Cryptography Reference
In-Depth Information
References
[1]
M. Abdalla, M. Bellare and P. Rogaway, DHIES: An Encryption Scheme based on the Diffie-
Hellman Problem , Preprint, 2001.
[2]
L. M. Adleman and J. DeMarrais, A subexponential algorithm for discrete logarithms over all
finite fields, Math. Comp. 61 (203) (1993), 1-15.
[3]
L. M. Adleman, K. L. Manders and G. L. Miller, On taking roots in finite fields, Foundations
of Computer Science (FOCS) , IEEE , 1977, 175-178.
[4]
L.M. Adleman, J. De Marrais and M.-D. Huang, A subexponential algorithm for discrete
logarithms over the rational subgroup of the Jacobians of large genus hyperelliptic curves over
finite fields. In ANTS I (L. M. Adleman and M.-D. Huang, eds.), LNCS , vol. 877, Springer,
1994, pp. 28-40.
[5]
G. B. Agnew, R. C. Mullin, I. M. Onyszchuk and S. A. Vanstone, An implementation for a
fast public-key cryptosystem, J. Crypt. 3 (2) (1991), 63-79.
[6]
M. Agrawal, N. Kayal and N. Saxena, PRIMES is in P, Ann. of Math. 160 (2) (2004), 781-
793.
[7]
E. Agrell, T. Eriksson, A. Vardy and K. Zeger, Closest point search in lattices, IEEE Trans.
Inf. Theory 48 (8) (2002), 2201-2214.
[8]
A. Akavia, Solving hidden number problem with one bit oracle and advice. In CRYPTO 2009
(S. Halevi, ed.), LNCS , vol. 5677, Springer, 2009, pp. 337-354.
[9]
W. Alexi, B. Chor, O. Goldreich and C.-P. Schnorr, RSA and Rabin functions: certain parts
are as hard as the whole, SIAM J. Comput . 17 (2) (1988), 194-209.
[10]
W. R. Alford, A. Granville and C. Pomerance, There are infinitely many Carmichael numbers,
Ann. of Math. 139 (3) (1994), 703-722.
[11]
A. Antipa, D. R. L. Brown, R. P. Gallant, R. J. Lambert, R. Struik and S. A. Vanstone,
Accelerated verification of ECDSA signatures. In SAC 2005 (B. Preneel and S. E. Tavares,
eds.), LNCS , vol. 3897, Springer, 2006, pp. 307-318.
[12]
C. Arene, T. Lange, M. Naehrig and C. Ritzenthaler, Faster computation of the Tate pairing,
J. Number Theory 131 (5) (2011), 842-857.
[13]
J. Arney and E. D. Bender, Random mappings with constraints on coalescence and number of
origins, Pacific J. Math. 103 (1982), 269-294.
[14]
E. Artin, Galois Theory , 2nd edn, Notre Dame, 1959.
[15]
M. F. Atiyah and I. G. Macdonald, Introduction to Commutative Algebra , Addison-Wesley,
1969.
[16]
R. Avanzi, H. Cohen, C. Doche, G. Frey, T. Lange, K. Nguyen and F. Vercauteren, Handbook
of Elliptic and Hyperelliptic Cryptography , Chapman & Hall/CRC, 2006.
[17]
L. Babai, On Lovasz lattice reduction and the nearest lattice point problem, Combinatorica
6 (1) (1986), 1-13.
 
Search WWH ::




Custom Search