-
3
-
-
0040553594
-
An improved Monte Carlo factoring algorithm
-
R. Brent, “An improved Monte Carlo factoring algorithm”, BIT, 20 (1980), 176–184.
-
(1980)
BIT
, vol.20
, pp. 176-184
-
-
Brent, R.1
-
4
-
-
0039960603
-
Parallel algorithms for integer factorisation
-
Cambridge University Press
-
R. Brent, “Parallel algorithms for integer factorisation”, in Number Theory and Cryptography, Cambridge University Press, 1990, 26–37.
-
(1990)
Number Theory and Cryptography
, pp. 26-37
-
-
Brent, R.1
-
6
-
-
0024079003
-
A knapsack-type public key cryptosystem based on arithmetic in finite fields
-
B. Chor and R. Rivest, “A knapsack-type public key cryptosystem based on arithmetic in finite fields”, IEEE Transactions on Information Theory, 34 (1988), 901–909.
-
(1988)
IEEE Transactions on Information Theory
, vol.34
, pp. 901-909
-
-
Chor, B.1
Rivest, R.2
-
8
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Transactions on Information Theory, 31 (1985), 469–472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
11
-
-
0000112683
-
Elliptic curve cryptosystem
-
N. Koblitz, “Elliptic curve cryptosystem”, Mathematics of Computation, 48 (1987), 203–209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
12
-
-
85030323959
-
Constructing elliptic curve cryptosystems in characteristic 2
-
Springer-Verlag
-
N. Koblitz, “Constructing elliptic curve cryptosystems in characteristic 2”, Advances in Cryptology: Proceedings of Crypto’ 90, Lecture Notes in Computer Science, 537 (1991), Springer-Verlag, 156–167.
-
(1991)
Advances in Cryptology: Proceedings of Crypto’ 90, Lecture Notes in Computer Science
, vol.537
, pp. 156-167
-
-
Koblitz, N.1
-
13
-
-
85024567680
-
CM-Curves with good cryptographic properties
-
Springer-Verlag
-
N. Koblitz, “CM-Curves with good cryptographic properties”, Advances in Cryptology: Proceedings of Crypto’ 91, Lecture Notes in Computer Science, 576 (1992), Springer-Verlag, 279–287.
-
(1992)
Advances in Cryptology: Proceedings of Crypto’ 91, Lecture Notes in Computer Science
, vol.576
, pp. 279-287
-
-
Koblitz, N.1
-
14
-
-
0012438383
-
Computation of discrete logarithms in prime fields
-
B. La Macchia and A. Odlyzko, “Computation of discrete logarithms in prime fields”, Designs, Codes and Cryptography, 1 (1991), 47–62.
-
(1991)
Designs, Codes and Cryptography
, vol.1
, pp. 47-62
-
-
La Macchia, B.1
Odlyzko, A.2
-
18
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Springer-Verlag
-
V. Miller, “Uses of elliptic curves in cryptography”, Advances in Cryptology: Proceedings of Crypto’ 85, Lecture Notes in Computer Science, 218 (1986), Springer-Verlag, 417–426.
-
(1986)
Advances in Cryptology: Proceedings of Crypto’ 85, Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
19
-
-
45549114790
-
Optimal normal bases in GF(P n)
-
R. Mullin, I. Onyszchuk, S. Vanstone and R. Wilson, “Optimal normal bases in GF(p n)”, Discrete Applied Mathematics, 22 (1988/89), 149–161.
-
(1988)
Discrete Applied Mathematics
, vol.22
, pp. 149-161
-
-
Mullin, R.1
Onyszchuk, I.2
Vanstone, S.3
Wilson, R.4
-
20
-
-
84957014368
-
Discrete logarithms in finite fields and their cryptographic significance
-
Springer-Verlag
-
A. Odlyzko, “Discrete logarithms in finite fields and their cryptographic significance”, Advances in Cryptology — Proceedings of Eurocrypt’ 84, Lecture Notes in Computer Science, 209 (1985), Springer-Verlag, 224–314.
-
(1985)
Advances in Cryptology — Proceedings of Eurocrypt’ 84, Lecture Notes in Computer Science
, vol.209
, pp. 224-314
-
-
Odlyzko, A.1
-
21
-
-
84919085619
-
An improved algorithm for computing logarithms over GF (P) and its cryptographic significance
-
S. Pohlig and M. Hellman, “An improved algorithm for computing logarithms over GF (p) and its cryptographic significance”, IEEE Transactions on Information Theory, 24 (1978), 106–110.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
22
-
-
84966238549
-
Monte Carlo methods for index computation (Mod p)
-
J. Pollard, “Monte Carlo methods for index computation (mod p)”, Mathematics of Computation, 32 (1978), 918–924.
-
(1978)
Mathematics of Computation
, vol.32
, pp. 918-924
-
-
Pollard, J.1
-
23
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, 21 (1978), 120–126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
24
-
-
84966233278
-
Elliptic curves over finite fields and the computation of square roots mod p
-
R. Schoof, “Elliptic curves over finite fields and the computation of square roots mod p”, Mathematics of Computation, 44 (1985), 483–494.
-
(1985)
Mathematics of Computation
, vol.44
, pp. 483-494
-
-
Schoof, R.1
-
25
-
-
70350119151
-
A comparison of practical public key cryptosystems
-
IEEE Press
-
P. van Oorschot, “A comparison of practical public key cryptosystems”, in Contemporary Cryptology, IEEE Press, 1992, 289–322.
-
(1992)
Contemporary Cryptology
, pp. 289-322
-
-
Van Oorschot, P.1
|