Results 1  10
of
12
Design and Analysis of Practical PublicKey Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
 SIAM Journal on Computing
, 2001
"... A new public key encryption scheme, along with several variants, is proposed and analyzed. The scheme and its variants are quite practical, and are proved secure against adaptive chosen ciphertext attack under standard intractability assumptions. These appear to be the first publickey encryption sc ..."
Abstract

Cited by 231 (11 self)
 Add to MetaCart
A new public key encryption scheme, along with several variants, is proposed and analyzed. The scheme and its variants are quite practical, and are proved secure against adaptive chosen ciphertext attack under standard intractability assumptions. These appear to be the first publickey encryption schemes in the literature that are simultaneously practical and provably secure.
Signature Schemes Based on the Strong RSA Assumption
 ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY
, 1998
"... We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not require the the signer to maintain any state, and can be proven secure against adaptive chosen message attack under a reasonable intractability assumption, the socalled Strong RSA Assumption. Moreove ..."
Abstract

Cited by 180 (8 self)
 Add to MetaCart
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not require the the signer to maintain any state, and can be proven secure against adaptive chosen message attack under a reasonable intractability assumption, the socalled Strong RSA Assumption. Moreover, a hash function can be incorporated into the scheme in such a way that it is also secure in the random oracle model under the standard RSA Assumption.
Prime specialization in genus 0
 Trans. Amer. Math. Soc
"... Abstract. For a prime polynomial f(T) ∈ Z[T], a classical conjecture predicts how often f has prime values. For a finite field κ and a prime polynomial f(T) ∈ κ[u][T], the natural analogue of this conjecture (a prediction for how often f takes prime values on κ[u]) is not generally true when f(T)i ..."
Abstract

Cited by 8 (2 self)
 Add to MetaCart
(Show Context)
Abstract. For a prime polynomial f(T) ∈ Z[T], a classical conjecture predicts how often f has prime values. For a finite field κ and a prime polynomial f(T) ∈ κ[u][T], the natural analogue of this conjecture (a prediction for how often f takes prime values on κ[u]) is not generally true when f(T)isapolynomial in T p (p the characteristic of κ). The explanation rests on a new global obstruction which can be measured by an appropriate average of the nonzero Möbius values µ(f(g)) as g varies. We prove the surprising fact that this “Möbius average, ” which can be defined without reference to any conjectures, has a periodic behavior governed by the geometry of the plane curve f =0. The periodic Möbius average behavior implies in specific examples that a polynomial in κ[u][T] does not take prime values as often as analogies with Z[T] suggest, and it leads to a modified conjecture for how often prime values occur. 1.
Largest known twin primes and Sophie Germain primes
 Math. Comp
, 1999
"... Abstract. The numbers 242206083 · 2 38880 ± 1 are twin primes. The number ..."
Abstract

