Discrete logarithm

Results: 130



#Item
51LNCSWhy Textbook ElGamal and RSA Encryption Are Insecure

LNCSWhy Textbook ElGamal and RSA Encryption Are Insecure

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2009-11-10 09:37:20
52Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves Maike Massierer∗ LORIA, Campus Scientifique, BP 239, 54506 Vandœuvre-l`es-Nancy Cedex, France maike.mas

Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves Maike Massierer∗ LORIA, Campus Scientifique, BP 239, 54506 Vandœuvre-l`es-Nancy Cedex, France maike.mas

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-13 07:45:36
53Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr

Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:35:30
54Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders Safuat Hamdy Bodo Möller

Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders Safuat Hamdy Bodo Möller

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:23:19
55The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm∗ Chunming Tang  †

The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm∗ Chunming Tang †

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-03 03:50:58
56Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over F2n Izuru Kitamura and Masanobu Katagi Sony Corporation, Kitashinagawa Shinagawa-ku, Tokyo, Japan {Izuru.Kitamura, Masanobu.Ka

Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over F2n Izuru Kitamura and Masanobu Katagi Sony Corporation, Kitashinagawa Shinagawa-ku, Tokyo, Japan {Izuru.Kitamura, Masanobu.Ka

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-28 08:21:17
57Two novel applications of bilinear groups to ABE encryption Riccardo Longo  Department of Mathematics, University of Trento, Italy Chiara Marcolla  Department of Mathema

Two novel applications of bilinear groups to ABE encryption Riccardo Longo Department of Mathematics, University of Trento, Italy Chiara Marcolla Department of Mathema

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-12 11:38:03
58CS255: Cryptography and Computer Security  Winter 2003 Basic number theory fact sheet Part II: Arithmetic modulo composites

CS255: Cryptography and Computer Security Winter 2003 Basic number theory fact sheet Part II: Arithmetic modulo composites

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-01-05 17:05:09
59CS255: Cryptography and Computer Security  Winter 2002 Basic number theory fact sheet Part II: Arithmetic modulo composites

CS255: Cryptography and Computer Security Winter 2002 Basic number theory fact sheet Part II: Arithmetic modulo composites

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2002-02-27 14:09:32
60Cryptography and Computer Security  CS255 Basic number theory fact sheet Part II: Arithmetic modulo composites

Cryptography and Computer Security CS255 Basic number theory fact sheet Part II: Arithmetic modulo composites

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-02-22 19:09:43