Kapitel
Lizenziert
Nicht lizenziert
Erfordert eine Authentifizierung
List of participants
Sie haben derzeit keinen Zugang zu diesem Inhalt.
Sie haben derzeit keinen Zugang zu diesem Inhalt.
Kapitel in diesem Buch
- I-VI I
- Preface VII
- Mathematics, cryptology, and technology IX
- Table of contents XI
- A survey on IQ cryptography 1
- Algebraic groups and discrete logarithm 17
- Fermat numbers, Wieferich and Wilson primes: computations and generalizations 29
- How to distinguish hyperelliptic curves in even characteristic 49
- Limitations of constructive Weil descent 59
- On the security of a public-key cryptosystem 71
- Optimizations for NTRU 77
- The efficiency and security of a real quadratic field based key exchange protocol 89
- Extending the binary gcd algorithms 113
- Stochastic kleptography detection 137
- An overview of the XTR public key system 151
- A survey of IND-CCA secure public-key encryption schemes relative to factoring 181
- Efficient point multiplication for elliptic curves over special optimal extension fields 197
- Error-correcting codes and cryptography 209
- Secret public key schemes 221
- Index form surfaces and construction of elliptic curves over large finite fields 239
- On the size of solutions of the inequality φ(ax + b) < φ(ax) 249
- Security of DL-encryption and signatures against generic attacks—a survey 257
- Square-root algorithms for the discrete logarithm problem (a survey) 283
- Height functions on elliptic curves 303
- List of participants 323
- List of contributors 329
Kapitel in diesem Buch
- I-VI I
- Preface VII
- Mathematics, cryptology, and technology IX
- Table of contents XI
- A survey on IQ cryptography 1
- Algebraic groups and discrete logarithm 17
- Fermat numbers, Wieferich and Wilson primes: computations and generalizations 29
- How to distinguish hyperelliptic curves in even characteristic 49
- Limitations of constructive Weil descent 59
- On the security of a public-key cryptosystem 71
- Optimizations for NTRU 77
- The efficiency and security of a real quadratic field based key exchange protocol 89
- Extending the binary gcd algorithms 113
- Stochastic kleptography detection 137
- An overview of the XTR public key system 151
- A survey of IND-CCA secure public-key encryption schemes relative to factoring 181
- Efficient point multiplication for elliptic curves over special optimal extension fields 197
- Error-correcting codes and cryptography 209
- Secret public key schemes 221
- Index form surfaces and construction of elliptic curves over large finite fields 239
- On the size of solutions of the inequality φ(ax + b) < φ(ax) 249
- Security of DL-encryption and signatures against generic attacks—a survey 257
- Square-root algorithms for the discrete logarithm problem (a survey) 283
- Height functions on elliptic curves 303
- List of participants 323
- List of contributors 329