Cited by 7 (0 self)
 Add to MetaCart
Abstract. The numbers 242206083 · 2 38880 ± 1 are twin primes. The number
AVERAGE PRIMEPAIR COUNTING FORMULA
, 902
"... Abstract. Taking r> 0, let π2r(x) denote the number of prime pairs (p, p + 2r) with p ≤ x. The primepair conjecture of Hardy and Littlewood (1923) asserts that π2r(x) ∼ 2C2r li2(x) with an explicit constant C2r> 0. There seems to be no good conjecture for the remainders ω2r(x) = π2r(x)−2C2r ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
(Show Context)
Abstract. Taking r> 0, let π2r(x) denote the number of prime pairs (p, p + 2r) with p ≤ x. The primepair conjecture of Hardy and Littlewood (1923) asserts that π2r(x) ∼ 2C2r li2(x) with an explicit constant C2r> 0. There seems to be no good conjecture for the remainders ω2r(x) = π2r(x)−2C2r li2(x) that corresponds to Riemann’s formula for π(x) −li(x). However, there is a heuristic approximate formula for averages of the remainders ω2r(x) which is supported by numerical results. 1.
A generalization of a conjecture of hardy and littlewood to algebraic number fields
 Rocky Mountain J. Math
"... Abstract. We generalize conjectures of Hardy and Littlewood concerning the density of twin primes and ktuples of primes to arbitrary algebraic number fields. In one of their great Partitio Numerorum papers [7], Hardy and Littlewood advance a number of conjectures involving the density of pairs and ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
(Show Context)
Abstract. We generalize conjectures of Hardy and Littlewood concerning the density of twin primes and ktuples of primes to arbitrary algebraic number fields. In one of their great Partitio Numerorum papers [7], Hardy and Littlewood advance a number of conjectures involving the density of pairs and ktuples of primes separated by fixed gaps. For example, if d is even, we define Pd(x) = {0 < n < x: n, n + d are both prime}. They conjecture both that and that P2(x) is asymptotic to 2 ∏ p>2 Pd(x) ∏ p − 1 lim = x→ ∞ P2(x) p − 2 odd pd
with the BrezingWeng Method
, 2008
"... Abstract. The BrezingWeng method is a general framework to generate families of pairingfriendly elliptic curves. Here, we introduce an improvement which can be used to generate more curves with larger discriminants. Apart from the number of curves this yields, it provides an easy way to avoid endo ..."
Abstract
 Add to MetaCart
(Show Context)
Abstract. The BrezingWeng method is a general framework to generate families of pairingfriendly elliptic curves. Here, we introduce an improvement which can be used to generate more curves with larger discriminants. Apart from the number of curves this yields, it provides an easy way to avoid endomorphism rings with small class number. Keywords: Pairingfriendly curve generation, BrezingWeng method. 1
More Discriminants with the BrezingWeng Method
"... Abstract. The BrezingWeng method is a general framework to generate families of pairingfriendly elliptic curves. Here, we introduce an improvement which can be used to generate more curves with larger discriminants. Apart from the number of curves this yields, it provides an easy way to avoid endo ..."
Abstract
 Add to MetaCart
(Show Context)
Abstract. The BrezingWeng method is a general framework to generate families of pairingfriendly elliptic curves. Here, we introduce an improvement which can be used to generate more curves with larger discriminants. Apart from the number of curves this yields, it provides an easy way to avoid endomorphism rings with small class number. Keywords: Pairingfriendly curve generation, BrezingWeng method. 1
MEAN VALUE ONE OF PRIMEPAIR CONSTANTS
, 2008
"... For k> 1, r = 0 and large x, let πk 2r (x) denote the number of prime pairs (p, pk +2r) with p ≤ x. By the Bateman–Horn conjecture the function πk 2r(x) should be asymptotic to (2/k)Ck 2rli2(x), with certain specific constants Ck 2r. Heuristic arguments lead to the conjecture that these constan ..."
Abstract
 Add to MetaCart
For k> 1, r = 0 and large x, let πk 2r (x) denote the number of prime pairs (p, pk +2r) with p ≤ x. By the Bateman–Horn conjecture the function πk 2r(x) should be asymptotic to (2/k)Ck 2rli2(x), with certain specific constants Ck 2r. Heuristic arguments lead to the conjecture that these constants have mean value one, just like the Hardy–Littlewood constants C2r for prime pairs (p, p + 2r). The conjecture is supported by extensive numerical work.
sous la direction de
"... Analyse, arithmétique et géométrie Pairings were first studied as potential attacks on elliptic curvebased cryptography. Recently, protocols have been proposed that make a constructive use of pairings; they require pairingfriendly elliptic curves, that is elliptic curves with large prime order sub ..."
Abstract
 Add to MetaCart
Analyse, arithmétique et géométrie Pairings were first studied as potential attacks on elliptic curvebased cryptography. Recently, protocols have been proposed that make a constructive use of pairings; they require pairingfriendly elliptic curves, that is elliptic curves with large prime order subgroup and efficiently computable pairing. Here, we shall study the generation of such curves. I. The first part is concerned with fundamental elliptic curve related notions (including pairings); we also point out the relevance of elliptic curves in cryptography. II. The next part is devoted to complex multiplication theory which is a key element in the generation of elliptic curves. III. In the last part, we establish various methods to generate pairingfriendly elliptic curves. Acknowledgements First of all, I would like to thank Pr. Takakazu SATOH for his supervision of this internship as well as for welcoming me to Japan; his kind help (even when not directly related to mathematics) has been most valuable to me. My thanks also go to Pr. Nobushige KUROKAWA [a] for his very warm welcome at the