A Survey on IQ Cryptography (2001)

by Johannes Buchmann , Safuat Hamdy
Venue:In Proceedings of Public Key Cryptography and Computational Number Theory
Citations:3 - 1 self

Active Bibliography

4 A Signature Scheme Based on the Intractability of Computing Roots – Ingrid Biehl, Johannes Buchmann, Safuat Hamdy, Andreas Meyer - 2000
SEC 1: Elliptic . . . – n.n. - 2000
3 Cryptographic Protocols Based on the Intractability of Extracting Roots and Computing Discrete Logarithms – Ingrid Biehl, Johannes Buchmann, Safuat Hamdy, Andreas Meyer - 1999
6 Computing Discrete Logarithms In Quadratic Orders – Michael J. Jacobson, Jr. - 2000
Computing Elliptic Curve Discrete Logarithms with the Negation Map ⋆ – Ping Wang, Fangguo Zhang
12 The efficiency and security of a real quadratic field based key exchange protocol – M. J. Jacobson, Jr., R. Scheidler, H. C. Williams - 2001
18 A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption – Detlef Hühnlein, Michael J. Jacobson, Jr., Sachar Paulus, Tsuyoshi Takagi
A Survey of Elliptic Curve Cryptosystems, Part I: Introductory – San C. Vo - 2003
150 Software Implementation of Elliptic Curve Cryptography Over Binary Fields – Darrel Hankerson, Julio Lopez Hernandez, Alfred Menezes - 2000
54 Software Implementation of the NIST Elliptic Curves Over Prime Fields – M. Brown, D. Hankerson, J. Lopez, A. Menezes - 2001
382 Guide to Elliptic Curve Cryptography – Aleksandar Jurisic, Alfred J. Menezes - 2004
16 Signcryption and its applications in efficient public key solutions – Yuliang Zheng - 1997
123 The gap-problems: a new class of problems for the security of cryptographic schemes – Tatsuaki Okamoto, David Pointcheval - 1992
61 Another Look at “Provable Security" – Neal Koblitz, Alfred J. Menezes - 2004
24 Discrete Logarithms: the Effectiveness of the Index Calculus Method – Oliver Schirokauer, Damian Weber, Thomas Denny - 1996
2 Towards a DL-based Additively Homomorphic Encryption Scheme – Guilhem Castagnos, Benoît Chevallier-mames
4 Cryptography Based on Number Fields with Large Regulator – Johannes Buchmann, Markus Maurer, Bodo Möller - 2000
1 Computational Methods in Public Key Cryptology – Arjen K. Lenstra - 2002
41 Security of Signed ElGamal Encryption – Claus Peter Schnorr, Markus Jakobsson - 2000