-
1
-
-
24144433396
-
-
J. Kilian (ed.), TCC 2005 Springer LNCS 3378
-
D. Boneh, E.-J. Goh and K. Nissim, Evaluating 2-DNF Formulas on Ciphertexts, in J. Kilian (ed.), TCC 2005, Springer LNCS 3378 (2005) 325-341.
-
(2005)
Evaluating 2-DNF Formulas on Ciphertexts
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
3
-
-
72449209644
-
-
M. Parker (ed.), Twelfth IMA International Conference on Cryptography and Coding, Cirencester Springer LNCS 5921
-
S. D. Galbraith and R. S. Ruprai, An improvement to the Gaudry-Schost algorithm for multidimensional discrete logarithm problems, in M. Parker (ed.), Twelfth IMA International Conference on Cryptography and Coding, Cirencester, Springer LNCS 5921 (2009) 368-382.
-
(2009)
An improvement to the Gaudry-Schost algorithm for multidimensional discrete logarithm problems
, pp. 368-382
-
-
Galbraith, S.D.1
Ruprai, R.S.2
-
6
-
-
27144477571
-
-
D. A. Buell (ed.), ANTS VI Springer LNCS 3076
-
P. Gaudry and E. Schost, A low-memory parallel version of Matsuo, Chao and Tsujii's algorithm, in D. A. Buell (ed.), ANTS VI, Springer LNCS 3076 (2004) 208-222.
-
(2004)
A low-memory parallel version of Matsuo, Chao and Tsujii's algorithm
, pp. 208-222
-
-
Gaudry, P.1
Schost, E.2
-
8
-
-
38349051239
-
-
K. Srinathan, C. P. Rangan, and M. Yung, (eds.), INDOCRYPT 2007 Springer LNCS 4859
-
K. Gopalakrishnan, N. Thériault, and C. Z. Yao, Solving Discrete Logarithms from Partial Knowledge of the Key, in K. Srinathan, C. P. Rangan, and M. Yung, (eds.), INDOCRYPT 2007, Springer LNCS 4859 (2007) 224-237.
-
(2007)
Solving Discrete Logarithms from Partial Knowledge of the Key
, pp. 224-237
-
-
Gopalakrishnan, K.1
Thériault, N.2
Yao, C.Z.3
-
9
-
-
69949153112
-
Boneh-Boyen signatures and the Strong Diffie-Hellman problem
-
H. Shacham and B. Waters (eds.), Springer LNCS 5671
-
D. Jao and K. Yoshida, Boneh-Boyen signatures and the Strong Diffie-Hellman problem, in H. Shacham and B. Waters (eds.), Pairing 2009, Springer LNCS 5671 (2009) 1-16.
-
(2009)
Pairing 2009
, pp. 1-16
-
-
Jao, D.1
Yoshida, K.2
-
14
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
S. Pohlig and M. Hellman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Trans. Inf. Theory, 24 (1978) 106-110.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
15
-
-
84966238549
-
Monte Carlo methods for index computation mod p
-
J. M. Pollard, Monte Carlo methods for index computation mod p, Mathematics of Computation, 32, No. 143 (1978) 918-924.
-
(1978)
Mathematics of Computation
, vol.32
, Issue.143
, pp. 918-924
-
-
Pollard, J.M.1
-
16
-
-
0005506834
-
Kangaroos, Monopoly and discrete logarithms
-
J. M. Pollard, Kangaroos, Monopoly and discrete logarithms, Journal of Cryptology, 13 (2000) 437-447.
-
(2000)
Journal of Cryptology
, vol.13
, pp. 437-447
-
-
Pollard, J.M.1
-
18
-
-
0347206148
-
On waiting time in the scheme of random allocation of coloured particles
-
B. I. Selivanov, On waiting time in the scheme of random allocation of coloured particles, Discrete Math. Appl., 5, No. 1 (1995) 73-82.
-
(1995)
Discrete Math. Appl.
, vol.5
, Issue.1
, pp. 73-82
-
-
Selivanov, B.I.1
-
21
-
-
17444376558
-
Parallel collision search with cryptanalytic applications
-
P. C. van Oorschot and M. J. Wiener, Parallel collision search with cryptanalytic applications, Journal of Cryptology, 12 (1999) 1-28.
-
(1999)
Journal of Cryptology
, vol.12
, pp. 1-28
-
-
van Oorschot, P.C.1
Wiener, M.J.2
|