Göloğlu, Faruk Almost perfect nonlinear trinomials and hexanomials. (English) Zbl 1368.11128 Finite Fields Appl. 33, 258-282 (2015). MSC: 11T06 11T71 PDFBibTeX XMLCite \textit{F. Göloğlu}, Finite Fields Appl. 33, 258--282 (2015; Zbl 1368.11128) Full Text: DOI
Okumura, Shinya A public key cryptosystem based on Diophantine equations of degree increasing type. (English) Zbl 1358.94074 Pac. J. Math. Ind. 7, 33-45 (2015). MSC: 94A60 11D99 PDFBibTeX XMLCite \textit{S. Okumura}, Pac. J. Math. Ind. 7, 33--45 (2015; Zbl 1358.94074) Full Text: DOI OA License
Konstantinou, Elisavet; Kontogeorgis, Aristides Revisiting the complex multiplication method for the construction of elliptic curves. (English) Zbl 1368.11135 Daras, Nicholas J. (ed.) et al., Computation, cryptography, and network security. Cham: Springer (ISBN 978-3-319-18274-2/hbk; 978-3-319-18275-9/ebook). 299-318 (2015). MSC: 11Y40 11G15 11R29 11R37 94A60 14G50 PDFBibTeX XMLCite \textit{E. Konstantinou} and \textit{A. Kontogeorgis}, in: Computation, cryptography, and network security. Cham: Springer. 299--318 (2015; Zbl 1368.11135) Full Text: DOI
Zhang, Tao; Michel, Jerod; Feng, Tao; Ge, Gennian On the existence of certain optimal self-dual codes with lengths between 74 and 116. (English) Zbl 1364.94641 Electron. J. Comb. 22, No. 4, Research Paper P4.33, 25 p. (2015). MSC: 94B05 11T71 PDFBibTeX XMLCite \textit{T. Zhang} et al., Electron. J. Comb. 22, No. 4, Research Paper P4.33, 25 p. (2015; Zbl 1364.94641) Full Text: arXiv Link
Gorla, Elisa; Massierer, Maike Index calculus in the trace zero variety. (English) Zbl 1333.14025 Adv. Math. Commun. 9, No. 4, 515-539 (2015). Reviewer: Dimitros Poulakis (Thessaloniki) MSC: 14G50 11G25 11Y40 11T71 PDFBibTeX XMLCite \textit{E. Gorla} and \textit{M. Massierer}, Adv. Math. Commun. 9, No. 4, 515--539 (2015; Zbl 1333.14025) Full Text: DOI arXiv
Gupta, Kishan; Ray, Indranil Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications. (English) Zbl 1365.94432 Cryptogr. Commun. 7, No. 2, 257-287 (2015). MSC: 94A60 15B10 PDFBibTeX XMLCite \textit{K. Gupta} and \textit{I. Ray}, Cryptogr. Commun. 7, No. 2, 257--287 (2015; Zbl 1365.94432) Full Text: DOI
Adj, Gora; Menezes, Alfred; Oliveira, Thomaz; Rodríguez-Henríquez, Francisco Computing discrete logarithms in \(\mathbb F_{3^{6 \cdot 137}}\) and \(\mathbb F_{3^{6 \cdot 163}}\) using Magma. (English) Zbl 1400.11161 Koç, Çetin Kaya (ed.) et al., Arithmetic of finite fields. 5th international workshop, WAIFI 2014, Gebze, Turkey, September 27–28, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-319-16276-8/pbk). Lecture Notes in Computer Science 9061, 3-22 (2015). MSC: 11Y16 11T71 94A60 PDFBibTeX XMLCite \textit{G. Adj} et al., Lect. Notes Comput. Sci. 9061, 3--22 (2015; Zbl 1400.11161) Full Text: DOI
Plantard, Thomas; Susilo, Willy; Zhang, Zhenfei LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi’s FHE scheme. (English) Zbl 1360.11144 Des. Codes Cryptography 76, No. 2, 325-344 (2015). MSC: 11Y16 68W30 94A60 PDFBibTeX XMLCite \textit{T. Plantard} et al., Des. Codes Cryptography 76, No. 2, 325--344 (2015; Zbl 1360.11144) Full Text: DOI
Chi, Jesús-Javier; Oliveira, Thomaz Attacking a binary GLS elliptic curve with Magma. (English) Zbl 1370.94498 Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 308-326 (2015). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{J.-J. Chi} and \textit{T. Oliveira}, Lect. Notes Comput. Sci. 9230, 308--326 (2015; Zbl 1370.94498) Full Text: DOI
Vitse, Vanessa; Wallet, Alexandre Improved sieving on algebraic curves. (English) Zbl 1370.94548 Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 295-307 (2015). MSC: 94A60 11T71 14G50 PDFBibTeX XMLCite \textit{V. Vitse} and \textit{A. Wallet}, Lect. Notes Comput. Sci. 9230, 295--307 (2015; Zbl 1370.94548) Full Text: DOI HAL
Kaya, Abidin; Yildiz, Bahattin; Siap, Irfan New extremal binary self-dual codes from \(\mathbb{F}_4 + u \mathbb{F}_4\)-lifts of quadratic circulant codes over \(\mathbb{F}_4\). (English) Zbl 1331.94068 Finite Fields Appl. 35, 318-329 (2015). MSC: 94B05 94B99 11T71 PDFBibTeX XMLCite \textit{A. Kaya} et al., Finite Fields Appl. 35, 318--329 (2015; Zbl 1331.94068) Full Text: DOI arXiv
Barbulescu, Razvan Selecting polynomials for the function field sieve. (English) Zbl 1326.11079 Math. Comput. 84, No. 296, 2987-3012 (2015). MSC: 11Y16 11T06 11T71 PDFBibTeX XMLCite \textit{R. Barbulescu}, Math. Comput. 84, No. 296, 2987--3012 (2015; Zbl 1326.11079) Full Text: DOI arXiv
