×

Found 70 Documents (Results 1–70)

Bad directions in cryptographic hash functions. (English) Zbl 1391.94729

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 488-508 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

SPHINCS: practical stateless hash-based signatures. (English) Zbl 1370.94488

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 368-397 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

TweetNaCl: a crypto library in 100 tweets. (English) Zbl 1378.94025

Aranha, F. (ed.) et al., Progress in cryptology – LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17–19, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). Lecture Notes in Computer Science 8895, 64-83 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Twisted Hessian curves. (English) Zbl 1370.94487

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 269-294 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI Link

Batch NFS. (English) Zbl 1382.11094

Joux, Antoine (ed.) et al., Selected areas in cryptography – SAC 2014. 21st international conference, Montreal, QC, Canada, August 14–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 38-58 (2014).
MSC:  11Y05 11Y16 94A60
PDFBibTeX XMLCite
Full Text: DOI

Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. (English) Zbl 1321.94008

Lecture Notes in Computer Science 8282. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). xv, 590 p. (2014).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Curve41417: Karatsuba revisited. (English) Zbl 1375.94102

Batina, Lejla (ed.) et al., Cryptographic hardware and embedded systems – CHES 2014. 16th international workshop, Busan, South Korea, September 23–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-44708-6/pbk). Lecture Notes in Computer Science 8731, 316-334 (2014).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Kummer strikes back: new DH speed records. (English) Zbl 1306.94027

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 317-337 (2014).
MSC:  94A60 14G50 68P25
PDFBibTeX XMLCite
Full Text: DOI

Factoring RSA keys from certified smart cards: Coppersmith in the wild. (English) Zbl 1326.94075

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 341-360 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Non-uniform cracks in the concrete: the power of free precomputation. (English) Zbl 1326.94076

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 321-340 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Never trust a bunny. (English) Zbl 1337.94093

Hoepman, Jaap-Henk (ed.) et al., Radio frequency identification. Security and privacy issues. 8th international workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2–3, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36139-5/pbk). Lecture Notes in Computer Science 7739, 137-148 (2013).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link
[Ball, L. Simeon; Blake, Ian; Blokhuis, Aart; Cioaba, Sebastian M.; Colbourn, Charles J.; Ding, Jintai; Dinitz, Jeffrey H.; Dumas, Jean-Guillaume; Ebert, Gary; Effinger, Gove; Enge, Andreas; Fan, Haining; Gong, Guang; Goss, David; Gupta, Kishan Chand; Hasan, M. Anwarul; Hinkelmann, Franziska; Hirschfeld, James W. P.; Huffman, W. Cary; Jedwab, Jonathan; Jungnickel, Dieter; Laubenbacher, Reinhard; Litsyn, Simon; Menezes, Alfred; Mullen, Gary L.; Murty, Kumar; Murty, M. Ram; Niederreiter, Harald; Pernet, Clément; Pott, Alexander; Roetteler, Martin; Schmidt, Kai-Uwe; Stevens, Brett; Storme, Leo; Takeshita, Oscar; Thas, Joseph A.; Thériault, Nicolas; Wan, Zhe-Xian; Winterhof, Arne; Gow, Roderick; Panario, Daniel; Thomson, David; Yucas, Joseph L.; Kyuregyan, Melsik; Ahmadi, Omran; Cohen, Stephen D.; Hou, Xiang-dong; Voloch, Jose Felipe; Gao, Shuhong; Liao, Qunying; Hachenberger, Dirk; Evans, Ronald J.; Rojas-Leon, Antonio; Ostafe, Alina; Garaev, Moubariz Z.; Fitzgerald, Robert; Castro, Francis; Rubio, Ivelisse; Lidl, Rudolf; Zieve, Michael E.; Carlet, Claude; Charpin, Pascale; Kholosha, Alexander; Coulter, Robert; Wang, Qiang; Fried, Michael D.; McGuire, Gary; Helleseth, Tor; Meidl, Wilfried; Shparlinski, Igor; Doche, Christophe; Giesbrecht, Mark; von zur Gathen, Joachim; Kaltofen, Erich; Lecerf, Gregoire; Odlyzko, Andrew; de Smit, Bart; Lenstra, Hendrik; Silverman, Joseph; Bernstein, Daniel J.; Lange, Tanja; Jacobson, Michael John jun.; Scheidler, Renate; Garcia, Arnaldo; Stichtenoth, Henning; Fu, Lei; Blache, Regis; Wan, Daqing]

