
Koblitz, N.1
Menezes, A.2
-
62
-
-
69949147833
-
Another look at non-standard discrete log and Diffie-Hellman problems
-
Koblitz N., Menezes A. Another look at non-standard discrete log and Diffie-Hellman problems. J. Math. Cryptol. 2008, 2:311-326.
-
(2008)
J. Math. Cryptol.
, vol.2
, pp. 311-326
-
-
Koblitz, N.1
Menezes, A.2
-
63
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Advances in Cryptology - CRYPTO '96
-
Kocher P. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Lecture Notes in Comput. Sci. 1996, vol. 1109:104-113.
-
(1996)
Lecture Notes in Comput. Sci.
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
65
-
-
79551603984
-
-
Endomorphism rings of elliptic curves over finite fields, PhD thesis, Univ. of California at Berkeley
-
D. Kohel, Endomorphism rings of elliptic curves over finite fields, PhD thesis, Univ. of California at Berkeley, 1996.
-
(1996)
-
-
Kohel, D.1
-
69
-
-
1442350122
-
Communications security for the twenty-first century: The Advanced Encryption Standard
-
Landau S. Communications security for the twenty-first century: The Advanced Encryption Standard. Notices Amer. Math. Soc. 2000, 47:450-459.
-
(2000)
Notices Amer. Math. Soc.
, vol.47
, pp. 450-459
-
-
Landau, S.1
-
70
-
-
0001258323
-
Factoring integers with elliptic curves
-
Lenstra H.W. Factoring integers with elliptic curves. Ann. of Math. 1987, 126:649-673.
-
(1987)
Ann. of Math.
, vol.126
, pp. 649-673
-
-
Lenstra, H.W.1
-
73
-
-
79551590191
-
-
ECC Brainpool standard curves and curve generation, IETF Internet-Draft, February 18
-
M. Lochter, J. Merkle, ECC Brainpool standard curves and curve generation, IETF Internet-Draft, February 18, 2008.
-
(2008)
-
-
Lochter, M.1
Merkle, J.2
-
74
-
-
0002371174
-
Preface to the second edition, and Introductory essay: The social shaping of technology
-
Open Univ. Press, pp. xiv-xvi.
-
MacKenzie D., Wajcman J. Preface to the second edition, and Introductory essay: The social shaping of technology. The Social Shaping of Technology 1999, Open Univ. Press, pp. xiv-xvi and 3-27. second ed.
-
(1999)
The Social Shaping of Technology
, pp. 3-27
-
-
MacKenzie, D.1
Wajcman, J.2
-
75
-
-
79551592345
-
-
A closer look at pairings, presentation at the NIST workshop "Applications of Pairing Based Cryptography: Identity Based Encryption and Beyond", June 3-4, available from .
-
L. Martin, A closer look at pairings, presentation at the NIST workshop "Applications of Pairing Based Cryptography: Identity Based Encryption and Beyond", June 3-4, 2008, available from http://csrc.nist.gov/groups/ST/IBE/documents/June08.
-
(2008)
-
-
Martin, L.1
-
76
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
Menezes A., Okamoto T., Vanstone S. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inform. Theory 1993, 39:1639-1646.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
77
-
-
33847320580
-
Analysis of the Weil descent attack of Gaudry, Hess and Smart
-
Topics in Cryptology - CT-RSA 2001
-
Menezes A., Qu M. Analysis of the Weil descent attack of Gaudry, Hess and Smart. Lecture Notes in Comput. Sci. 2001, vol. 2020:308-318.
-
(2001)
Lecture Notes in Comput. Sci.
, vol.2020
, pp. 308-318
-
-
Menezes, A.1
Qu, M.2
-
78
-
-
31444432696
-
Cryptographic implications of Hess' generalized GHS attack
-
Menezes A., Teske E. Cryptographic implications of Hess' generalized GHS attack. Appl. Algebra Engrg. Comm. Comput. 2006, 16:439-460.
-
(2006)
Appl. Algebra Engrg. Comm. Comput.
, vol.16
, pp. 439-460
-
-
Menezes, A.1
Teske, E.2
-
80
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Advances in Cryptology - CRYPTO '85
-
Miller V. Uses of elliptic curves in cryptography. Lecture Notes in Comput. Sci. 1986, vol. 218:417-426.
-
(1986)
Lecture Notes in Comput. Sci.
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
81
-
-
79551583816
-
-
Short programs for functions on curves, unpublished manuscript
-
V. Miller, Short programs for functions on curves, unpublished manuscript, 1986.
-
(1986)
-
-
Miller, V.1
-
82
-
-
22144445920
-
The Weil pairing, and its efficient calculation
-
Miller V. The Weil pairing, and its efficient calculation. J. Cryptology 2004, 17:235-261.
-
(2004)
J. Cryptology
, vol.17
, pp. 235-261
-
-
Miller, V.1
-
83
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
Miyaji A., Nakabayashi M., Takano S. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundamentals 2001, E84-A:1234-1243.
-
(2001)
IEICE Trans. Fundamentals
, vol.84
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
84
-
-
79551576437
-
-
The Diffie-Hellman problem and generalization of Verheul's theorem, PhD thesis, Univ. of Washington
-
D. Moody, The Diffie-Hellman problem and generalization of Verheul's theorem, PhD thesis, Univ. of Washington, 2009.
-
(2009)
-
-
Moody, D.1
-
85
-
-
0011918550
-
Fast multiplication on elliptic curves over small fields of characteristic two
-
Müller V. Fast multiplication on elliptic curves over small fields of characteristic two. J. Cryptology 1998, 11:219-234.
