Cryptography Reference
In-Depth Information
[86]
J. W. Bos, T. Kleinjung and A. K. Lenstra, On the use of the negation map in the Pollard rho
method. In ANTS IX (G. Hanrot, F. Morain and E. Thome, eds.), LNCS , vol. 6197, Springer,
2010, pp. 66-82.
[87]
W. Bosma and H. W. Lenstra Jr., Complete systems of two addition laws for elliptic curves, J.
Number Theory 53 (1995), 229-240.
[88]
A. Bostan, F. Morain, B. Salvy and E. Schost, Fast algorithms for computing isogenies between
elliptic curves, Math. Comp . 77 (263) (2008), 1755-1778.
[89]
C. Boyd and A. Mathuria, Protocols for authentication and key establishment, Information
Security and Cryptography , Springer, 2003.
[90]
X. Boyen, The uber-assumption family. In Pairing 2008 (S.D.GalbraithandK.G.Paterson,
eds.), LNCS , vol. 5209, Springer, 2008, pp. 39-56.
[91]
V. Boyko, M. Peinado and R. Venkatesan, Speeding up discrete log and factoring based
schemes via precomputations. In EUROCRYPT 1998 (K. Nyberg, ed.), LNCS , vol. 1403,
Springer, 1998, pp. 221-235.
[92]
S. Brands, An efficient off-line electronic cash system based on the representation problem,
Tech. report, CWI Amsterdam, 1993, CS-R9323.
[93]
R. P. Brent, An improved Monte Carlo factorization algorithm, BIT (1980), 176-184.
[94]
R. P. Brent and J. M. Pollard, Factorization of the eighth Fermat number, Math. Comp. 36 (154)
(1981), 627-630.
[95]
R. P. Brent and P. Zimmermann, Modern Computer Arithmetic , Cambridge University Press,
2010.
[96]
An O ( M ( n ) logn ) algorithm for the Jacobi symbol. In ANTS IX (G. Hanrot, F. Morain
and E. Thome, eds.), LNCS , vol. 6197, Springer, 2010, pp. 83-95.
[97]
E. Bresson, Y. Lakhnech, L. Mazare and B. Warinschi, A generalization of DDH with appli-
cations to protocol analysis and computational soundness. In CRYPTO 2007 (A. J. Menezes,
ed.), LNCS , vol. 4622, Springer, 2007, pp. 482-499.
[98]
E. F. Brickell, D. Pointcheval, S. Vaudenay and M. Yung, Design validations for discrete log-
arithm based signature schemes. In PKC 2000 (H. Imai and Y. Zheng, eds.), LNCS , vol. 1751,
Springer, 2000, pp. 276-292.
[99]
E. Brier, C. Clavier and D. Naccache, Cryptanalysis of RSA signatures with fixed-pattern
padding. In CRYPTO 2001 (J. Kilian, ed.), LNCS , vol. 2139, Springer, 2001, pp. 433- 439.
[100]
R. Broker, Constructing supersingular elliptic curves, J. Comb. Number Theory 1 (3) (2009),
269-273.
[101]
R. Broker, D. X. Charles and K. Lauter, Evaluating large degree isogenies and applications to
pairing based cryptography. In Pairing 2008 (S.D.GalbraithandK.G.Paterson,eds.), LNCS ,
vol. 5209, Springer, 2008, pp. 100-112.
R. Broker, K. Lauter and A. V. Sutherland, Modular polynomials via isogeny volcanoes,
http://arxiv.org/abs/1001.0402, 2010, to appear in Math. Comp. .
[102]
[103]
R. Broker and A. V. Sutherland, An explicit height bound for the classical modular polynomial,
The Ramanujan Journal 22 (3) (2010), 293-313.
[104]
D. R. L. Brown and R. P. Gallant, The static Diffie-Hellman problem, Cryptology ePrint
Archive, Report 2004/306, 2004.
[105]
B. B. Brumley and K. U. Jarvinen, Koblitz curves and integer equivalents of Frobenius
expansions. In SAC 2007 (C. M. Adams, A. Miri and M. J. Wiener, eds.), LNCS , vol. 4876,
Springer, 2007, pp. 126-137.
[106]
J. P. Buhler and P. Stevenhagen, Algorithmic Number Theory , MSRI Publications, Cambridge
University Press, 2008.
[107]
M. Burmester and Y. Desmedt, A secure and efficient conference key distribution system. In
EUROCRYPT 1994 (A.DeSantis,ed.), LNCS , vol. 950, Springer, 1995, pp. 267-275.
Search WWH ::




Custom Search