Berthomieu, Jérémy; Faugère, Jean-Charles; Perret, Ludovic Polynomial-time algorithms for quadratic isomorphism of polynomials: the regular case. (English) Zbl 1338.94064 J. Complexity 31, No. 4, 590-616 (2015). MSC: 94A60 68W30 PDFBibTeX XMLCite \textit{J. Berthomieu} et al., J. Complexity 31, No. 4, 590--616 (2015; Zbl 1338.94064) Full Text: DOI arXiv HAL
Lee, Kwankyu Bounds for generalized Hamming weights of general AG codes. (English) Zbl 1392.94961 Finite Fields Appl. 34, 265-279 (2015). MSC: 94B65 94B27 94A62 PDFBibTeX XMLCite \textit{K. Lee}, Finite Fields Appl. 34, 265--279 (2015; Zbl 1392.94961) Full Text: DOI
Rifà, Josep; Solov’eva, Faina I.; Villanueva, Mercè Self-embeddings of Hamming Steiner triple systems of small order and APN permutations. (English) Zbl 1361.94060 Des. Codes Cryptography 75, No. 3, 405-427 (2015). MSC: 94B15 94A60 PDFBibTeX XMLCite \textit{J. Rifà} et al., Des. Codes Cryptography 75, No. 3, 405--427 (2015; Zbl 1361.94060) Full Text: DOI arXiv Link
Gorla, Elisa; Massierer, Maike Point compression for the trace zero subgroup over a small degree extension field. (English) Zbl 1319.14033 Des. Codes Cryptography 75, No. 2, 335-357 (2015). Reviewer: Guillermo Matera (Buenos Aires) MSC: 14G50 11G25 14H52 11T71 PDFBibTeX XMLCite \textit{E. Gorla} and \textit{M. Massierer}, Des. Codes Cryptography 75, No. 2, 335--357 (2015; Zbl 1319.14033) Full Text: DOI arXiv HAL
Han, Sunghyu A method for constructing self-dual codes over \(\mathbb {Z}_{2^m}\). (English) Zbl 1331.94066 Des. Codes Cryptography 75, No. 2, 253-262 (2015). MSC: 94B05 94B60 11T71 PDFBibTeX XMLCite \textit{S. Han}, Des. Codes Cryptography 75, No. 2, 253--262 (2015; Zbl 1331.94066) Full Text: DOI
Liu, Xiaogang; Luo, Yuan The weight distributions of a class of cyclic codes with three nonzeros over \(\mathbb{F}_3\). (English) Zbl 1442.94061 J. Appl. Math. 2014, Article ID 686138, 11 p. (2014). MSC: 94B15 11T71 94B65 PDFBibTeX XMLCite \textit{X. Liu} and \textit{Y. Luo}, J. Appl. Math. 2014, Article ID 686138, 11 p. (2014; Zbl 1442.94061) Full Text: DOI arXiv OA License
Kiyomura, Yutaro; Iwamoto, Noriyasu; Yokoyama, Shun’ichi; Hayasaka, Kenichiro; Wang, Yuntao; Yasuda, Takanori; Takashima, Katsuyuki; Takagi, Tsuyoshi Heuristic counting of Kachisa-Schaefer-Scott curves. (English) Zbl 1408.94940 JSIAM Lett. 6, 73-76 (2014). MSC: 94A60 14G50 11T71 PDFBibTeX XMLCite \textit{Y. Kiyomura} et al., JSIAM Lett. 6, 73--76 (2014; Zbl 1408.94940) Full Text: DOI
Aydin, Nuh; Murphree, John M. New linear codes from constacyclic codes. (English) Zbl 1395.94346 J. Franklin Inst. 351, No. 3, 1691-1699 (2014). MSC: 94B15 94B05 94B65 94Bxx 11T71 PDFBibTeX XMLCite \textit{N. Aydin} and \textit{J. M. Murphree}, J. Franklin Inst. 351, No. 3, 1691--1699 (2014; Zbl 1395.94346) Full Text: DOI
Zhang, Bin; Li, Zhenqi; Feng, Dengguo; Lin, Dongdai Near collision attack on the Grain v1 stream cipher. (English) Zbl 1321.94097 Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 518-538 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Zhang} et al., Lect. Notes Comput. Sci. 8424, 518--538 (2014; Zbl 1321.94097) Full Text: DOI
Akleylek, S.; Özbudak, F.; Özel, C. On the arithmetic operations over finite fields of characteristic three with low complexity. (English) Zbl 1338.94057 J. Comput. Appl. Math. 259, Part B, 546-554 (2014). Reviewer: Andreas Bender (Pavia) MSC: 94A60 11T06 11Y16 PDFBibTeX XMLCite \textit{S. Akleylek} et al., J. Comput. Appl. Math. 259, Part B, 546--554 (2014; Zbl 1338.94057) Full Text: DOI
Porras, Jaiberth; Baena, John; Ding, Jintai ZHFE, a new multivariate public key encryption scheme. (English) Zbl 1385.94065 Mosca, Michele (ed.), Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1–3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11658-7/pbk). Lecture Notes in Computer Science 8772, 229-245 (2014). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{J. Porras} et al., Lect. Notes Comput. Sci. 8772, 229--245 (2014; Zbl 1385.94065) Full Text: DOI
Faugère, Jean-Charles; Gaudry, Pierrick; Huot, Louise; Renault, Guénaël Using symmetries in the index calculus for elliptic curves discrete logarithm. (English) Zbl 1320.94063 J. Cryptology 27, No. 4, 595-635 (2014). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 94A60 14G50 14H52 PDFBibTeX XMLCite \textit{J.-C. Faugère} et al., J. Cryptology 27, No. 4, 595--635 (2014; Zbl 1320.94063) Full Text: DOI
