1![Computing discrete logarithms in fields of small characteristic Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN Joint work with: Computing discrete logarithms in fields of small characteristic Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN Joint work with:](https://www.pdfsearch.io/img/37e19af3c91a3c86116b6daec3c186d9.jpg) | Add to Reading ListSource URL: delta.cs.cinvestav.mxLanguage: English - Date: 2014-04-09 13:26:56
|
---|
2![Revisiting discrete logarithms in medium/small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6 Revisiting discrete logarithms in medium/small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6](https://www.pdfsearch.io/img/a1dc7fdc2595d954c3b3e45108f83d4d.jpg) | Add to Reading ListSource URL: www.cosic.esat.kuleuven.beLanguage: English - Date: 2013-09-21 07:48:03
|
---|
3![Approximating the least hypervolume contributor: NP-hard in general, but fast in practice Karl Bringmann1 and Tobias Friedrich2 1 Approximating the least hypervolume contributor: NP-hard in general, but fast in practice Karl Bringmann1 and Tobias Friedrich2 1](https://www.pdfsearch.io/img/0912a2aa31bc230cf833a2a358d15e62.jpg) | Add to Reading ListSource URL: people.mpi-inf.mpg.deLanguage: English - Date: 2016-01-03 06:44:56
|
---|
4![Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint ∗ Alexander May, Maike Ritzenhofen Horst Görtz Institute for IT-security Faculty of Mathematics Ruhr-University of Bochum, 44780 Bochum, Ger Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint ∗ Alexander May, Maike Ritzenhofen Horst Görtz Institute for IT-security Faculty of Mathematics Ruhr-University of Bochum, 44780 Bochum, Ger](https://www.pdfsearch.io/img/9103e599b1dd2531db786c135d4afd95.jpg) | Add to Reading ListSource URL: www.cits.rub.deLanguage: English - Date: 2015-08-28 10:30:32
|
---|
5![Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda](https://www.pdfsearch.io/img/026222e3b6bd4a9edf483b40b67f9f97.jpg) | Add to Reading ListSource URL: www.normalesup.orgLanguage: English - Date: 2015-03-20 08:39:27
|
---|
6![Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields](https://www.pdfsearch.io/img/5a7e02e0ff9eb4fb2412f915a7666527.jpg) | Add to Reading ListSource URL: 2010.eccworkshop.orgLanguage: English - Date: 2010-10-25 19:46:00
|
---|
7![E-th roots and static Diffie-Hellman using index calculus Antoine Joux1 Joint work with Reynald Lercier2 , David Naccache3 , Emmanuel Thome´ 4 Elliptic Curve Cryptography 2008 E-th roots and static Diffie-Hellman using index calculus Antoine Joux1 Joint work with Reynald Lercier2 , David Naccache3 , Emmanuel Thome´ 4 Elliptic Curve Cryptography 2008](https://www.pdfsearch.io/img/03674e6a30b210dedb18b0ab745c3b64.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2008-10-04 13:47:14
|
---|
8![An Attack Against Fixed Value Discrete Logarithm Representations Gergely Alp´ ar1,2⋆ , Jaap-Henk Hoepman1,2 , and Wouter Lueks1,2⋆⋆ 1 An Attack Against Fixed Value Discrete Logarithm Representations Gergely Alp´ ar1,2⋆ , Jaap-Henk Hoepman1,2 , and Wouter Lueks1,2⋆⋆ 1](https://www.pdfsearch.io/img/4560635d7b51aa8bef6b0400c2c3bdac.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2013-02-28 05:16:42
|
---|
9![Discrete logarithms: Recent progress in small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6 Discrete logarithms: Recent progress in small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6](https://www.pdfsearch.io/img/87ba2e2bacdd8c78e0bfd0b440f6a9f9.jpg) | Add to Reading ListSource URL: www-fourier.ujf-grenoble.frLanguage: English - Date: 2014-03-31 03:20:36
|
---|
10![Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France Minding your p’s and q’s Ross Anderson1 , Serge Vaudenay2 1 Computer Laboratory, Pembroke Street, Cambridge, CB2 3QG, England Ecole Normal Sup´erieure — DMI, 45 rue d’Ulm, 75230 Paris, France](https://www.pdfsearch.io/img/2686496ef6c37d25280b3402ae63de0c.jpg) | Add to Reading ListSource URL: book.huihoo.comLanguage: English - Date: 2006-07-27 09:21:33
|
---|