×

Found 164 Documents (Results 1–100)

Revisiting the complex multiplication method for the construction of elliptic curves. (English) Zbl 1368.11135

Daras, Nicholas J. (ed.) et al., Computation, cryptography, and network security. Cham: Springer (ISBN 978-3-319-18274-2/hbk; 978-3-319-18275-9/ebook). 299-318 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Computing discrete logarithms in \(\mathbb F_{3^{6 \cdot 137}}\) and \(\mathbb F_{3^{6 \cdot 163}}\) using Magma. (English) Zbl 1400.11161

Koç, Çetin Kaya (ed.) et al., Arithmetic of finite fields. 5th international workshop, WAIFI 2014, Gebze, Turkey, September 27–28, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-319-16276-8/pbk). Lecture Notes in Computer Science 9061, 3-22 (2015).
MSC:  11Y16 11T71 94A60
PDFBibTeX XMLCite
Full Text: DOI

Attacking a binary GLS elliptic curve with Magma. (English) Zbl 1370.94498

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 308-326 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Improved sieving on algebraic curves. (English) Zbl 1370.94548

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 295-307 (2015).
MSC:  94A60 11T71 14G50
PDFBibTeX XMLCite
Full Text: DOI HAL

Near collision attack on the Grain v1 stream cipher. (English) Zbl 1321.94097

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 518-538 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

ZHFE, a new multivariate public key encryption scheme. (English) Zbl 1385.94065

Mosca, Michele (ed.), Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1–3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11658-7/pbk). Lecture Notes in Computer Science 8772, 229-245 (2014).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Dense arithmetic over finite fields with the CUMODP library. (English) Zbl 1402.11143

Hong, Hoon (ed.) et al., Mathematical software – ICMS 2014. 4th international congress, Seoul, South Korea, August 5–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-44198-5/pbk). Lecture Notes in Computer Science 8592, 725-732 (2014).
PDFBibTeX XMLCite
Full Text: DOI

Polynomial time attack on wild McEliece over quadratic extensions. (English) Zbl 1326.94134

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 17-39 (2014).
PDFBibTeX XMLCite
Full Text: DOI arXiv

On constructions of involutory MDS matrices. (English) Zbl 1312.94038

Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 43-60 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

ML confidential: machine learning on encrypted data. (English) Zbl 1293.68110

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 1-21 (2013).
MSC:  68P25 94A60 68T05
PDFBibTeX XMLCite
Full Text: DOI

Genus 2 hyperelliptic curve families with explicit Jacobian order evaluation and pairing-friendly constructions. (English) Zbl 1305.94053

Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 234-253 (2013).
MSC:  94A60 14G50 68W40
PDFBibTeX XMLCite
Full Text: DOI

Cover and decomposition index calculus on elliptic curves made practical. Application to a previously unreachable curve over \(\mathbb{F}_{p^6}\). (English) Zbl 1290.94097

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 9-26 (2012).
MSC:  94A60 11T71 14G50
PDFBibTeX XMLCite
Full Text: DOI

The cryptographic power of random selection. (English) Zbl 1292.94096

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 134-150 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Breaking an identity-based encryption scheme based on DHIES. (English) Zbl 1291.94042

Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 344-355 (2011).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

An efficient attack on all concrete KKS proposals. (English) Zbl 1298.94100

Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 98-116 (2011).
MSC:  94A60 81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI HAL

The PHOTON family of lightweight hash functions. (English) Zbl 1287.94069

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 222-239 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Hadamard matrices, designs and their secret-sharing schemes. (English) Zbl 1282.94053

Winkler, Franz (ed.), Algebraic informatics. 4th international conference, CAI 2011, Linz, Austria, June 21–24, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21492-9/pbk). Lecture Notes in Computer Science 6742, 216-229 (2011).
MSC:  94A60 05B05 05B20
PDFBibTeX XMLCite
Full Text: DOI

Algebraic techniques in differential cryptanalysis revisited. (English) Zbl 1295.94149

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 120-141 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem. (English) Zbl 1291.94062

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 473-493 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of multivariate and odd-characteristic HFE variants. (English) Zbl 1291.94058

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 441-458 (2011).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

A variant of the F4 algorithm. (English) Zbl 1272.94039

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 356-375 (2011).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

PET SNAKE: a special purpose architecture to implement an algebraic attack in hardware. (English) Zbl 1366.94495

Gavrilova, Marina L. (ed.) et al., Transactions on Computational Science X. Special issue on security in computing, Part I. Berlin: Springer (ISBN 978-3-642-17498-8/pbk). Lecture Notes in Computer Science 6340. Journal Subline, 298-328 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cyclicrainbow – a multivariate signature scheme with a partially cyclic public key. (English) Zbl 1294.94069

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 33-48 (2010).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On the static Diffie-Hellman problem on elliptic curves over extension fields. (English) Zbl 1290.94079

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 283-302 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Encoding points on hyperelliptic curves over finite fields in deterministic polynomial time. (English) Zbl 1290.94100

Joye, Marc (ed.) et al., Pairing-based cryptography – Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17454-4/pbk). Lecture Notes in Computer Science 6487, 278-297 (2010).
MSC:  94A60 12F10 14G50
PDFBibTeX XMLCite
Full Text: DOI arXiv

Decomposition attack for the Jacobian of a hyperelliptic curve over an extension field. (English) Zbl 1260.11045

Hanrot, Guillaume (ed.) et al., Algorithmic number theory. 9th international symposium, ANTS-IX, Nancy, France, July 19–23, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14517-9/pbk). Lecture Notes in Computer Science 6197, 285-300 (2010).
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software