Lee, Eunjeong; Lee, Hyang-Sook; Park, Cheol-Min Polynomial generating pairing and its criterion for optimal pairing. (English) Zbl 1342.11096 Appl. Algebra Eng. Commun. Comput. 25, No. 4, 227-247 (2014). MSC: 11T71 11G20 PDFBibTeX XMLCite \textit{E. Lee} et al., Appl. Algebra Eng. Commun. Comput. 25, No. 4, 227--247 (2014; Zbl 1342.11096) Full Text: DOI
Haque, Sardar Anisul; Li, Xin; Mansouri, Farnam; Maza, Marc Moreno; Pan, Wei; Xie, Ning Dense arithmetic over finite fields with the CUMODP library. (English) Zbl 1402.11143 Hong, Hoon (ed.) et al., Mathematical software – ICMS 2014. 4th international congress, Seoul, South Korea, August 5–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-44198-5/pbk). Lecture Notes in Computer Science 8592, 725-732 (2014). MSC: 11Txx 68W30 11-04 65Y05 PDFBibTeX XMLCite \textit{S. A. Haque} et al., Lect. Notes Comput. Sci. 8592, 725--732 (2014; Zbl 1402.11143) Full Text: DOI
Anbar, Nurdagül; Meidl, Wilfried Quadratic functions and maximal Artin-Schreier curves. (English) Zbl 1296.11074 Finite Fields Appl. 30, 49-71 (2014). MSC: 11G20 11E04 11T23 11T71 PDFBibTeX XMLCite \textit{N. Anbar} and \textit{W. Meidl}, Finite Fields Appl. 30, 49--71 (2014; Zbl 1296.11074) Full Text: DOI
Petit, Christophe Finding roots in \(\mathbb F_{p^n}\) with the successive resultants algorithm. (English) Zbl 1296.11166 LMS J. Comput. Math. 17A, Spec. Iss., 203-217 (2014). MSC: 11Y16 11T71 11T06 11T55 PDFBibTeX XMLCite \textit{C. Petit}, LMS J. Comput. Math. 17A, 203--217 (2014; Zbl 1296.11166) Full Text: DOI
Cao, Weiwei; Hu, Lei Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH. (English) Zbl 1308.94063 Des. Codes Cryptography 73, No. 3, 719-730 (2014). MSC: 94A60 94A62 12Y05 PDFBibTeX XMLCite \textit{W. Cao} and \textit{L. Hu}, Des. Codes Cryptography 73, No. 3, 719--730 (2014; Zbl 1308.94063) Full Text: DOI
Couvreur, Alain; Otmani, Ayoub; Tillich, Jean-Pierre New identities relating wild Goppa codes. (English) Zbl 1332.94097 Finite Fields Appl. 29, 178-197 (2014). MSC: 94B05 11T71 PDFBibTeX XMLCite \textit{A. Couvreur} et al., Finite Fields Appl. 29, 178--197 (2014; Zbl 1332.94097) Full Text: DOI arXiv HAL
Chen, BingLong; Zhao, Chang-An Self-pairings on supersingular elliptic curves with embedding degree three. (English) Zbl 1308.14038 Finite Fields Appl. 28, 79-93 (2014). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 14H52 11G20 94A60 PDFBibTeX XMLCite \textit{B. Chen} and \textit{C.-A. Zhao}, Finite Fields Appl. 28, 79--93 (2014; Zbl 1308.14038) Full Text: DOI
Couvreur, Alain; Gaborit, Philippe; Gauthier-Umaña, Valérie; Otmani, Ayoub; Tillich, Jean-Pierre Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes. (English) Zbl 1310.94138 Des. Codes Cryptography 73, No. 2, 641-666 (2014). MSC: 94A60 94B27 PDFBibTeX XMLCite \textit{A. Couvreur} et al., Des. Codes Cryptography 73, No. 2, 641--666 (2014; Zbl 1310.94138) Full Text: DOI arXiv
Bertolazzi, Enrico; Rimoldi, Anna Fast matrix decomposition in \(\mathbb F_2\). (English) Zbl 1293.65067 J. Comput. Appl. Math. 260, 519-532 (2014). MSC: 65F30 15A23 68Q25 94A60 PDFBibTeX XMLCite \textit{E. Bertolazzi} and \textit{A. Rimoldi}, J. Comput. Appl. Math. 260, 519--532 (2014; Zbl 1293.65067) Full Text: DOI arXiv
Durante, Nicola; Siciliano, Alessandro Some blocking semiovals of homology type in planes of square order. (English) Zbl 1294.05042 Des. Codes Cryptography 72, No. 1, 185-193 (2014). MSC: 05B25 51E20 51E21 94A60 PDFBibTeX XMLCite \textit{N. Durante} and \textit{A. Siciliano}, Des. Codes Cryptography 72, No. 1, 185--193 (2014; Zbl 1294.05042) Full Text: DOI
Couvreur, Alain; Otmani, Ayoub; Tillich, Jean-Pierre Polynomial time attack on wild McEliece over quadratic extensions. (English) Zbl 1326.94134 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 17-39 (2014). MSC: 94B05 94A60 94B25 12F05 68Q25 PDFBibTeX XMLCite \textit{A. Couvreur} et al., Lect. Notes Comput. Sci. 8441, 17--39 (2014; Zbl 1326.94134) Full Text: DOI arXiv
Boucher, Delphine; Ulmer, Felix Self-dual skew codes and factorization of skew polynomials. (English) Zbl 1332.94103 J. Symb. Comput. 60, 47-61 (2014). MSC: 94B15 11T71 PDFBibTeX XMLCite \textit{D. Boucher} and \textit{F. Ulmer}, J. Symb. Comput. 60, 47--61 (2014; Zbl 1332.94103) Full Text: DOI HAL
Momihara, Koji Certain strongly regular Cayley graphs on \(F_{2^{2(2s+1)}}\) from cyclotomy. (English) Zbl 1282.05223 Finite Fields Appl. 25, 280-292 (2014). MSC: 05E30 05C25 05B15 11T22 PDFBibTeX XMLCite \textit{K. Momihara}, Finite Fields Appl. 25, 280--292 (2014; Zbl 1282.05223) Full Text: DOI