Handbook of finite fields. (English) Zbl 1319.11001

Discrete Mathematics and Its Applications. Boca Raton, FL: CRC Press (ISBN 978-1-4398-7378-6/hbk; 978-1-4398-7382-3/ebook). xxxv, 1033 p. (2013).
PDFBibTeX XMLCite
Full Text: DOI

Quantum algorithms for the subset-sum problem. (English) Zbl 1295.68127

Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 16-33 (2013).
PDFBibTeX XMLCite
Full Text: DOI Link

Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. (English) Zbl 1258.94002

Lecture Notes in Computer Science 7708. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). xvi, 333 p. (2013).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Faster batch forgery identification. (English) Zbl 1295.94173

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 454-473 (2012).
MSC:  94A62 14G50
PDFBibTeX XMLCite
Full Text: DOI Link

Computing small discrete logarithms faster. (English) Zbl 1295.94022

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 317-338 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

The security impact of a new cryptographic library. (English) Zbl 1303.94067

Hevia, Alejandro (ed.) et al., Progress in cryptology – LATINCRYPT 2012. 2nd international conference on cryptology and information security in Latin America, Santiago, Chile, October 7–10, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33480-1/pbk). Lecture Notes in Computer Science 7533, 159-176 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Elliptic curves for applications. (English) Zbl 1291.94117

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 2 (2011).
MSC:  94A60 68P25 14G50
PDFBibTeX XMLCite
Full Text: DOI

Wild McEliece incognito. (English) Zbl 1290.94042

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 244-254 (2011).
MSC:  94A60 94B35 11T71
PDFBibTeX XMLCite
Full Text: DOI Link

High-speed high-security signatures. (English) Zbl 1321.94039

Preneel, Bart (ed.) et al., Cryptographic hardware and embedded systems – CHES 2011. 13th international workshop, Nara, Japan, September 28–October 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-23950-2/pbk). Lecture Notes in Computer Science 6917, 124-142 (2011).
MSC:  94A60 14G50 94-04
PDFBibTeX XMLCite
Full Text: DOI

Smaller decoding exponents: ball-collision decoding. (English) Zbl 1287.94053

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 743-760 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Really fast syndrome-based hashing. (English) Zbl 1280.94039

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 134-152 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

On the correct use of the negation map in the Pollard rho method. (English) Zbl 1248.94056

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 128-146 (2011).
MSC:  94A60 11Y05 14G50
PDFBibTeX XMLCite
Full Text: DOI

Wild McEliece. (English) Zbl 1290.94041

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 143-158 (2011).
MSC:  94A60 11T71 94B35
PDFBibTeX XMLCite
Full Text: DOI

ECC2K-130 on NVIDIA GPUs. (English) Zbl 1248.94054

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 328-346 (2010).
PDFBibTeX XMLCite
Full Text: DOI Link

Starfish on strike. (English) Zbl 1248.94053

Abdalla, Michel (ed.) et al., Progress in cryptology – LATINCRYPT 2010. First international conference on cryptology and information security in Latin America, Puebla, Mexico, August 8–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14711-1/pbk). Lecture Notes in Computer Science 6212, 61-80 (2010).
PDFBibTeX XMLCite
Full Text: DOI Link

Type-II optimal polynomial bases. (English) Zbl 1230.12001

Hasan, M. Anwar (ed.) et al., Arithmetic of finite fields. Third international workshop, WAIFI 2010, Istanbul, Turkey, June 27–30, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13796-9/pbk). Lecture Notes in Computer Science 6087, 41-61 (2010).
PDFBibTeX XMLCite
Full Text: DOI Link

Faster pairing computations on curves with high-degree twists. (English) Zbl 1279.94069

Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 224-242 (2010).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. (English) Zbl 1186.94003

Lecture Notes in Computer Science 6055. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). xiii, 437 p. (2010).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

