Cryptography Reference
In-Depth Information
[324]
J. C. Lagarias, H. W. Lenstra Jr. and C.-P. Schnorr, Korkin-Zolotarev bases and successive
minima of a lattice and its reciprocal lattice, Combinatorica 10 (4) (1990), 333-348.
[325]
C. Lanczos, Solution of systems of linear equations by minimized iterations, J. Res. Nat.
Bureau of Standards 49 (1952), 33-53.
[326]
S. Lang, Introduction to Algebraic Geometry , Wiley, 1964.
[327]
Algebraic Number Theory , GTM , vol. 110, Springer, 1986.
[328]
Elliptic Functions , 2nd edn, GTM , vol. 112, Springer, 1987.
[329]
Algebra , 3rd edn, Addison-Wesley, 1993.
[330]
T. Lange, Koblitz curve cryptosystems, Finite Fields Appl. 11 (2) (2005), 200-229.
[331]
E. Lee, H.-S. Lee and C.-M. Park, Efficient and Generalized Pairing Computation on Abelian
Varieties, IEEE Trans. Inf. Theory 55 (4) (2009), 1793-1803.
[332]
A. K. Lenstra, Factorization of polynomials. In Computational Methods in Number Theory ,
(H. W. Lenstra Jr. and R. Tijdeman, eds.) Mathematical Center Tracts 154, Mathematisch
Centrum Amsterdam, 1984, pp. 169-198.
[333]
Integer factoring, Des. Codes Crypt. 19 (2/3) (2000), 101-128.
[334]
A. K. Lenstra and H. W. Lenstra Jr., The Development of the Number Field Sieve , LNM ,
vol. 1554, Springer, 1993.
[335]
A. K. Lenstra, H. W. Lenstra Jr. and L. Lovasz, Factoring polynomials with rational coefficients,
Math. Ann. 261 (1982), 515-534.
[336]
A. K. Lenstra and I. E. Shparlinski, Selective forgery of RSA signatures with fixed-pattern
padding. In PKC 2002 (D. Naccache and P. Paillier, eds.), LNCS , vol. 2274, Springer, 2002,
pp. 228-236.
[337]
A. K. Lenstra and E. R. Verheul, The XTR public key system. In CRYPTO 2000 (M. Bellare,
ed.), LNCS , vol. 1880, Springer, 2000, pp. 1-19.
[338]
Fast irreducibility and subgroup membership testing in XTR. In PKC 2001 (K. Kim,
ed.), LNCS , vol. 1992, Springer, 2001, pp. 73-86.
[339]
H. W. Lenstra Jr., Factoring integers with elliptic curves, Annals of Mathematics 126 (3) (1987),
649-673.
[340]
Elliptic curves and number theoretic algorithms. In Proc. International Congr. Math. ,
Berkeley 1986, AMS, 1988, pp. 99-120.
[341]
Finding isomorphisms between finite fields, Math. Comp. 56 (193) (1991), 329-
347.
[342]
H. W. Lenstra Jr., J. Pila and C. Pomerance, A hyperelliptic smoothness test I, Phil. Trans. R.
Soc. Lond. A 345 (1993), 397-408.
[343]
H. W. Lenstra Jr. and C. Pomerance, A rigorous time bound for factoring integers, J. Amer.
Math. Soc. 5 (3) (1992), no. 3, 483-516.
[344]
R. Lercier, Computing isogenies in F 2 n .In ANTS II (H. Cohen, ed.), LNCS , vol. 1122, Springer,
1996, pp. 197-212.
[345]
R. Lercier and F. Morain, Algorithms for computing isogenies between elliptic curves, Com-
putational Perspectives on Number Theory (D. A. Buell and J. T. Teitelbaum, eds.), Studies
in Advanced Mathematics, vol. 7, AMS, 1998, pp. 77-96.
[346]
R. Lercier and T. Sirvent, On Elkies subgroups of -torsion points in elliptic curves defined
over a finite field, J. Theor. Nombres Bordeaux 20 (3) (2008), 783-797.
[347]
G. Leurent and P. Q. Nguyen, How risky is the random oracle model?. In CRYPTO 2009
(S. Halevi, ed.), LNCS , vol. 5677, Springer, 2009, pp. 445-464.
[348]
K.-Z. Li and F. Oort, Moduli of supersingular abelian varieties, LNM , vol. 1680, Springer,
1998.
[349]
W.-C. Li, M. Naslund and I. E. Shparlinski, Hidden number problem with the trace and bit
security of XTR and LUC. In CRYPTO 2002 (M. Yung, ed.), LNCS , vol. 2442, Springer, 2002,
pp. 433-448.
 
Search WWH ::




Custom Search