Ahmadi, Omran; Granger, Robert An efficient deterministic test for Kloosterman sum zeros. (English) Zbl 1285.11146 Math. Comput. 83, No. 285, 347-363 (2014). MSC: 11T23 11L05 11G20 11T71 11Y16 PDFBibTeX XMLCite \textit{O. Ahmadi} and \textit{R. Granger}, Math. Comput. 83, No. 285, 347--363 (2014; Zbl 1285.11146) Full Text: DOI arXiv
Mahalanobis, Ayan Are matrices useful in public-key cryptography? (English) Zbl 1298.94097 Int. Math. Forum 8, No. 37-40, 1939-1953 (2013). MSC: 94A60 15B05 14G50 PDFBibTeX XMLCite \textit{A. Mahalanobis}, Int. Math. Forum 8, No. 37--40, 1939--1953 (2013; Zbl 1298.94097) Full Text: DOI
Korchmáros, Gábor; Nagy, Gábor Péter Lower bounds on the minimum distance in Hermitian one-point differential codes. (English) Zbl 1312.14074 Sci. China, Math. 56, No. 7, 1449-1455 (2013). Reviewer: Marco Calderini (Povo) MSC: 14G50 14H55 11T71 11G20 94B27 PDFBibTeX XMLCite \textit{G. Korchmáros} and \textit{G. P. Nagy}, Sci. China, Math. 56, No. 7, 1449--1455 (2013; Zbl 1312.14074) Full Text: DOI
Böckle, Gebhard The distribution of the zeros of the Goss zeta-function for \(A=\mathbb{F}_2[x,y]/(y^2+y+x^3+x+1)\). (English) Zbl 1282.11115 Math. Z. 275, No. 3-4, 835-861 (2013). MSC: 11M38 11G09 11T55 PDFBibTeX XMLCite \textit{G. Böckle}, Math. Z. 275, No. 3--4, 835--861 (2013; Zbl 1282.11115) Full Text: DOI
Özbudak, Ferruh; Gülmez Temür, Burcu; Yayla, Oğuz An exhaustive computer search for finding new curves with many points among fibre products of two Kummer covers over \(\mathbb F_{5}\) and \(\mathbb F_{7}\). (English) Zbl 1305.14013 Turk. J. Math. 37, No. 6, 908-913 (2013). MSC: 14G15 11G20 94A60 14Q05 PDFBibTeX XMLCite \textit{F. Özbudak} et al., Turk. J. Math. 37, No. 6, 908--913 (2013; Zbl 1305.14013) Full Text: Link
Korchmáros, Gabor; Nagy, G. P. Hermitian codes from higher degree places. (English) Zbl 1282.14057 J. Pure Appl. Algebra 217, No. 12, 2371-2381 (2013). Reviewer: Marco Calderini (Povo) MSC: 14H55 11T71 11G20 94B27 PDFBibTeX XMLCite \textit{G. Korchmáros} and \textit{G. P. Nagy}, J. Pure Appl. Algebra 217, No. 12, 2371--2381 (2013; Zbl 1282.14057) Full Text: DOI arXiv
Faugère, Jean-Charles; El Din, Mohab Safey; Spaenlehauer, Pierre-Jean On the complexity of the generalized MinRank problem. (English) Zbl 1302.13026 J. Symb. Comput. 55, 30-58 (2013). MSC: 13P10 68Q25 14M12 15A03 94A60 PDFBibTeX XMLCite \textit{J.-C. Faugère} et al., J. Symb. Comput. 55, 30--58 (2013; Zbl 1302.13026) Full Text: DOI arXiv
Freibert, Finley; Kim, Jon-Lark Optimal subcodes of formally self-dual codes and their optimum distance profiles. (English) Zbl 1283.94111 Appl. Algebra Eng. Commun. Comput. 24, No. 3-4, 215-224 (2013). MSC: 94B05 11T71 PDFBibTeX XMLCite \textit{F. Freibert} and \textit{J.-L. Kim}, Appl. Algebra Eng. Commun. Comput. 24, No. 3--4, 215--224 (2013; Zbl 1283.94111) Full Text: DOI
Flori, Jean-Pierre; Mesnager, Sihem An efficient characterization of a family of hyper-bent functions with multiple trace terms. (English) Zbl 1316.94136 J. Math. Cryptol. 7, No. 1, 43-68 (2013). MSC: 94C10 11T71 14G50 PDFBibTeX XMLCite \textit{J.-P. Flori} and \textit{S. Mesnager}, J. Math. Cryptol. 7, No. 1, 43--68 (2013; Zbl 1316.94136) Full Text: DOI HAL OA License
de la Cruz, Romar; Wang, Huaxiong Cheating-immune secret sharing schemes from codes and cumulative arrays. (English) Zbl 1335.94094 Cryptogr. Commun. 5, No. 1, 67-83 (2013). MSC: 94A62 94B05 PDFBibTeX XMLCite \textit{R. de la Cruz} and \textit{H. Wang}, Cryptogr. Commun. 5, No. 1, 67--83 (2013; Zbl 1335.94094) Full Text: DOI
Hernando, Fernando; Marshall, Kyle; O’Sullivan, Michael E. The dimension of subcode-subfields of shortened generalized Reed-Solomon codes. (English) Zbl 1301.94145 Des. Codes Cryptography 69, No. 1, 131-142 (2013). Reviewer: Adrian Atanasiu (Bucureşti) MSC: 94B15 11T22 11T55 11T71 68P30 14G50 12E20 PDFBibTeX XMLCite \textit{F. Hernando} et al., Des. Codes Cryptography 69, No. 1, 131--142 (2013; Zbl 1301.94145) Full Text: DOI arXiv
Munuera, C.; Sepúlveda, A.; Torres, F. Generalized Hermitian codes. (English) Zbl 1301.94154 Des. Codes Cryptography 69, No. 1, 123-130 (2013). Reviewer: Diego Ruano (Aalborg) MSC: 94B27 11T71 14G50 PDFBibTeX XMLCite \textit{C. Munuera} et al., Des. Codes Cryptography 69, No. 1, 123--130 (2013; Zbl 1301.94154) Full Text: DOI
Bettale, Luk; Faugère, Jean-Charles; Perret, Ludovic Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic. (English) Zbl 1307.13031 Des. Codes Cryptography 69, No. 1, 1-52 (2013). MSC: 13P10 94A60 14G50 PDFBibTeX XMLCite \textit{L. Bettale} et al., Des. Codes Cryptography 69, No. 1, 1--52 (2013; Zbl 1307.13031) Full Text: DOI HAL