FSBday: implementing Wagner’s generalized birthday attack against the SHA-3 round-1 candidate FSB. (English) Zbl 1248.94055

Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 18-38 (2009).
MSC:  94A60 68W10 68W15
PDFBibTeX XMLCite
Full Text: DOI

ECM on graphics cards. (English) Zbl 1239.94035

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 483-501 (2009).
PDFBibTeX XMLCite
Full Text: DOI

Analysis and optimization of elliptic-curve single-scalar multiplication. (English) Zbl 1184.94225

Mullen, Gary L. (ed.) et al., Finite fields and applications. Proceedings of the eighth international conference on finite fields and applications, Melbourne, Australia, July 9–13, 2007. Providence, RI: American Mathematical Society (AMS) (ISBN 978-0-8218-4309-3/pbk). Contemporary Mathematics 461, 1-19 (2008).
PDFBibTeX XMLCite

Revisiting pairing based group key exchange. (English) Zbl 1175.94073

Tsudik, Gene (ed.), Financial cryptography and data security. 12th international conference, FC 2008, Cozumel, Mexico, January 28–31, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-85229-2/pbk). Lecture Notes in Computer Science 5143, 53-68 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Attacking and defending the McEliece cryptosystem. (English) Zbl 1177.94128

Buchmann, Johannes (ed.) et al., Post-quantum cryptography. Second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17–19, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88402-6/pbk). Lecture Notes in Computer Science 5299, 31-46 (2008).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI Link

Twisted Edwards curves. (English) Zbl 1142.94332

Vaudenay, Serge (ed.), Progress in cryptology – AFRICACRYPT 2008. First international conference on cryptology in Africa, Casablanca, Morocco, June 11–14, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68159-5/pbk). Lecture Notes in Computer Science 5023, 389-405 (2008).
PDFBibTeX XMLCite
Full Text: DOI Link

Scalable authenticated tree based group key exchange for ad-hoc groups. (English) Zbl 1195.94074

Dietrich, Sven (ed.) et al., Financial cryptography and data security. 11th international conference, FC 2007, and 1st international workshop on usable security, USEC 2007, Scarborough, Trinidad and Tobago, February 12–16, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77365-8/pbk). Lecture Notes in Computer Science 4886, 104-118 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Faster addition and doubling on elliptic curves. (English) Zbl 1153.11342

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 29-50 (2007).
PDFBibTeX XMLCite
Full Text: DOI

Inverted Edwards coordinates. (English) Zbl 1195.14047

Boztaş, Serdar (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 17th international symposium, AAECC-17, Bangalore, India, December 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77223-1/pbk). Lecture Notes in Computer Science 4851, 20-27 (2007).
PDFBibTeX XMLCite
Full Text: DOI Link

Optimizing double-base elliptic-curve single-scalar multiplication. (English) Zbl 1153.94350

Srinathan, K. (ed.) et al., Progress in cryptology – INDOCRYPT 2007. 8th international conference on cryptology in India, Chennai, India, December 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77025-1/pbk). Lecture Notes in Computer Science 4859, 167-182 (2007).
PDFBibTeX XMLCite
Full Text: DOI Link

Pairing based threshold cryptography improving on Libert-Quisquater and Baek-Zheng. (Extended abstract). (English) Zbl 1152.94416

Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27–March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 154-159 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. (English) Zbl 1133.94005

Lecture Notes in Computer Science 4329. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). x, 454 p. (2006).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Fast bilinear maps from the Tate-Lichtenbaum pairing on hyperelliptic curves. (English) Zbl 1143.94345

Hess, Florian (ed.) et al., Algorithmic number theory. 7th international symposium, ANTS-VII, Berlin, Germany, July 23–28, 2006. Proceedings. Berlin: Springer (ISBN 3-540-36075-1/pbk). Lecture Notes in Computer Science 4076, 466-479 (2006).
MSC:  94A60 11T71 14G50
PDFBibTeX XMLCite
Full Text: DOI

On the non-linearity and sparsity of Boolean functions related to the discrete logarithm in finite fields of characteristic two. (English) Zbl 1151.94487

