Artikel
Open Access
Computing endomorphism rings of elliptic curves under the GRH
-
Gaetan Bisson
Veröffentlicht/Copyright:
3. April 2012
Published Online: 2012-04-03
Published in Print: 2012-04
©2012 by Walter de Gruyter GmbH & Co.
Artikel in diesem Heft
- Masthead
- Computing endomorphism rings of elliptic curves under the GRH
- Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation
- Cryptanalysis of three matrix-based key establishment protocols
- Security of blind signatures under aborts and applications to adaptive oblivious transfer
Creative Commons
BY-NC-ND 3.0
Artikel in diesem Heft
- Masthead
- Computing endomorphism rings of elliptic curves under the GRH
- Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation
- Cryptanalysis of three matrix-based key establishment protocols
- Security of blind signatures under aborts and applications to adaptive oblivious transfer