Cooley, Jenny Generators for cubic surfaces with two skew lines over finite fields. (English) Zbl 1300.14026 Arch. Math. 100, No. 5, 401-411 (2013). Reviewer: Francisco Monserrat (Valencia) MSC: 14G05 11G35 14J26 11T99 PDFBibTeX XMLCite \textit{J. Cooley}, Arch. Math. 100, No. 5, 401--411 (2013; Zbl 1300.14026) Full Text: DOI arXiv
Chand Gupta, Kishan; Ghosh Ray, Indranil On constructions of involutory MDS matrices. (English) Zbl 1312.94038 Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 43-60 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Chand Gupta} and \textit{I. Ghosh Ray}, Lect. Notes Comput. Sci. 7918, 43--60 (2013; Zbl 1312.94038) Full Text: DOI
Graepel, Thore; Lauter, Kristin; Naehrig, Michael ML confidential: machine learning on encrypted data. (English) Zbl 1293.68110 Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 1-21 (2013). MSC: 68P25 94A60 68T05 PDFBibTeX XMLCite \textit{T. Graepel} et al., Lect. Notes Comput. Sci. 7839, 1--21 (2013; Zbl 1293.68110) Full Text: DOI
Feulner, Thomas; Sok, Lin; Solé, Patrick; Wassermann, Alfred Towards the classification of self-dual bent functions in eight variables. (English) Zbl 1280.94053 Des. Codes Cryptography 68, No. 1-3, 395-406 (2013). MSC: 94A60 05B20 06E30 65K05 94B05 PDFBibTeX XMLCite \textit{T. Feulner} et al., Des. Codes Cryptography 68, No. 1--3, 395--406 (2013; Zbl 1280.94053) Full Text: DOI
Lauter, Kristin; Shang, Ning Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields. (English) Zbl 1277.11069 Des. Codes Cryptography 67, No. 3, 341-355 (2013). MSC: 11G20 14G50 94A60 PDFBibTeX XMLCite \textit{K. Lauter} and \textit{N. Shang}, Des. Codes Cryptography 67, No. 3, 341--355 (2013; Zbl 1277.11069) Full Text: DOI
Joux, Antoine; Vitse, Vanessa Elliptic curve discrete logarithm problem over small degree extension fields. (English) Zbl 1291.94107 J. Cryptology 26, No. 1, 119-143 (2013). MSC: 94A60 14G50 11T71 PDFBibTeX XMLCite \textit{A. Joux} and \textit{V. Vitse}, J. Cryptology 26, No. 1, 119--143 (2013; Zbl 1291.94107) Full Text: DOI
Guillevic, Aurore; Vergnaud, Damien Genus 2 hyperelliptic curve families with explicit Jacobian order evaluation and pairing-friendly constructions. (English) Zbl 1305.94053 Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 234-253 (2013). MSC: 94A60 14G50 68W40 PDFBibTeX XMLCite \textit{A. Guillevic} and \textit{D. Vergnaud}, Lect. Notes Comput. Sci. 7708, 234--253 (2013; Zbl 1305.94053) Full Text: DOI
Göloğlu, Faruk; McGuire, Gary; Moloney, Richard Some congruences of Kloosterman sums and their characteristic polynomials. (English) Zbl 1300.11083 J. Number Theory 133, No. 5, 1596-1607 (2013). MSC: 11L05 11T23 PDFBibTeX XMLCite \textit{F. Göloğlu} et al., J. Number Theory 133, No. 5, 1596--1607 (2013; Zbl 1300.11083) Full Text: DOI
Gao, Shuhong; Heindl, Raymond Multivariate public key cryptosystems from Diophantine equations. (English) Zbl 1286.94068 Des. Codes Cryptography 67, No. 1, 1-18 (2013). MSC: 94A60 11T71 13P10 PDFBibTeX XMLCite \textit{S. Gao} and \textit{R. Heindl}, Des. Codes Cryptography 67, No. 1, 1--18 (2013; Zbl 1286.94068) Full Text: DOI
Han, Sunghyu; Kim, Jon-Lark Computational results of duadic double circulant codes. (English) Zbl 1381.94117 J. Appl. Math. Comput. 40, No. 1-2, 33-43 (2012). MSC: 94B05 11T71 PDFBibTeX XMLCite \textit{S. Han} and \textit{J.-L. Kim}, J. Appl. Math. Comput. 40, No. 1--2, 33--43 (2012; Zbl 1381.94117) Full Text: DOI arXiv
Diem, Claus On the use of expansion series for stream ciphers. (English) Zbl 1344.11086 LMS J. Comput. Math. 15, 326-340 (2012). MSC: 11Y16 11T71 14G50 68Q25 94A60 PDFBibTeX XMLCite \textit{C. Diem}, LMS J. Comput. Math. 15, 326--340 (2012; Zbl 1344.11086) Full Text: DOI
Kalka, Arkadius; Teicher, Mina; Tsaban, Boaz Short expressions of permutations as products and cryptanalysis of the algebraic eraser. (English) Zbl 1272.94040 Adv. Appl. Math. 49, No. 1, 57-76 (2012). MSC: 94A60 20B30 20B40 PDFBibTeX XMLCite \textit{A. Kalka} et al., Adv. Appl. Math. 49, No. 1, 57--76 (2012; Zbl 1272.94040) Full Text: DOI arXiv
Joux, Antoine; Vitse, Vanessa Cover and decomposition index calculus on elliptic curves made practical. Application to a previously unreachable curve over \(\mathbb{F}_{p^6}\). (English) Zbl 1290.94097 Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 9-26 (2012). MSC: 94A60 11T71 14G50 PDFBibTeX XMLCite \textit{A. Joux} and \textit{V. Vitse}, Lect. Notes Comput. Sci. 7237, 9--26 (2012; Zbl 1290.94097) Full Text: DOI
