-
1
-
-
0018724062
-
A subexponential algorithm for the discrete logarithm problem with applications to cryptography
-
L. M. Adleman, A subexponential algorithm for the discrete logarithm problem with applications to cryptography, Proc. 20th IEEE Found, Comp. Sci. Symp. (1979), 55-60.
-
(1979)
Proc. 20Th IEEE Found, Comp. Sci. Symp
, pp. 55-60
-
-
Adleman, L.M.1
-
2
-
-
0001671902
-
On distinguishing prime numbers from composite numbers
-
L. M. Adleman, C. Pomerance and R. S. Rumely, On distinguishing prime numbers from composite numbers, Annals Math. 117 (1983), 173-206.
-
(1983)
Annals Math
, vol.117
, pp. 173-206
-
-
Adleman, L.M.1
Pomerance, C.2
Rumely, R.S.3
-
4
-
-
0020720875
-
An efficient parallel algorithm for the solution of large sparse linear matrix equations
-
C. P. Arnold, M. I. Parr, and M. B. Dewe, An efficient parallel algorithm for the solution of large sparse linear matrix equations, IEEE Trans, on Computers, C-32 (1983), 265-272.
-
(1983)
IEEE Trans, on Computers
, vol.C-32
, pp. 265-272
-
-
Arnold, C.P.1
Parr, M.I.2
Dewe, M.B.3
-
6
-
-
27844515919
-
-
Lecture Notes in Mathematics #572, Springer-Verlag
-
V. A. Barker, ed., Sparse Matrix Techniques, Lecture Notes in Mathematics #572, Springer-Verlag, 1977.
-
(1977)
Sparse Matrix Techniques
-
-
Barker, V.A.1
-
7
-
-
84968518238
-
Factoring polynomials over large finite fields
-
E. R. Berlekamp, Factoring polynomials over large finite fields, Math. Comp. 24 (1970), 713-735.
-
(1970)
Math. Comp.
, vol.24
, pp. 713-735
-
-
Berlekamp, E.R.1
-
8
-
-
0007550789
-
Computing logarithms in finite fields of characteristic two
-
I. F. Blake, R. Fuji-Hara, R. C. Mullin, and S. A. Vanstone, Computing logarithms in finite fields of characteristic two, SIAM J. Alg. Disc. Methods, 5 (1984), 276-285.
-
(1984)
SIAM J. Alg. Disc. Methods
, vol.5
, pp. 276-285
-
-
Blake, I.F.1
Fuji-Hara, R.2
Mullin, R.C.3
Vanstone, S.A.4
-
9
-
-
85034440316
-
How to generate cryptographically strong sequences of pseudo random bits
-
to appear
-
M. Blum and S. Micali, How to generate cryptographically strong sequences of pseudo random bits, SIAM J. Comp., to appear.
-
SIAM J. Comp
-
-
Blum, M.1
Micali, S.2
-
12
-
-
0020900943
-
A fast modular multiplication algorithm with applications to two key crytography
-
D. Chaum, R. Rivest, and A. Sherman, eds., Plenum Press
-
E. F. Brickell, A fast modular multiplication algorithm with applications to two key crytography, pp. 51-60 in Advances in Cryptology: Proceedings of CRYPTO '82, D. Chaum, R. Rivest, and A. Sherman, eds., Plenum Press, 1983.
-
(1983)
In Advances in Cryptology: Proceedings of CRYPTO '82
, pp. 51-60
-
-
Brickell, E.F.1
-
13
-
-
0020920822
-
Some remarks on the Herlestam-Johannesson algorithm for computing logarithms over GF(2n)
-
D. Chaum, R. Rivest and A. Sherman, eds., Plenum Press
-
n), pp. 15-20, in Advances in Cryptology: Proceedings of CRYPTO’82, D. Chaum, R. Rivest and A. Sherman, eds., Plenum Press, 1983.
-
(1983)
Advances in Cryptology: Proceedings of CRYPTO’82
, pp. 15-20
-
-
Brickell, E.F.1
Moore, J.H.2
-
14
-
-
0038076370
-
-
Society
-
n±1, b = 2, 3, 5, 6, 7, 10, 11, 12 up to High Powers, Am. Math. Society, 1983.
