-
1
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
Boneh, D., Goh, E.J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005) (Pubitemid 41231172)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
3
-
-
33746042561
-
Security analysis of the strong Diffie-Hellman problem
-
DOI 10.1007/11761679-1, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Cheon, J.H.: Security Analysis of the Strong Diffie-Hellman Problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 1-11. Springer, Heidelberg (2006) (Pubitemid 44072229)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004 LNCS
, pp. 1-11
-
-
Cheon, J.H.1
-
4
-
-
19544383877
-
-
Technical report, INRIA
-
Cofman, E.G., Flajolet, P., Flatto, L., Hofri, M.: The Maximum of a Random Walk and its Application to Rectangle Packing. Technical report, INRIA (1997)
-
(1997)
The Maximum of A Random Walk and Its Application to Rectangle Packing
-
-
Cofman, E.G.1
Flajolet, P.2
Flatto, L.3
Hofri, M.4
-
6
-
-
84956867482
-
Speeding up the discrete log computation on curves with automorphisms
-
Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. Springer, Heidelberg
-
Duursma, I.M., Gaudry, P., Morain, F.: Speeding up the discrete log computation on curves with automorphisms. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 103-121. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1716
, pp. 103-121
-
-
Duursma, I.M.1
Gaudry, P.2
Morain, F.3
-
7
-
-
67650659199
-
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Galbraith, S.D., Lin, X., Scott, M.: Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 518-535. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 518-535
-
-
Galbraith, S.D.1
Lin, X.2
Scott, M.3
-
8
-
-
72449209644
-
An improvement to the Gaudry-Schost algorithm for multidimensional discrete logarithm problems
-
Parker, M.G. (ed.) IMACC 2009. Springer, Heidelberg
-
Galbraith, S.D., Ruprai, R.S.: An improvement to the Gaudry-Schost algorithm for multidimensional discrete logarithm problems. In: Parker, M.G. (ed.) IMACC 2009. LNCS, vol. 5921, pp. 368-382. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5921
, pp. 368-382
-
-
Galbraith, S.D.1
Ruprai, R.S.2
-
11
-
-
0034409205
-
Improving the parallelized pollard lambda search on binary anomalous curves
-
Gallant, R., Lambert, R., Vanstone, S.: Improving the Parallelized Pollard Lambda Search on Binary Anomalous Curves. Mathematics of Computation 69, 1699-1705 (2000)
-
(2000)
Mathematics of Computation
, vol.69
, pp. 1699-1705
-
-
Gallant, R.1
Lambert, R.2
Vanstone, S.3
-
12
-
-
79957797091
-
Faster point multiplication on elliptic curves with efficient endomorphisms
-
Advances in Cryptology - CRYPTO 2001
-
Gallant, R.P., Lambert, R.J., Vanstone, S.A.: Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 190-200. Springer, Heidelberg (2001) (Pubitemid 33317915)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 190-200
-
-
Gallant, R.P.1
Lambert, R.J.2
Vanstone, S.A.3
-
13
-
-
84946825131
-
Counting points on hyperelliptic curves over finite fields
-
Bosma, W. (ed.) ANTS 2000. Springer, Heidelberg
-
Gaudry, P., Harley, R.: Counting Points on Hyperelliptic Curves over Finite Fields. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 313-332. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1838
, pp. 313-332
-
-
Gaudry, P.1
Harley, R.2
-
14
-
-
27144477571
-
A low-memory parallel version of Matsuo, Chao and Tsujii's algorithm
-
Buell, D.A. (ed.) ANTS 2004. Springer, Heidelberg
-
Gaudry, P., Schost, E.: A low-memory parallel version of Matsuo, Chao and Tsujii's algorithm. In: Buell, D.A. (ed.) ANTS 2004. LNCS, vol. 3076, pp. 208-222. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3076
, pp. 208-222
-
-
Gaudry, P.1
Schost, E.2
-
15
-
-
84974622962
-
An improved pseudo-random generator based on discrete log