Krause, Matthias; Hamann, Matthias The cryptographic power of random selection. (English) Zbl 1292.94096 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 134-150 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Krause} and \textit{M. Hamann}, Lect. Notes Comput. Sci. 7118, 134--150 (2012; Zbl 1292.94096) Full Text: DOI
De Feo, Luca; Schost, Éric Fast arithmetics in Artin-Schreier towers over finite fields. (English) Zbl 1267.11126 J. Symb. Comput. 47, No. 7, 771-792 (2012). MSC: 11Y16 11T30 12E20 68Q25 68W30 68W40 PDFBibTeX XMLCite \textit{L. De Feo} and \textit{É. Schost}, J. Symb. Comput. 47, No. 7, 771--792 (2012; Zbl 1267.11126) Full Text: DOI
Jia, Yan On quasi-twisted codes over finite fields. (English) Zbl 1248.94116 Finite Fields Appl. 18, No. 2, 237-257 (2012). MSC: 94B05 11T71 94B15 PDFBibTeX XMLCite \textit{Y. Jia}, Finite Fields Appl. 18, No. 2, 237--257 (2012; Zbl 1248.94116) Full Text: DOI
Lee, Hyang-Sook; Park, Cheol-Min Constructing pairing-friendly curves with variable CM discriminant. (English) Zbl 1323.11045 Bull. Korean Math. Soc. 49, No. 1, 75-88 (2012). MSC: 11G20 11T71 14G15 14G50 94A60 PDFBibTeX XMLCite \textit{H.-S. Lee} and \textit{C.-M. Park}, Bull. Korean Math. Soc. 49, No. 1, 75--88 (2012; Zbl 1323.11045) Full Text: DOI
Beelen, Peter; Leander, Gregor A new construction of highly nonlinear S-boxes. (English) Zbl 1277.94013 Cryptogr. Commun. 4, No. 1, 65-77 (2012). MSC: 94A60 06E30 65T50 94B05 94B65 PDFBibTeX XMLCite \textit{P. Beelen} and \textit{G. Leander}, Cryptogr. Commun. 4, No. 1, 65--77 (2012; Zbl 1277.94013) Full Text: DOI
Rifà, J.; Solov’eva, F. I.; Villanueva, M. Intersection of Hamming codes avoiding Hamming subcodes. (English) Zbl 1235.94068 Des. Codes Cryptography 62, No. 2, 209-223 (2012). MSC: 94B25 05B25 14G50 94A60 PDFBibTeX XMLCite \textit{J. Rifà} et al., Des. Codes Cryptography 62, No. 2, 209--223 (2012; Zbl 1235.94068) Full Text: DOI
Tang, Chunming; Xu, Maozhi; Qi, Yanfeng Faster pairing computation on genus \(2\) hyperelliptic curves. (English) Zbl 1260.94057 Inf. Process. Lett. 111, No. 10, 494-499 (2011). MSC: 94A60 68W40 PDFBibTeX XMLCite \textit{C. Tang} et al., Inf. Process. Lett. 111, No. 10, 494--499 (2011; Zbl 1260.94057) Full Text: DOI
Bouillaguet, Charles; Fouque, Pierre-Alain; Joux, Antoine; Treger, Joana A family of weak keys in HFE and the corresponding practical key-recovery. (English) Zbl 1251.94023 J. Math. Cryptol. 5, No. 3-4, 247-275 (2011). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{C. Bouillaguet} et al., J. Math. Cryptol. 5, No. 3--4, 247--275 (2011; Zbl 1251.94023) Full Text: DOI OA License
Hernando, Fernando; McGuire, Gary Proof of a conjecture on the sequence of exceptional numbers, classifying cyclic codes and APN functions. (English) Zbl 1244.94046 J. Algebra 343, No. 1, 78-92 (2011). Reviewer: Sergey Stepanov (Moskva) MSC: 94B15 11T71 94A60 PDFBibTeX XMLCite \textit{F. Hernando} and \textit{G. McGuire}, J. Algebra 343, No. 1, 78--92 (2011; Zbl 1244.94046) Full Text: DOI arXiv
Albrecht, Martin R.; Paterson, Kenneth G. Breaking an identity-based encryption scheme based on DHIES. (English) Zbl 1291.94042 Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 344-355 (2011). MSC: 94A60 13P10 PDFBibTeX XMLCite \textit{M. R. Albrecht} and \textit{K. G. Paterson}, Lect. Notes Comput. Sci. 7089, 344--355 (2011; Zbl 1291.94042) Full Text: DOI
Otmani, Ayoub; Tillich, Jean-Pierre An efficient attack on all concrete KKS proposals. (English) Zbl 1298.94100 Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 98-116 (2011). MSC: 94A60 81P94 94A62 PDFBibTeX XMLCite \textit{A. Otmani} and \textit{J.-P. Tillich}, Lect. Notes Comput. Sci. 7071, 98--116 (2011; Zbl 1298.94100) Full Text: DOI HAL
Cenk, Murat; Özbudak, Ferruh Efficient multiplications in \(\mathbb F_5^{5n}\) and \(\mathbb F_7^{7n}\). (English) Zbl 1247.11150 J. Comput. Appl. Math. 236, No. 2, 177-183 (2011). MSC: 11Y16 11T99 12E20 68W30 PDFBibTeX XMLCite \textit{M. Cenk} and \textit{F. Özbudak}, J. Comput. Appl. Math. 236, No. 2, 177--183 (2011; Zbl 1247.11150) Full Text: DOI
Guo, Jian; Peyrin, Thomas; Poschmann, Axel The PHOTON family of lightweight hash functions. (English) Zbl 1287.94069 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 222-239 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Guo} et al., Lect. Notes Comput. Sci. 6841, 222--239 (2011; Zbl 1287.94069) Full Text: DOI
