Arjen Lenstra

Results: 25



#Item
1Cryptography / Public-key cryptography / Cryptographic hash functions / Key management / Cryptographic protocols / Public key infrastructure / MD5 / X.509 / Public key fingerprint / Collision resistance / MerkleDamgrd construction / SHA-2

MD5 considered harmful today Creating a rogue CA certificate December 30, 2008 Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2018-01-29 20:02:27
2

PARAMETRIZATIONS FOR FAMILIES OF ECM-FRIENDLY CURVES ´ ALEXANDRE GELIN, THORSTEN KLEINJUNG, AND ARJEN K. LENSTRA

Add to Reading List

Source URL: alexgelin.github.io

Language: English - Date: 2018-07-18 08:05:29
    3Operations research / Convex optimization / Lattice points / Combinatorial optimization / Computational number theory / Ellipsoid method / Linear programming / Leonid Khachiyan / Lattice reduction / LenstraLenstraLovsz lattice basis reduction algorithm / Mathematical optimization / Arjen Lenstra

    51 Documenta Math. Linear Programming Stories

    Add to Reading List

    Source URL: documenta.sagemath.org

    Language: English - Date: 2012-07-25 10:24:41
    4Cryptography / Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Cryptographic protocols / MD5 / Certificate authority / Public key certificate / HTTPS / Chain of trust / X.509

    MD5 Considered Harmful Today Creating a rogue CA certificate Alexander Sotirov Marc Stevens Jacob Appelbaum Arjen Lenstra

    Add to Reading List

    Source URL: www.trailofbits.com

    Language: English - Date: 2016-04-15 11:36:17
    5

    Public Keys Arjen K. Lenstra James P. Hughes Maxime Augier Joppe W. Bos Thorsten Kleinjung

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2012-09-28 08:57:10
      6Elliptic curve cryptography / Geometry / Abstract algebra / Mathematics / Elliptic curve DiffieHellman / Elliptic curve / Curve / Curve25519

      EFFICIENT EPHEMERAL ELLIPTIC CURVE CRYPTOGRAPHIC KEYS Andrea Miele, Arjen K. Lenstra 1

      Add to Reading List

      Source URL: isc2015.item.ntnu.no

      Language: English - Date: 2015-09-20 14:18:07
      7Collision attack / X.509 / Arjen Lenstra / Transport Layer Security / Alexander Sotirov / Crypt / Cryptography / Cryptographic protocols / MD5

      Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens Alexander Sotirov Jacob Appelbaum

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2009-09-22 18:23:04
      8Combinatorics / Cryptography / Search algorithms / Applied mathematics / SHA-2 / Theoretical computer science / Permutation / Hash function / Independence / Mathematics / Cryptographic hash functions / Hashing

      i A random zoo: sloth, un∨corn, and trx Arjen K. Lenstra and Benjamin Wesolowski EPFL IC LACAL, Station 14, CH-1015 Lausanne, Switzerland Abstract. Many applications require trustworthy generation of public random num

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-04-22 06:51:37
      9Special number field sieve / Integer factorization / General number field sieve / Factorization / RSA / Lenstra elliptic curve factorization / Factor base / Quadratic sieve / Integer factorization records / Integer factorization algorithms / Cryptography / Mathematics

      A kilobit special number field sieve factorization Kazumaro Aoki1 , Jens Franke2 , Thorsten Kleinjung2 , Arjen K. Lenstra3 , and Dag Arne Osvik3 1 2

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2007-05-31 05:26:07
      10General number field sieve / Special number field sieve / Integer factorization / Arjen Lenstra / Herman te Riele / Factor base / RSA / Factorization / Jens Franke / Integer factorization algorithms / Cryptography / Mathematics

      Factorization of a 1061-bit number by the Special Number Field Sieve Greg Childers California State University Fullerton Fullerton, CAAugust 4, 2012

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2012-08-06 19:06:43
      UPDATE