Chapter
Licensed
Unlicensed
Requires Authentication
Mathematics, cryptology, and technology
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- I-VI I
- Preface VII
- Mathematics, cryptology, and technology IX
- Table of contents XI
- A survey on IQ cryptography 1
- Algebraic groups and discrete logarithm 17
- Fermat numbers, Wieferich and Wilson primes: computations and generalizations 29
- How to distinguish hyperelliptic curves in even characteristic 49
- Limitations of constructive Weil descent 59
- On the security of a public-key cryptosystem 71
- Optimizations for NTRU 77
- The efficiency and security of a real quadratic field based key exchange protocol 89
- Extending the binary gcd algorithms 113
- Stochastic kleptography detection 137
- An overview of the XTR public key system 151
- A survey of IND-CCA secure public-key encryption schemes relative to factoring 181
- Efficient point multiplication for elliptic curves over special optimal extension fields 197
- Error-correcting codes and cryptography 209
- Secret public key schemes 221
- Index form surfaces and construction of elliptic curves over large finite fields 239
- On the size of solutions of the inequality φ(ax + b) < φ(ax) 249
- Security of DL-encryption and signatures against generic attacks—a survey 257
- Square-root algorithms for the discrete logarithm problem (a survey) 283
- Height functions on elliptic curves 303
- List of participants 323
- List of contributors 329
Chapters in this book
- I-VI I
- Preface VII
- Mathematics, cryptology, and technology IX
- Table of contents XI
- A survey on IQ cryptography 1
- Algebraic groups and discrete logarithm 17
- Fermat numbers, Wieferich and Wilson primes: computations and generalizations 29
- How to distinguish hyperelliptic curves in even characteristic 49
- Limitations of constructive Weil descent 59
- On the security of a public-key cryptosystem 71
- Optimizations for NTRU 77
- The efficiency and security of a real quadratic field based key exchange protocol 89
- Extending the binary gcd algorithms 113
- Stochastic kleptography detection 137
- An overview of the XTR public key system 151
- A survey of IND-CCA secure public-key encryption schemes relative to factoring 181
- Efficient point multiplication for elliptic curves over special optimal extension fields 197
- Error-correcting codes and cryptography 209
- Secret public key schemes 221
- Index form surfaces and construction of elliptic curves over large finite fields 239
- On the size of solutions of the inequality φ(ax + b) < φ(ax) 249
- Security of DL-encryption and signatures against generic attacks—a survey 257
- Square-root algorithms for the discrete logarithm problem (a survey) 283
- Height functions on elliptic curves 303
- List of participants 323
- List of contributors 329