Kim, Heon; van Wamelen, Paul; Verrill, Helena A. Infinite class of new sign ambiguities. (English) Zbl 1262.11080 J. Number Theory 131, No. 10, 1808-1823 (2011). MSC: 11L05 11T24 PDFBibTeX XMLCite \textit{H. Kim} et al., J. Number Theory 131, No. 10, 1808--1823 (2011; Zbl 1262.11080) Full Text: DOI
Koukouvinos, Christos; Simos, Dimitris E.; Varbanov, Zlatko Hadamard matrices, designs and their secret-sharing schemes. (English) Zbl 1282.94053 Winkler, Franz (ed.), Algebraic informatics. 4th international conference, CAI 2011, Linz, Austria, June 21–24, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21492-9/pbk). Lecture Notes in Computer Science 6742, 216-229 (2011). MSC: 94A60 05B05 05B20 PDFBibTeX XMLCite \textit{C. Koukouvinos} et al., Lect. Notes Comput. Sci. 6742, 216--229 (2011; Zbl 1282.94053) Full Text: DOI
Wang, Meiqin; Sun, Yue; Mouha, Nicky; Preneel, Bart Algebraic techniques in differential cryptanalysis revisited. (English) Zbl 1295.94149 Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 120-141 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Wang} et al., Lect. Notes Comput. Sci. 6812, 120--141 (2011; Zbl 1295.94149) Full Text: DOI Link
Freeman, David Mandell; Satoh, Takakazu Constructing pairing-friendly hyperelliptic curves using Weil restriction. (English) Zbl 1245.11075 J. Number Theory 131, No. 5, 959-983 (2011). Reviewer: Michael J. Jacobson jun. (Calgary) MSC: 11G20 14G15 14G50 94A60 PDFBibTeX XMLCite \textit{D. M. Freeman} and \textit{T. Satoh}, J. Number Theory 131, No. 5, 959--983 (2011; Zbl 1245.11075) Full Text: DOI
De Feo, Luca Fast algorithms for computing isogenies between ordinary elliptic curves in small characteristic. (English) Zbl 1223.14049 J. Number Theory 131, No. 5, 873-893 (2011). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 14K02 14H52 11G20 11Y16 94A60 PDFBibTeX XMLCite \textit{L. De Feo}, J. Number Theory 131, No. 5, 873--893 (2011; Zbl 1223.14049) Full Text: DOI arXiv
Lisoněk, Petr; Moisio, Marko On zeros of Kloosterman sums. (English) Zbl 1218.11112 Des. Codes Cryptography 59, No. 1-3, 223-230 (2011). Reviewer: Sergey Stepanov (Moskva) MSC: 11T24 11L05 94A60 94A55 PDFBibTeX XMLCite \textit{P. Lisoněk} and \textit{M. Moisio}, Des. Codes Cryptography 59, No. 1--3, 223--230 (2011; Zbl 1218.11112) Full Text: DOI
Grassl, Markus; Ilić, Ivana; Magliveras, Spyros; Steinwandt, Rainer Cryptanalysis of the Tillich-Zémor hash function. (English) Zbl 1209.94040 J. Cryptology 24, No. 1, 148-156 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Grassl} et al., J. Cryptology 24, No. 1, 148--156 (2011; Zbl 1209.94040) Full Text: DOI
Bouillaguet, Charles; Faugère, Jean-Charles; Fouque, Pierre-Alain; Perret, Ludovic Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem. (English) Zbl 1291.94062 Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 473-493 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Bouillaguet} et al., Lect. Notes Comput. Sci. 6571, 473--493 (2011; Zbl 1291.94062) Full Text: DOI
Bettale, Luk; Faugère, Jean-Charles; Perret, Ludovic Cryptanalysis of multivariate and odd-characteristic HFE variants. (English) Zbl 1291.94058 Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 441-458 (2011). MSC: 94A60 13P10 PDFBibTeX XMLCite \textit{L. Bettale} et al., Lect. Notes Comput. Sci. 6571, 441--458 (2011; Zbl 1291.94058) Full Text: DOI
Zhao, Chang-An; Xie, Dongqing; Zhang, Fangguo; Zhang, Jingwei; Chen, Bing-Long Computing bilinear pairings on elliptic curves with automorphisms. (English) Zbl 1210.14033 Des. Codes Cryptography 58, No. 1, 35-44 (2011). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 14H52 14Q05 11G20 94A60 PDFBibTeX XMLCite \textit{C.-A. Zhao} et al., Des. Codes Cryptography 58, No. 1, 35--44 (2011; Zbl 1210.14033) Full Text: DOI
Joux, Antoine; Vitse, Vanessa A variant of the F4 algorithm. (English) Zbl 1272.94039 Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 356-375 (2011). MSC: 94A60 13P10 PDFBibTeX XMLCite \textit{A. Joux} and \textit{V. Vitse}, Lect. Notes Comput. Sci. 6558, 356--375 (2011; Zbl 1272.94039) Full Text: DOI
Davis, Jennifer A. Algebraic geometric codes on anticanonical surfaces. (English) Zbl 1205.14029 J. Pure Appl. Algebra 215, No. 4, 496-510 (2011). Reviewer: Fernando Hernando (Cork) MSC: 14G50 94B27 11T71 PDFBibTeX XMLCite \textit{J. A. Davis}, J. Pure Appl. Algebra 215, No. 4, 496--510 (2011; Zbl 1205.14029) Full Text: DOI Link