-
(1983)
Factorizations of bn±1, B = 2, 3, 5, 6, 7, 10, 11, 12 up to High Powers, Am. Math
-
-
Brillhart, J.1
Lehmer, D.H.2
Selfridge, J.L.3
Tuckerman, B.4
Wagstaff, S.S.5
-
16
-
-
84966220369
-
A new algorithm for factoring polynomials over finite fields
-
D. G. Cantor and H. Zassenhaus, A new algorithm for factoring polynomials over finite fields. Math. Comp. 36 (1981), 587-592.
-
(1981)
Math. Comp.
, vol.36
, pp. 587-592
-
-
Cantor, D.G.1
Zassenhaus, H.2
-
17
-
-
84968518187
-
Primality testing and Jacobi sums
-
H. Cohen and H. W. Lenstra, Jr., Primality testing and Jacobi sums. Math. Comp., 42 (1984), 297-330.
-
(1984)
Math. Comp.
, vol.42
, pp. 297-330
-
-
Cohen, H.1
Lenstra, H.W.2
-
19
-
-
0021468777
-
Fast evaluation of logarithms in fields of characteristic two
-
D. Coppersmith, Fast evaluation of logarithms in fields of characteristic two, IEEE Trans. Inform. Theory IT-30 (1984), 587-594.
-
(1984)
IEEE Trans. Inform. Theory
, vol.IT-30
, pp. 587-594
-
-
Coppersmith, D.1
-
21
-
-
0010999635
-
On the asymptotic complexity of matrix multiplication
-
D. Coppersmith and S. Winograd, On the asymptotic complexity of matrix multiplication, SIAM J. Comp. 11 (1982), 472-492.
-
(1982)
SIAM J. Comp.
, vol.11
, pp. 472-492
-
-
Coppersmith, D.1
Winograd, S.2
-
24
-
-
0017501281
-
Exhaustive cryptanalysis of the NBS Data Encryption Standard
-
W. Diffie and M. E. Heilman, Exhaustive cryptanalysis of the NBS Data Encryption Standard, Computer 10 (1977), 74-84.
-
(1977)
Computer
, vol.10
, pp. 74-84
-
-
Diffie, W.1
Heilman, M.E.2
-
26
-
-
85034444754
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
to appear
-
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory, to appear.
-
IEEE Trans. Inform. Theory
-
-
Elgamal, T.1
-
29
-
-
0009032814
-
Analysis of the Berlekamp-Massey feedback shift-register synthesis algorithm
-
F. G. Gustavson, Analysis of the Berlekamp-Massey feedback shift-register synthesis algorithm, IBM J. Res. Dev. 20 (1976), 204-212.
-
(1976)
IBM J. Res. Dev.
, vol.20
, pp. 204-212
-
-
Gustavson, F.G.1
-
30
-
-
0020948446
-
-
D. Chaum, R. Rivest, and A. Sherman, eds.. Plenum Press
-
M. E. Heilman and J. M. Reyneri, Fast computation of discrete logarithms in GF(q), pp. 313 in Advances in Cryptography: Proceedings of CRYPTO’82. D. Chaum, R. Rivest, and A. Sherman, eds.. Plenum Press, 1983.
-
(1983)
Fast Computation of Discrete Logarithms in Gf(Q)
, pp. 313
-
-
Heilman, M.E.1
Reyneri, J.M.2
-
33
-
-
0000135303
-
Methods of conjugate gradients for solving linear systems
-
M. R. Hestenes and E. Stiefel, Methods of conjugate gradients for solving linear systems, J. Res. Nat. Bureau of Standards 49 (1952), 409-436.
-
(1952)
J. Res. Nat. Bureau of Standards
, vol.49
, pp. 409-436
-
-
Hestenes, M.R.1
Stiefel, E.2
-
36
-
-
85034434904
-
-
Seminumerical Algorithms, 2nd ed., Addison-Wesley
-
D. E. Knuth, The Art of Computer Programming: Vol. 2, Seminumerical Algorithms, 2nd ed., Addison-Wesley 1981.
-
(1981)
The Art of Computer Programming
, vol.2
-
-
Knuth, D.E.1
-
38
-
-
0019341155
-
Communication privacy: Integration of public and secret key cryptography
-
Dec
-
J. Kowalchuk, B. P. Schanning, and S. Powers, Communication privacy: Integration of public and secret key cryptography, NTC Conference Record, Vol. 3, pp. 49.1.1-49.1.5, Dec. 1980.
