Cryptography Reference
In-Depth Information
[18]
L. Babai and E. Szemeredi, On the complexity of matrix group problems I , Foundations of
Computer Science (FOCS) (1996), 229-240.
[19]
E. Bach, Bounds for primality testing and related problems, Math. Comp. 55 (191) (1990),
355-380.
[20]
Toward a theory of Pollard's rho method, Inf. Comput . 90 (2) (1991), 139-155.
[21]
E. Bach and J. Shallit, Algorithmic Number Theory , MIT Press, 1996.
[22]
E. Bach and J. Sorenson, Sieve algorithms for perfect power testing, Algorithmica 9 (1993),
313-328.
[23]
S. Bai and R. P. Brent, On the efficiency of Pollard's rho method for discrete logarithms,
CATS 2008 (J. Harland and P. Manyem, eds.), Australian Computer Society, 2008, pp. 125-
131.
[24]
D. V. Bailey, L. Batina, D. J. Bernstein, P. Birkner, J. W. Bos, H.-C. Chen, C.-M. Cheng, G. van
Damme, G. de Meulenaer, L. Julian Dominguez Perez, J. Fan, T. G uneysu, F. Gurkaynak,
T. Kleinjung, T. Lange, N. Mentens, R. Niederhagen, C. Paar, F. Regazzoni, P. Schwabe,
L. Uhsadel, A. Van Herrewege and B.-Y. Yang, Breaking ECC2K-130 , Cryptology ePrint
Archive, Report 2009/541, 2009.
[25]
R. Balasubramanian and N. Koblitz, The improbability that an elliptic curve has sub-
exponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm, J. Crypt.
11 (2) (1998), 141-145.
P. S. L. M. Barreto, S. D. Galbraith, C. ´ OhEigeartaigh and M. Scott, Efficient pairing
computation on supersingular abelian varieties, Des. Codes Crypt. 42 (3) (2007), 239-271.
[26]
[27]
P. S. L. M. Barreto, H. Y. Kim, B. Lynn and M. Scott, Efficient algorithms for pairing-based
cryptosystems, CRYPTO 2002 (M. Yung, ed.), LNCS , vol. 2442, Springer, 2002, pp. 354-369.
[28]
P. S. L. M. Barreto and M. Naehrig, Pairing-friendly elliptic curves of prime order, SAC 2005
(B. Preneel and S. E. Tavares, eds.), LNCS , vol. 3897, Springer, 2006, pp. 319-331.
[29]
A. Bauer, Vers une generalisation rigoureuse des methodes de Coppersmith pour la recherche
de petites racines de polynmes, Ph.D. thesis, Universite de Versailles Saint-Quentin-en-
Yvelines, 2008.
[30]
M. Bellare, R. Canetti and H. Krawczyk, A modular approach to the design and analysis of
authentication and key exchange protocols, Symposium on the Theory of Computing (STOC) ,
ACM, 1998, pp. 419-428.
[31]
M. Bellare, J. A. Garay and T. Rabin, Fast batch verification for modular exponentiation and
digital signatures, EUROCRYPT 1998 (K. Nyberg, ed.), LNCS , vol. 1403, Springer, 1998,
pp. 236-250.
[32]
M. Bellare, S. Goldwasser and D. Micciancio, “Pseudo-Random” number generation within
cryptographic algorithms: the DSS case, CRYPTO 1997 (B. S. Kaliski Jr., ed.), LNCS ,
vol. 1294, Springer, 1997, pp. 277-291.
[33]
M. Bellare and G. Neven, Multi-signatures in the plain public-key model and a general forking
lemma, CCS 2006 (A. Juels, R. N. Wright and S. De Capitani di Vimercati, eds.), ACM, 2006,
pp. 390-399.
[34]
M. Bellare, D. Pointcheval and P. Rogaway, Authenticated key exchange secure against dictio-
nary attacks, EUROCRYPT 2000 (B. Preneel, ed.), LNCS , vol. 1807, Springer, 2000, pp. 139-
155.
[35]
M. Bellare and P. Rogaway, Random oracles are practical: a paradigm for designing efficient
protocols, CCS 1993 , ACM, 1993, pp. 62-73.
[36]
Entity authentication and key distribution, CRYPTO 1993 (D. R. Stinson, ed.), LNCS ,
vol. 773, Springer, 1994, pp. 232-249.
[37]
Optimal asymmetric encryption - how to encrypt with RSA, EUROCRYPT 1994
(A.DeSantis,ed.), LNCS , vol. 950, Springer, 1995, pp. 92-111.
 
Search WWH ::




Custom Search