×

Found 67 Documents (Results 1–67)

Type 2 structure-preserving signature schemes revisited. (English) Zbl 1396.94066

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 286-310 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Computing discrete logarithms in \(\mathbb F_{3^{6 \cdot 137}}\) and \(\mathbb F_{3^{6 \cdot 163}}\) using Magma. (English) Zbl 1400.11161

Koç, Çetin Kaya (ed.) et al., Arithmetic of finite fields. 5th international workshop, WAIFI 2014, Gebze, Turkey, September 27–28, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-319-16276-8/pbk). Lecture Notes in Computer Science 9061, 3-22 (2015).
MSC:  11Y16 11T71 94A60
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17–19, 2014. Revised selected papers. (English) Zbl 1319.94001

Lecture Notes in Computer Science 8895. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). xii, 387 p. (2015).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Another look at security theorems for 1-key nested MACs. (English) Zbl 1314.94079

Koç, Çetin Kaya (ed.), Open problems in mathematics and computational science. Based on the presentations at the conference, Istanbul, Turkey, September 18–20, 2013. Cham: Springer (ISBN 978-3-319-10682-3/hbk; 978-3-319-10683-0/ebook). 69-89 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Weakness of \(\mathbb{F}_{3^{6 \cdot 509}}\) for discrete logarithm cryptography. (English) Zbl 1307.94031

Cao, Zhenfu (ed.) et al., Pairing-based cryptography – Pairing 2013. 6th international conference, Beijing, China, November 22–24, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-319-04872-7/pbk). Lecture Notes in Computer Science 8365, 20-44 (2014).
PDFBibTeX XMLCite
Full Text: DOI
[Ball, L. Simeon; Blake, Ian; Blokhuis, Aart; Cioaba, Sebastian M.; Colbourn, Charles J.; Ding, Jintai; Dinitz, Jeffrey H.; Dumas, Jean-Guillaume; Ebert, Gary; Effinger, Gove; Enge, Andreas; Fan, Haining; Gong, Guang; Goss, David; Gupta, Kishan Chand; Hasan, M. Anwarul; Hinkelmann, Franziska; Hirschfeld, James W. P.; Huffman, W. Cary; Jedwab, Jonathan; Jungnickel, Dieter; Laubenbacher, Reinhard; Litsyn, Simon; Menezes, Alfred; Mullen, Gary L.; Murty, Kumar; Murty, M. Ram; Niederreiter, Harald; Pernet, Clément; Pott, Alexander; Roetteler, Martin; Schmidt, Kai-Uwe; Stevens, Brett; Storme, Leo; Takeshita, Oscar; Thas, Joseph A.; Thériault, Nicolas; Wan, Zhe-Xian; Winterhof, Arne; Gow, Roderick; Panario, Daniel; Thomson, David; Yucas, Joseph L.; Kyuregyan, Melsik; Ahmadi, Omran; Cohen, Stephen D.; Hou, Xiang-dong; Voloch, Jose Felipe; Gao, Shuhong; Liao, Qunying; Hachenberger, Dirk; Evans, Ronald J.; Rojas-Leon, Antonio; Ostafe, Alina; Garaev, Moubariz Z.; Fitzgerald, Robert; Castro, Francis; Rubio, Ivelisse; Lidl, Rudolf; Zieve, Michael E.; Carlet, Claude; Charpin, Pascale; Kholosha, Alexander; Coulter, Robert; Wang, Qiang; Fried, Michael D.; McGuire, Gary; Helleseth, Tor; Meidl, Wilfried; Shparlinski, Igor; Doche, Christophe; Giesbrecht, Mark; von zur Gathen, Joachim; Kaltofen, Erich; Lecerf, Gregoire; Odlyzko, Andrew; de Smit, Bart; Lenstra, Hendrik; Silverman, Joseph; Bernstein, Daniel J.; Lange, Tanja; Jacobson, Michael John jun.; Scheidler, Renate; Garcia, Arnaldo; Stichtenoth, Henning; Fu, Lei; Blache, Regis; Wan, Daqing]

Handbook of finite fields. (English) Zbl 1319.11001

Discrete Mathematics and Its Applications. Boca Raton, FL: CRC Press (ISBN 978-1-4398-7378-6/hbk; 978-1-4398-7382-3/ebook). xxxv, 1033 p. (2013).
PDFBibTeX XMLCite
Full Text: DOI

Implementing pairings at the 192-bit security level. (English) Zbl 1305.94033

Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 177-195 (2013).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Another look at provable security. (Abstract). (English) Zbl 1279.94101

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 8 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Another look at tightness. (English) Zbl 1279.94134

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 293-319 (2012).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Parallelizing the Weil and Tate pairings. (English) Zbl 1279.11115

Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 275-295 (2011).
PDFBibTeX XMLCite
Full Text: DOI

A generic variant of NIST’S KAS2 key agreement protocol. (English) Zbl 1279.94062

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 353-370 (2011).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Intractable problems in cryptography. (English) Zbl 1222.94033

McGuire, Gary (ed.) et al., Finite fields. Theory and applications. Proceedings of the 9th international conference on finite fields and applications, Dublin, Ireland, July 13–17, 2009. Providence, RI: American Mathematical Society (AMS) (ISBN 978-0-8218-4786-2/pbk). Contemporary Mathematics 518, 279-300 (2010).
MSC:  94A60 11T71 68P25
PDFBibTeX XMLCite