-
(1980)
NTC Conference Record
, vol.3
, pp. 1-49
-
-
Kowalchuk, J.1
Schanning, B.P.2
Powers, S.3
-
39
-
-
0002814189
-
Solution of systems of linear equations by minimized iterations
-
C. Lanczos, Solution of systems of linear equations by minimized iterations. Res. Nat. Bureau of Standards 49 (1952), 33-53.
-
(1952)
Res. Nat. Bureau of Standards
, vol.49
, pp. 33-53
-
-
Lanczos, C.1
-
40
-
-
85034423731
-
Random equivalence of factorization and computation of orders
-
to appear
-
D. L. Long, Random equivalence of factorization and computation of orders, Theoretical Comp. Sci., to appear.
-
Theoretical Comp. Sci
-
-
Long, D.L.1
-
44
-
-
84937740421
-
Shift-register synthesis and BCH decoding
-
J. L. Massey, Shift-register synthesis and BCH decoding, IEEE Trans. Inform. Theory IT-15 (1969), 122-127.
-
(1969)
IEEE Trans. Inform. Theory IT-15
, pp. 122-127
-
-
Massey, J.L.1
-
45
-
-
84925442066
-
Logarithms in finite cyclic groups - cryptographic issues
-
Leuven, Belgium, May
-
J. L. Massey, Logarithms in finite cyclic groups - cryptographic issues, pp. 17-25 in Proc. 4th Benelux Symp. On Inform. Theory, Leuven, Belgium, May 1983.
-
(1983)
Proc. 4Th Benelux Symp. On Inform. Theory
, pp. 17-25
-
-
Massey, J.L.1
-
46
-
-
0003455038
-
Secrecy, authentication, and public key systems
-
Stanford Univ
-
R. Merkle, Secrecy, authentication, and public key systems, Ph.D. dissertation, Dept, of Electrical Engineering, Stanford Univ., 1979.
-
(1979)
Ph.D. Dissertation, Dept, of Electrical Engineering
-
-
Merkle, R.1
-
47
-
-
84966223197
-
On factorization, with a suggested new approach
-
J. C. P. Miller, On factorization, with a suggested new approach, Math. Comp. 29 (1975), 155-172.
-
(1975)
Math. Comp.
, vol.29
, pp. 155-172
-
-
Miller, J.C.P.1
-
49
-
-
0021406079
-
Public key distribution in matrix rings
-
R. W. K. Odoni, V. Varadharajan, and P. W. Sanders, Public key distribution in matrix rings, Electronics Letters 20 (1984), 386-387.
-
(1984)
Electronics Letters
, vol.20
, pp. 386-387
-
-
Odoni, R.W.K.1
Varadharajan, V.2
Sanders, P.W.3
-
51
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(P) and its cryptographic significance
-
S. C. Pohlig and M. Heilman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Trans. Inform. Theory IT-24 (1978), 106-110.
-
(1978)
IEEE Trans. Inform. Theory
, vol.IT-24
, pp. 106-110
-
-
Pohlig, S.C.1
Heilman, M.2
-
52
-
-
84966238549
-
Monte Carlo methods for index computations (Mod p)
-
J. Pollard, Monte Carlo methods for index computations (mod p), Math. Comp. 32 (1978), 918-924.
-
(1978)
Math. Comp.
, vol.32
, pp. 918-924
-
-
Pollard, J.1
-
53
-
-
0005599967
-
Analysis and comparison of some integer factoring algorithms
-
H. W. Lenstra, Jr., and R. Tijdeman, eds., Math. Centre Tract 154, Math. Centre Amsterdam
-
C. Pomerance, Analysis and comparison of some integer factoring algorithms, pp. 89-139 in Computational Methods in Number Theory: Part 1, H. W. Lenstra, Jr., and R. Tijdeman, eds., Math. Centre Tract 154, Math. Centre Amsterdam, 1982.
