Computational Methods in Public Key Cryptology (2002)

Cached

Download Links

by Arjen K. Lenstra
Citations:1 - 1 self

Active Bibliography

26 The Diffie-Hellman Protocol – Ueli M. Maurer, Stefan Wolf - 1999
38 The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms – Ueli M. Maurer , Stefan Wolf - 1998
369 Guide to Elliptic Curve Cryptography – Aleksandar Jurisic, Alfred J. Menezes - 2004
3 Elliptic Curves and their use in Cryptography – Victor S. Miller - 1997
SEC 1: Elliptic . . . – n.n. - 2000
8 Elliptic curve cryptography: The serpentine course of a paradigm shift – Ann Hibner Koblitz, Neal Koblitz, Alfred Menezes - 2008
24 Discrete Logarithms: the Effectiveness of the Index Calculus Method – Oliver Schirokauer, Damian Weber, Thomas Denny - 1996
A Cryptosystem Based on the Symmetric Group Sn – Javad N. Doliskani, Ehsan Malekian, Ali Zakerolhosseini
2 Isomorphism Classes of Genus-2 Hyperelliptic Curves Over Finite Fields – L. Hernández Encinas, Alfred J. Menezes, J. Muñoz Masqué
Application of Elliptic Curve . . . – Samta Gajbhiye, Sanjeev Karmakar, Monisha Sharma, Sanjay Sharma, M K Kowar - 2012
29 An Overview of Elliptic Curve Cryptography – Julio López, Ricardo Dahab - 2000
A Survey of Elliptic Curve Cryptosystems, Part I: Introductory – San C. Vo - 2003
1 Issues in Implementation of – Jaewook Chung
Cryptographic Primitives – Paul Garrett - 2007
Équipe CAIRN- ENSSAT et L’École Politechnique de Silésie à Gliwice – Thèse Université, De Rennes, Docteur De, L’université De Rennes, Danuta Pamula, Électronique Et Informatique, Aleksander Nawrat, Liam Marnane, Romuald Rocher, Arnaud Tisserand, Edward Hrynkiewicz, Danuta Pamuła - 2012
8 Cryptography on FPGAs: State of the Art Implementations and Attacks – Thomas Wollinger, Jorge Guajardo, Christof Paar - 1999
19 Modular Exponentiation on Reconfigurable Hardware – Thomas Blum, Prof Christof, Paar Prof, Yusuf Leblebici, Prof Fred, J. Looft, Prof John Orr - 1999
Codes -- The Guide to Secrecy . . . – Richard A. Mollin
2 Survey of Computational Assumptions Used in Cryptography Broken or Not by Shor's Algorithm – Hong Zhu - 2001