-
Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
-
Gennaro, R.: An Improved Pseudo-random Generator Based on Discrete Log. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 469-481. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 469-481
-
-
Gennaro, R.1
-
16
-
-
38349051239
-
Solving discrete logarithms from partial knowledge of the key
-
Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. Springer, Heidelberg
-
Gopalakrishnan, K., Thériault, N., Yao, C.Z.: Solving Discrete Logarithms from Partial Knowledge of the Key. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 224-237. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4859
, pp. 224-237
-
-
Gopalakrishnan, K.1
Thériault, N.2
Yao, C.Z.3
-
17
-
-
69949153112
-
Boneh-Boyen signatures and the Strong Diffie-Hellman problem
-
Shacham, H., Waters, B. (eds.) Pairing 2009. Springer, Heidelberg
-
Jao, D., Yoshida, K.: Boneh-Boyen signatures and the Strong Diffie-Hellman problem. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 1-16. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5671
, pp. 1-16
-
-
Jao, D.1
Yoshida, K.2
-
18
-
-
84958601057
-
A key recovery attack on discrete log-based schemes using a prime order subgroup
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Lim, C.H., Lee, P.J.: A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 249-263. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 249-263
-
-
Lim, C.H.1
Lee, P.J.2
-
21
-
-
1842499869
-
On Diffie-Hellman key agreement with short exponents
-
van Oorschot, P.C.,Wiener, M.J.: On Diffie-Hellman Key Agreement with Short Exponents. In:Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 332-343. Springer, Heidelberg (1996) (Pubitemid 126071077)
-
(1996)
Lecture Notes in Computer Science
, Issue.1070
, pp. 332-343
-
-
Van Oorschot, P.C.1
Wiener, M.J.2
-
22
-
-
17444376558
-
Parallel collision search with cryptanalytic applications
-
van Oorschot, P.C., Wiener, M.J.: Parallel collision Search with Cryptanalytic Applications. Journal of Cryptology 12, 1-28 (1999)
-
(1999)
Journal of Cryptology
, vol.12
, pp. 1-28
-
-
Van Oorschot, P.C.1
Wiener, M.J.2
-
23
-
-
84957638120
-
An efficient discrete log pseudo random generator
-
Advances in Cryptology - CRYPTO '98
-
Patel, S., Sundaram, G.: An Efficient Discrete Log Pseudo Random Generator. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 304-317. Springer, Heidelberg (1998) (Pubitemid 128119014)
-
(1998)
Lecture Notes in Computer Science
, Issue.1462
, pp. 304-317
-
-
Patel, S.1
Sundaram, G.S.2
-
24
-
-
84966238549
-
Monte Carlo methods for index computation mod p
-
Pollard, J.M.: Monte Carlo Methods for Index Computation mod p. Mathematics of Computation 32(143), 918-924 (1978)
-
(1978)
Mathematics of Computation
, vol.32
, Issue.143
, pp. 918-924
-
-
Pollard, J.M.1
-
26
-
-
0005506834
-
Kangaroos, monopoly and discrete logarithms
-
Pollard, J.M.: Kangaroos, Monopoly and Discrete Logarithms. Journal of Cryptology 13, 437-447 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, pp. 437-447
-
-
Pollard, J.M.1
-
28
-
-
0347206148
-
On waiting time in the scheme of random allocation of coloured particles
-
Selivanov, B.I.: On waiting time in the scheme of random allocation of coloured particles. Discrete Math. Appl. 5(1), 73-82 (1995)
-
(1995)
Discrete Math. Appl.
, vol.5
, Issue.1
, pp. 73-82
-
-
Selivanov, B.I.1
-
29
-
-
84949189974
-
Faster attacks on elliptic curve cryptosystems
-
Tavares, S., Meijer, H. (eds.) SAC 1998. Springer, Heidelberg
-
Wiener, M.J., Zuccerato, R.J.: Faster Attacks on Elliptic Curve Cryptosystems. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 190-200. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1556
, pp. 190-200
-
-
Wiener, M.J.1
Zuccerato, R.J.2
|