-
(1982)
Computational Methods in Number Theory: Part 1
, pp. 89-139
-
-
Pomerance, C.1
-
54
-
-
0016090968
-
A high security log-in procedure
-
G. B. Purdy, A high security log-in procedure, Comm. ACM 17 (1974), 442-445.
-
(1974)
Comm. ACM
, vol.17
, pp. 442-445
-
-
Purdy, G.B.1
-
55
-
-
0001262977
-
Probabilistic algorithms in finite fields
-
M. O. Rabin, Probabilistic algorithms in finite fields, SIAM J. Comp. 9 (1980), 273-280.
-
(1980)
SIAM J. Comp.
, vol.9
, pp. 273-280
-
-
Rabin, M.O.1
-
59
-
-
0018205963
-
Data encryption with public key distribution
-
Washington, D.C., Oct
-
B. P. Schanning, Data encryption with public key distribution, EASCON Conf. Rec., Washington, D.C., Oct. 1979, pp. 653-660.
-
(1979)
EASCON Conf. Rec.
, pp. 653-660
-
-
Schanning, B.P.1
-
60
-
-
84966241531
-
A Monte Carlo factoring algorithm with linear storage
-
C. P. Schnorr and H. W. Lenstra, Jr., A Monte Carlo factoring algorithm with linear storage, Math. Comp. 43 (1984), 289-311.
-
(1984)
Math. Comp.
, vol.43
, pp. 289-311
-
-
Schnorr, C.P.1
Lenstra, H.W.2
-
61
-
-
0020179268
-
A new implementation of sparse gaussian elimination
-
R. Schreiber, A new implementation of sparse gaussian elimination, ACM Trans. Math. Software 8 (1982), 256-276.
-
(1982)
ACM Trans. Math. Software
, vol.8
, pp. 256-276
-
-
Schreiber, R.1
-
63
-
-
0021124584
-
Realization and application of the Massey-Omura lock
-
March 6-8
-
P. K. S. Wah and M. Z. Wang, Realization and application of the Massey-Omura lock, pp. 175-182 in Proc. Intern. Zurich Seminar, March 6-8, 1984.
-
(1984)
In Proc. Intern. Zurich Seminar
, pp. 175-182
-
-
Wah, P.K.S.1
Wang, M.Z.2
-
64
-
-
85034449100
-
A polynomial form for logarithms modulo a prime
-
to appear
-
A. L. Wells, Jr., A polynomial form for logarithms modulo a prime, IEEE Trans. Inform. Theory, to appear.
-
IEEE Trans. Inform. Theory
-
-
Wells, A.L.1
-
68
-
-
0347818260
-
Some remarks concerning the M.I.T. Public-key system
-
H. C. Williams and B. Schmid, Some remarks concerning the M.I.T. public-key system, BIT 19 (1979), 525-538.
-
(1979)
BIT
, vol.19
, pp. 525-538
-
-
Williams, H.C.1
Schmid, B.2
-
69
-
-
0020265467
-
A single-chip VLSI implementation of the discrete exponential public key distribution system
-
K. Yiu and K. Peterson, A single-chip VLSI implementation of the discrete exponential public key distribution system, Proc. GLOBCOM-82, IEEE 1982, pp. 173-179.
-
(1982)
Proc. GLOBCOM-82, IEEE
, pp. 173-179
-
-
Yiu, K.1
Peterson, K.2
-
70
-
-
49549158800
-
A conversion algorithm for logarithms on GF(2n)
-
n), J. Pure Appl. Algebra 4 (1974), 353-356.
-
(1974)
J. Pure Appl. Algebra
, vol.4
, pp. 353-356
-
-
Zierler, N.1
-
71
-
-
49949120525
-
On primitive trinomials (Mod 2)
-
N. Zierler and J. Brillhart, On primitive trinomials (mod 2), Inform. Control 13 (1968), 541-554.
-
(1968)
Inform. Control
, vol.13
, pp. 541-554
-
-
Zierler, N.1
Brillhart, J.2
-
72
-
-
0001159015
-
On primitive trinomials (Mod 2), II
-
N. Zierler and J. Brillhart, On primitive trinomials (mod 2), II., Inform. Control 14 (1969), 566-569.
-
(1969)
Inform. Control
, vol.14
, pp. 566-569
-
-
Zierler, N.1
Brillhart, J.2
|