Fields of mathematics

Results: 1270



#Item
281Finite fields / Cyberwarfare / Applied mathematics / Digital signature / Key management / XTR / RSA / Structure / BLS / Public-key cryptography / Cryptography / Mathematics

Waters Signatures with Optimal Security Reduction Dennis Hofheinz1 , Tibor Jager1 , and Edward Knapp2 1 Institut f¨ur Kryptographie und Sicherheit, Karlsruhe Institute of Technology, Germany, {dennis.hofheinz,tibor.jage

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-29 04:15:53
282Number theory / Modular arithmetic / Analytic number theory / Class field theory / Symbol / Artin reciprocity law / Frobenius endomorphism / Valuation / Modular form / Abstract algebra / Mathematics / Algebraic number theory

A GROSS-ZAGIER FORMULA FOR QUATERNION ALGEBRAS OVER TOTALLY REAL FIELDS EYAL Z. GOREN & KRISTIN E. LAUTER Abstract. We prove a higher dimensional generalization of Gross and Zagier’s theorem on the factorization of dif

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-08 21:38:03
283Finite fields / Multiplication / Elliptic curve point multiplication / Group theory / Elliptic curve cryptography / Elliptic curve / Hessian form of an elliptic curve / Abstract algebra / Mathematics / Elliptic curves

Main text appears in A. H. Chan, V. Gligor (Eds.): Information Security – ISC 2002, Springer-Verlag LNCS 2433, pp. 402–413, ISBNNotes addedParallelizable Elliptic Curve Point Multiplicati

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:21
284Mathematics / Multilinear algebra / Cryptography / Finite fields / Decision Linear assumption / Boneh/Franklin scheme / Group theory / Bilinear map / Decisional Diffie–Hellman assumption / Algebra / Computational hardness assumptions / Abstract algebra

The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions Brent Waters† University of Texas at Austin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-06 19:27:51
285Abstract algebra / Group theory / Combinatorics / Field theory / Matrix / Determinant / Vector space / Permutation / Field / Algebra / Mathematics / Linear algebra

Addendum to “On the Generalized Linear Equivalence of Functions over Finite Fields” Marco Macchetti Politecnico di Milano, Milan, Italy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-05-10 04:14:49
286Computer algebra / Numerical linear algebra / Finite fields / Algebraic geometry / Error detection and correction / Gröbner basis / Matrix / Hidden Field Equations / Gaussian elimination / Algebra / Mathematics / Abstract algebra

Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields Christopher Wolf & Enrico Thomae Horst Görtz Institute for IT-security Faculty of Mathematics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-14 05:32:54
287Finite fields / Cryptographic protocols / Diffie–Hellman problem / Pairing-based cryptography / Hellman / Diffie–Hellman key exchange / Discrete logarithm / Whitfield Diffie / BLS / Cryptography / Abstract algebra / Computational hardness assumptions

Two novel applications of bilinear groups to ABE encryption Riccardo Longo Department of Mathematics, University of Trento, Italy Chiara Marcolla Department of Mathema

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-12 11:38:03
288Polynomials / Post-quantum cryptography / Computer algebra / Finite fields / Algebraic geometry / Hidden Field Equations / Multivariate cryptography / Gröbner basis / Field extension / Abstract algebra / Algebra / Mathematics

A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery) Charles Bouillaguet1 , Pierre-Alain Fouque1 , Antoine Joux2,3 , and Joana Treger2 1 Ecole Normale Supérieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-15 10:42:41
289Computer arithmetic / Finite fields / Group theory / Binary arithmetic / Cryptography / Elliptic curve cryptography / Arbitrary-precision arithmetic / Modular arithmetic / XTR / Abstract algebra / Mathematics / Arithmetic

Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices Johann Großsch¨adl1 , Dan Page2 , and Stefan Tillich2 1 University of Luxembourg, CSC Research Unit, LACS,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-28 16:24:04
290Calculus / Fields of mathematics / Computer science education / Discrete mathematics / Mathematics / VHDL

Bachelor Academic Programme PROGRAMMING AND COMPUTER-AIDED DESIGN (“Computer-Aided Design in Microelectronics”)

Add to Reading List

Source URL: www.bsa.edu.lv

Language: English - Date: 2010-03-17 10:47:51
UPDATE