Combined security analysis of the one- and three-pass unified model key agreement protocols. (English) Zbl 1253.94043

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 49-68 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On the efficiency and security of pairing-based protocols in the type 1 and type 4 settings. (English) Zbl 1232.94014

Hasan, M. Anwar (ed.) et al., Arithmetic of finite fields. Third international workshop, WAIFI 2010, Istanbul, Turkey, June 27–30, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13796-9/pbk). Lecture Notes in Computer Science 6087, 114-134 (2010).
PDFBibTeX XMLCite
Full Text: DOI Link

A new protocol for the nearby friend problem. (English) Zbl 1234.94035

Parker, Matthew G. (ed.), Cryptography and coding. 12th IMA international conference, cryptography and coding 2009, Cirencester, UK, December 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10867-9/pbk). Lecture Notes in Computer Science 5921, 236-251 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Reusing static keys in key agreement protocols. (English) Zbl 1252.94054

Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 39-56 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

An introduction to pairing-based cryptography. (English) Zbl 1180.94058

Luengo, Ignacio (ed.), Recent trends in cryptography. UIMP-RSME Santaló summer school, July 11–15, 2005, Universidad Internacional Menéndez Pelayo, Santander, Spain. Providence, RI: American Mathematical Society (AMS); Madrid: Real Sociedad Matemática Española (ISBN 978-0-8218-3984-3/pbk). Contemporary Mathematics 477, 47-65 (2009).
MSC:  94A60 14G50
PDFBibTeX XMLCite

Comparing the pre- and post-specified peer models for key agreement. (English) Zbl 1279.94102

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 53-68 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. (English) Zbl 1123.94001

Lecture Notes in Computer Science 4622. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). xiv, 631 p. (2007).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Software implementation of arithmetic in \(\mathbb F_{3^m}\). (English) Zbl 1213.11197

Carlet, Claude (ed.) et al., Arithmetic of finite fields. First international workshop, WAIFI 2007, Madrid, Spain, June 21–22, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73073-6/pbk). Lecture Notes in Computer Science 4547, 85-102 (2007).
PDFBibTeX XMLCite
Full Text: DOI

Another look at “provable security”. II. (English) Zbl 1175.68146

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 148-175 (2006).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

On the importance of public-key validation in the MQV and HMQV key agreement protocols. (English) Zbl 1175.94092

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 133-147 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Pairing-based cryptography at high security levels. (English) Zbl 1122.94038

Smart, Nigel P. (ed.), Cryptography and coding. 10th IMA international conference, Cirencester, UK, December 19–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30276-X/pbk). Lecture Notes in Computer Science 3796, 13-36 (2005).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Topics in cryptology – CT-RSA 2005. The cryptographers’ track at the RSA conference 2005, San Francisco, CA, USA, February 14–18, 2005. Proceedings. (English) Zbl 1069.94501

Lecture Notes in Computer Science 3376. Berlin: Springer (ISBN 3-540-24399-2/pbk). x, 385 p. (2005).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Weak fields for ECC. (English) Zbl 1196.94060

Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 366-386 (2004).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

Algebraic aspects of cryptography. With an appendix on hyperelliptic curves by Alfred J. Menezes, Yi-Hong Wu, and Robert J. Zuccherato. 3rd printing. (English) Zbl 1068.94001

Algorithms and Computation in Mathematics 3. Berlin: Springer (ISBN 3-540-63446-0/hbk). ix, 206 p. (2004).
MSC:  94-01 94A60 11Y16
PDFBibTeX XMLCite

Hyperelliptic curves and cryptography. (English) Zbl 1098.94023

van der Poorten, Alf (ed.) et al., High primes and misdemeanours: lectures in honour of the 60th birthday of Hugh Cowie Williams. Selected papers from the international conference on number theory, Banff, AB, Canada, May 24–30, 2003. Providence, RI: American Mathematical Society (AMS) (ISBN 0-8218-3353-7/hbk). Fields Institute Communications 41, 255-282 (2004).
PDFBibTeX XMLCite

Validation of elliptic curve public keys. (English) Zbl 1033.94509

Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 211-223 (2002).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – INDOCRYPT 2002. Third international conference on cryptology in India, Hyderabad, India, December 16–18, 2002. Proceedings. (English) Zbl 1014.00038

Lecture Notes in Computer Science. 2551. Berlin: Springer. xi, 435 p. (2002).
MSC:  00B25 94-06 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Analysis of the GHS Weil descent attack on the ECDLP over characteristic two finite fields of composite degree. (English) Zbl 1011.94554

Rangan, C. Pandu (ed.) et al., Progress in cryptology - INDOCRYPT 2001. 2nd international conference on cryptology in India, Chennai, India, December 16-20, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2247, 195-213 (2001).
MSC:  94A60 11G07
PDFBibTeX XMLCite

Software implementation of the NIST elliptic curves over prime fields. (English) Zbl 0968.68049

Naccache, David (ed.), Topics in cryptology - CT-RSA 2001. The cryptographer’s track at RSA conference 2001, San Francisco, CA, USA, April 8-12, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2020, 250-265 (2001).
MSC:  68P25 94A60
PDFBibTeX XMLCite

Software implementation of elliptic curve cryptography over binary fields. (English) Zbl 0998.94534

Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2000. 2nd international workshop, Worcester, MA, USA, August 17-18, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1965, 1-24 (2000).
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software