-
(1998)
J. Cryptology
, vol.11
, pp. 219-234
-
-
Müller, V.1
-
86
-
-
79551581187
-
-
National Institute of Standards and Technology, Digital Signature Standard, Federal Information Processing Standards Publication 186-2
-
National Institute of Standards and Technology, Digital Signature Standard, Federal Information Processing Standards Publication 186-2, 2000.
-
(2000)
-
-
-
87
-
-
79551606945
-
-
National Security Agency, The case for elliptic curve cryptography
-
National Security Agency, The case for elliptic curve cryptography, http://www.nsa.gov/ia/industry/crypto_elliptic_curve.cfm.
-
-
-
-
88
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
Pohlig S., Hellman M. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory 1978, 24:106-110.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
89
-
-
84966238549
-
Monte Carlo methods for index computation mod p
-
Pollard J. Monte Carlo methods for index computation mod p. Math. Comp. 1978, 32:918-924.
-
(1978)
Math. Comp.
, vol.32
, pp. 918-924
-
-
Pollard, J.1
-
92
-
-
84966233278
-
Elliptic curves over finite fields and the computation of square roots mod p
-
Schoof R. Elliptic curves over finite fields and the computation of square roots mod p. Math. Comp. 1985, 44:483-494.
-
(1985)
Math. Comp.
, vol.44
, pp. 483-494
-
-
Schoof, R.1
-
94
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology - CRYPTO '84
-
Shamir A. Identity-based cryptosystems and signature schemes. Lecture Notes in Comput. Sci. 1985, vol. 196:277-296.
-
(1985)
Lecture Notes in Comput. Sci.
, vol.196
, pp. 277-296
-
-
Shamir, A.1
-
95
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Shor P.W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 1997, 26:1484-1509.
-
(1997)
SIAM J. Comput.
, vol.26
, pp. 1484-1509
-
-
Shor, P.W.1
-
97
-
-
0012234171
-
The xedni calculus and the elliptic curve discrete logarithm problem
-
Silverman J. The xedni calculus and the elliptic curve discrete logarithm problem. Des. Codes Cryptogr. 2000, 20:5-40.
-
(2000)
Des. Codes Cryptogr.
, vol.20
, pp. 5-40
-
-
Silverman, J.1
-
98
-
-
79551581574
-
-
The four faces of lifting for the elliptic curve discrete logarithm problem, in: 11th Workshop on Elliptic Curve Cryptography, Univ. College Dublin, September 5,available from .
-
J. Silverman, The four faces of lifting for the elliptic curve discrete logarithm problem, in: 11th Workshop on Elliptic Curve Cryptography, Univ. College Dublin, September 5, 2007, available from http://mathsci.ucd.ie/~gmg/ECC2007Talks.
-
(2007)
-
-
Silverman, J.1
-
99
-
-
84947727672
-
Elliptic curve discrete logarithms and the index calculus
-
Advances in Cryptology - ASIACRYPT '98
-
Silverman J., Suzuki J. Elliptic curve discrete logarithms and the index calculus. Lecture Notes in Comput. Sci. 1998, vol. 1514:110-125.
-
(1998)
Lecture Notes in Comput. Sci.
, vol.1514
, pp. 110-125
-
-
Silverman, J.1
Suzuki, J.2
-
100
-
-
44449086875
-
Isogenies and the discrete logarithm problem in jacobians of genus 3 hyperelliptic curves
-
Advances in Cryptology - EUROCRYPT 2008
-
Smith B. Isogenies and the discrete logarithm problem in jacobians of genus 3 hyperelliptic curves. Lecture Notes in Comput. Sci. 2008, vol. 4965:163-180.
-
(2008)
Lecture Notes in Comput. Sci.
, vol.4965
, pp. 163-180
-
-
Smith, B.1
-
101
-
-
84917299385
-
Transgressing the boundaries: Toward a transformative hermeneutics of quantum gravity
-
Sokal A. Transgressing the boundaries: Toward a transformative hermeneutics of quantum gravity. Social Text 1996, 46/47:217-252.
-
(1996)
Social Text
, pp. 217-252
-
-
Sokal, A.1
-
103
-
-
0010029876
-
Efficient arithmetic on Koblitz curves
-
Solinas J. Efficient arithmetic on Koblitz curves. Des. Codes Cryptogr. 2000, 19:195-249.
-
(2000)
Des. Codes Cryptogr.
, vol.19
, pp. 195-249
-
-
Solinas, J.1
-
105
-
-
84945129491
-
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
-
Advances in Cryptology - EUROCRYPT 2001
-
Verheul E. Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. Lecture Notes in Comput. Sci. 2001, vol. 2045:195-210.
-
(2001)
Lecture Notes in Comput. Sci.
, vol.2045
, pp. 195-210
-
-
Verheul, E.1
-
106
-
-
23044474013
-
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
-
Verheul E. Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. J. Cryptology 2004, 17:277-296.
-
(2004)
J. Cryptology
, vol.17
, pp. 277-296
-
-
Verheul, E.1
-
108
-
-
84949189974
-
Faster attacks on elliptic curve cryptosystems
-
Selected Areas in Cryptography - SAC '98
-
Wiener M., Zuccherato R. Faster attacks on elliptic curve cryptosystems. Lecture Notes in Comput. Sci. 1999, vol. 1556:190-200.
-
(1999)
Lecture Notes in Comput. Sci.
, vol.1556
, pp. 190-200
-
-
Wiener, M.1
Zuccherato, R.2
|