Beelen, Peter; Brander, Kristian Efficient list decoding of a class of algebraic-geometry codes. (English) Zbl 1222.94045 Adv. Math. Commun. 4, No. 4, 485-518 (2010). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 94B35 11T71 14G50 94B27 PDFBibTeX XMLCite \textit{P. Beelen} and \textit{K. Brander}, Adv. Math. Commun. 4, No. 4, 485--518 (2010; Zbl 1222.94045) Full Text: DOI
Bulygin, Stanislav; Brickenstein, Michael Obtaining and solving systems of equations in key variables only for the small variants of AES. (English) Zbl 1205.94076 Math. Comput. Sci. 3, No. 2, 185-200 (2010). MSC: 94A60 13P10 13P15 PDFBibTeX XMLCite \textit{S. Bulygin} and \textit{M. Brickenstein}, Math. Comput. Sci. 3, No. 2, 185--200 (2010; Zbl 1205.94076) Full Text: DOI
Duquesne, Sylvain Traces of the group law on the Kummer surface of a curve of genus 2 in characteristic 2. (English) Zbl 1205.14030 Math. Comput. Sci. 3, No. 2, 173-183 (2010). MSC: 14G50 14G17 11G25 94A60 PDFBibTeX XMLCite \textit{S. Duquesne}, Math. Comput. Sci. 3, No. 2, 173--183 (2010; Zbl 1205.14030) Full Text: DOI
Eibach, Tobias; Völkel, Gunnar; Pilz, Enrico Optimising Gröbner bases on Bivium. (English) Zbl 1205.94081 Math. Comput. Sci. 3, No. 2, 159-172 (2010). MSC: 94A60 13P10 13-04 PDFBibTeX XMLCite \textit{T. Eibach} et al., Math. Comput. Sci. 3, No. 2, 159--172 (2010; Zbl 1205.94081) Full Text: DOI
Otmani, Ayoub; Tillich, Jean-Pierre; Dallot, Léonard Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes. (English) Zbl 1205.94095 Math. Comput. Sci. 3, No. 2, 129-140 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Otmani} et al., Math. Comput. Sci. 3, No. 2, 129--140 (2010; Zbl 1205.94095) Full Text: DOI arXiv
Sharifi, Alireza; Mehrabi, Esmaeil; Eghlidos, Taraneh; Aref, Mohammadreza Algebraic attacks from a Groebner basis perspective. (English) Zbl 1205.94099 Int. J. Algebra 4, No. 9-12, 447-459 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Sharifi} et al., Int. J. Algebra 4, No. 9--12, 447--459 (2010; Zbl 1205.94099) Full Text: Link
Geiselmann, Willi; Matheis, Kenneth; Steinwandt, Rainer PET SNAKE: a special purpose architecture to implement an algebraic attack in hardware. (English) Zbl 1366.94495 Gavrilova, Marina L. (ed.) et al., Transactions on Computational Science X. Special issue on security in computing, Part I. Berlin: Springer (ISBN 978-3-642-17498-8/pbk). Lecture Notes in Computer Science 6340. Journal Subline, 298-328 (2010). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{W. Geiselmann} et al., Lect. Notes Comput. Sci. 6340, 298--328 (2010; Zbl 1366.94495) Full Text: DOI
Petzoldt, Albrecht; Bulygin, Stanislav; Buchmann, Johannes Cyclicrainbow – a multivariate signature scheme with a partially cyclic public key. (English) Zbl 1294.94069 Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 33-48 (2010). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. Petzoldt} et al., Lect. Notes Comput. Sci. 6498, 33--48 (2010; Zbl 1294.94069) Full Text: DOI
Granger, Robert On the static Diffie-Hellman problem on elliptic curves over extension fields. (English) Zbl 1290.94079 Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 283-302 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Granger}, Lect. Notes Comput. Sci. 6477, 283--302 (2010; Zbl 1290.94079) Full Text: DOI
Kammerer, Jean-Gabriel; Lercier, Reynald; Renault, Guénaël Encoding points on hyperelliptic curves over finite fields in deterministic polynomial time. (English) Zbl 1290.94100 Joye, Marc (ed.) et al., Pairing-based cryptography – Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17454-4/pbk). Lecture Notes in Computer Science 6487, 278-297 (2010). MSC: 94A60 12F10 14G50 PDFBibTeX XMLCite \textit{J.-G. Kammerer} et al., Lect. Notes Comput. Sci. 6487, 278--297 (2010; Zbl 1290.94100) Full Text: DOI arXiv
Coulter, Robert S.; Matthews, Rex W. Dembowski-Ostrom polynomials from Dickson polynomials. (English) Zbl 1254.11109 Finite Fields Appl. 16, No. 5, 369-379 (2010). MSC: 11T06 PDFBibTeX XMLCite \textit{R. S. Coulter} and \textit{R. W. Matthews}, Finite Fields Appl. 16, No. 5, 369--379 (2010; Zbl 1254.11109) Full Text: DOI
Nagao, Koh-ichi Decomposition attack for the Jacobian of a hyperelliptic curve over an extension field. (English) Zbl 1260.11045 Hanrot, Guillaume (ed.) et al., Algorithmic number theory. 9th international symposium, ANTS-IX, Nancy, France, July 19–23, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14517-9/pbk). Lecture Notes in Computer Science 6197, 285-300 (2010). MSC: 11G20 11Y16 14Q05 94A60 PDFBibTeX XMLCite \textit{K.-i. Nagao}, Lect. Notes Comput. Sci. 6197, 285--300 (2010; Zbl 1260.11045) Full Text: DOI