Ytrehus, Øyvind (ed.), Coding and cryptography. International workshop, WCC 2005, Bergen, Norway, March 14–18, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-35481-6/pbk). Lecture Notes in Computer Science 3969, 135-143 (2006).
MSC:  94A60 06E30 94C10 42C99
PDFBibTeX XMLCite
Full Text: DOI

Handbook of elliptic and hyperelliptic curve cryptography. (English) Zbl 1082.94001

Discrete Mathematics and its Applications. Boca Raton, FL: Chapman & Hall/CRC (ISBN 1-58488-518-1/hbk; 978-1-4200-3498-1/ebook). xxxiv, 808 p. (2006).
PDFBibTeX XMLCite
Full Text: DOI

Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. (English) Zbl 1145.94430

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 205-222 (2005).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

SCA resistant parallel explicit formula for addition and doubling of divisors in the Jacobian of hyperelliptic curves of genus 2. (English) Zbl 1153.94405

Maitra, Subhamoy (ed.) et al., Progress in cryptology – INDOCRYPT 2005. 6th international conference on cryptology in India, Bangalore, India, December 10–12, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30805-8/pbk). Lecture Notes in Computer Science 3797, 403-416 (2005).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

Efficient doubling on genus two curves over binary fields. (English) Zbl 1117.94011

Handschuh, Helena (ed.) et al., Selected areas in cryptography. 11th international workshop, SAC 2004, Waterloo, Canada, August 9–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24327-5/pbk). Lecture Notes in Computer Science 3357, 170-181 (2005).
MSC:  94A60 11G20 14H45
PDFBibTeX XMLCite
Full Text: DOI

Mathematical background of public key cryptography. (English) Zbl 1155.11361

Aubry, Yves (ed.) et al., Arithmetic, geometry and coding theory (AGCT 2003). Selected papers of the European school “Algebraic geometry and information theory” and the 9th international conference “Arithmetic, geometry and coding theory”, Luminy, France, May 19–23, 2003. Paris: Société Mathématique de France (ISBN 2-85629-175-9/pbk). Séminaires et Congrès 11, 41-73 (2005).
MSC:  11T71 94A60 94A62
PDFBibTeX XMLCite
Full Text: Link

Improved algorithms for efficient arithmetic on elliptic curves using fast endomorphisms. (English) Zbl 1038.11507

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 388-400 (2003).
PDFBibTeX XMLCite
Full Text: Link

Interpolation of the elliptic curve Diffie-Hellman mapping. (English) Zbl 1030.11071

Fossorier, Marc (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 15th international symposium, AAECC-15, Toulouse, France, May 12-16, 2003. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2643, 51-60 (2003).
MSC:  11T71 11G07
PDFBibTeX XMLCite
Full Text: Link

Polynomial interpolation of the elliptic curve and XTR discrete logarithm. (English) Zbl 1077.94518

Ibarra, Oscar H. (ed.) et al., Computing and combinatorics. 8th annual international conference, COCOON 2002, Singapore, August 15–17, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43996-X). Lect. Notes Comput. Sci. 2387, 137-143 (2002).
MSC:  94A60 11Y16
PDFBibTeX XMLCite
Full Text: Link

Speeding up the arithmetic on Koblitz curves of genus two. (English) Zbl 0976.94014

Stinson, Douglas R. (ed.) et al., Selected areas in cryptography. 7th annual international workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2012, 106-117 (2001).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: Link

Interpolation of the discrete logarithm in finite fields by Boolean functions. (English) Zbl 0985.94507

Augot, Daniel (ed.) et al., WCC2001 international workshop on coding and cryptography. Paris, France, January 8-12, 2001. Amsterdam: Elsevier, Electron. Notes Discrete Math. 6, no pag., electronic only (2001).
MSC:  94A60 94C10 68Q25 11Y16 11T71
PDFBibTeX XMLCite

Algorithms for factoring polynomials over finite fields. (English) Zbl 1006.11085

Jungnickel, Dieter (ed.) et al., Finite fields and applications. Proceedings of the fifth international conference on finite fields and applications \(F_q5\), University of Augsburg, Germany, August 2-6, 1999. Berlin: Springer. 319-328 (2001).
MSC:  11Y16 11T06 68W30
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software