Article
Open Access
Retraction of: An elementary proof of Fermat’s Last Theorem for all even exponents
Retraction of:
https://doi.org/10.1515/jmc-2016-0018
Published/Copyright:
July 3, 2020
Retraction of: Sudhangshu B. Karmakar. 2017. An elementary proof of Fermat’s Last Theorem for all even exponents. Journal of Journal of Mathematical Cryptology. (DOI: 10.1515/jmc-2017-2000).
This article has been retracted at the request of the Editor-in-Chief.
Published Online: 2020-07-03
© 2020 Sudhangshu B. Karmakar, published by De Gruyter
This work is licensed under the Creative Commons Attribution 4.0 International License.
Articles in the same Issue
- MathCrypt 2018
- Preface to the First Annual MathCrypt Proceedings Volume
- Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
- Recovering Secrets From Prefix-Dependent Leakage
- Quasi-subfield Polynomials and the Elliptic Curve Discrete Logarithm Problem
- A signature scheme from the finite field isomorphism problem
- Efficiently Processing Complex-Valued Data in Homomorphic Encryption
- Flattening NTRU for Evaluation Key Free Homomorphic Encryption
- Self-dual DeepBKZ for finding short lattice vectors
- Designing Efficient Dyadic Operations for Cryptographic Applications
- Characterizing overstretched NTRU attacks
- New Techniques for SIDH-based NIKE
- A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
- Nutmic JMC Special Edition
- Preface for the Number-Theoretic Methods in Cryptology conferences
- A framework for cryptographic problems from linear algebra
- Improved cryptanalysis of the AJPS Mersenne based cryptosystem
- New number-theoretic cryptographic primitives
- New Zémor-Tillich Type Hash Functions Over GL2 (𝔽pn)
- Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
- Hash functions from superspecial genus-2 curves using Richelot isogenies
- Can we Beat the Square Root Bound for ECDLP over 𝔽p2 via Representation?
- A variant of the large sieve inequality with explicit constants
- CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
- Equidistribution Among Cosets of Elliptic Curve Points in Intervals
- Integer factoring and compositeness witnesses
- Short Principal Ideal Problem in multicubic fields
- Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
- Orienting supersingular isogeny graphs
- Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)
- Complexity bounds on Semaev’s naive index calculus method for ECDLP
- Regular Articles
- An elementary proof of Fermat’s last theorem for all even exponents
- Retraction of: An elementary proof of Fermat’s Last Theorem for all even exponents
- Survey on SAP and its application in public-key cryptography
- Privacy-preserving verifiable delegation of polynomial and matrix functions
- New approach to practical leakage-resilient public-key cryptography
Creative Commons
BY 4.0
Articles in the same Issue
- MathCrypt 2018
- Preface to the First Annual MathCrypt Proceedings Volume
- Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
- Recovering Secrets From Prefix-Dependent Leakage
- Quasi-subfield Polynomials and the Elliptic Curve Discrete Logarithm Problem
- A signature scheme from the finite field isomorphism problem
- Efficiently Processing Complex-Valued Data in Homomorphic Encryption
- Flattening NTRU for Evaluation Key Free Homomorphic Encryption
- Self-dual DeepBKZ for finding short lattice vectors
- Designing Efficient Dyadic Operations for Cryptographic Applications
- Characterizing overstretched NTRU attacks
- New Techniques for SIDH-based NIKE
- A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
- Nutmic JMC Special Edition
- Preface for the Number-Theoretic Methods in Cryptology conferences
- A framework for cryptographic problems from linear algebra
- Improved cryptanalysis of the AJPS Mersenne based cryptosystem
- New number-theoretic cryptographic primitives
- New Zémor-Tillich Type Hash Functions Over GL2 (𝔽pn)
- Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
- Hash functions from superspecial genus-2 curves using Richelot isogenies
- Can we Beat the Square Root Bound for ECDLP over 𝔽p2 via Representation?
- A variant of the large sieve inequality with explicit constants
- CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
- Equidistribution Among Cosets of Elliptic Curve Points in Intervals
- Integer factoring and compositeness witnesses
- Short Principal Ideal Problem in multicubic fields
- Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
- Orienting supersingular isogeny graphs
- Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)
- Complexity bounds on Semaev’s naive index calculus method for ECDLP
- Regular Articles
- An elementary proof of Fermat’s last theorem for all even exponents
- Retraction of: An elementary proof of Fermat’s Last Theorem for all even exponents
- Survey on SAP and its application in public-key cryptography
- Privacy-preserving verifiable delegation of polynomial and matrix functions
- New approach to practical leakage-resilient public-key cryptography