{"entities":{"Q2761408":{"pageid":2772147,"ns":120,"title":"Item:Q2761408","lastrevid":41982742,"modified":"2025-05-20T12:48:40Z","type":"item","id":"Q2761408","labels":{"en":{"language":"en","value":"Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11--15, 2000"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 1683464"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2761408$22D4AC6D-E00A-4174-9437-9349BFC62E38","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"7396671b2059178249b6206f27ec72d1b21fb706","datavalue":{"value":"0976.00054","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2761408$2F2FF0FE-C8DF-457F-9B72-DFC84B79E8B9","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"d53cc9b739d076778b9207d322c3b005b7ae83bc","datavalue":{"value":{"time":"+2001-12-18T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q2761408$D70A9917-40F3-4590-9511-81C211125F8E","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2761408$9E5798F8-3B5F-4D30-BE60-525ECE97637C","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2761408$1B8C3D96-FEA0-44C2-8542-37167C2EC740","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"68bee4c4ea67bf3d226faa0be962d8f284816ebc","datavalue":{"value":"11-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2761408$CDAA3916-DFC8-4C78-9C1E-CE2AA5EDC4B7","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2761408$89CDBF49-23A2-4C42-A729-1516A027014B","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"332a7ca0fc2503044cbe5299ecaa975484163791","datavalue":{"value":"14G50","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2761408$DA41155E-DE1C-40CF-AEBF-23E619122E58","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"4027b36c578c04046b6234e9fd63649f5ab03b01","datavalue":{"value":"11Yxx","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2761408$20F40AB6-C725-4C37-82E2-CF9D82F65942","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"b512f973670a3ac1db65e0acace13a41582dffe2","datavalue":{"value":"1683464","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2761408$3697A398-E01A-403E-A5DB-6DBCBAE3FFF4","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"0c56ba45c5c29edb8ccac7985d2ee50d879c4b20","datavalue":{"value":"Warsaw (Poland)","type":"string"},"datatype":"string"},"type":"statement","id":"Q2761408$B0AD23DD-340D-453F-ABE8-6405008D98F7","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q2761408$9620234A-A786-46E6-B097-3420080C370F","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5d83ae477e518ffecea78688f13a2aaaeca13299","datavalue":{"value":"Conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q2761408$BDB83471-941F-457A-90E7-FB6A9C3B1A5F","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"0e5b96b9f5014e26599d123b98d0c1d35d57a0d1","datavalue":{"value":"Public-key cryptography","type":"string"},"datatype":"string"},"type":"statement","id":"Q2761408$00007DB0-4777-4E47-8264-C20EF8D8D512","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"fa5194ae5fad5508d0c47bd130c3973cf059a4bd","datavalue":{"value":"Computational number theory","type":"string"},"datatype":"string"},"type":"statement","id":"Q2761408$A6A62D05-5B0E-4891-BFFA-BA5A2BFD643C","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2761408$80D1A74F-736B-4A16-AE85-E505FE3A2853","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"512ccb535ff9bc3ac9fdd70928689a829dea4367","datavalue":{"value":{"text":"Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11--15, 2000","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q2761408$11680D88-8F2A-4717-99EE-7F2D9F5CC5FB","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"ed651e015537e247f980edd32127ccf5fb345102","datavalue":{"value":"The articles of this volume will be reviewed individually.NEWLINENEWLINEIndexed articles:NEWLINENEWLINE\\textit{Buchmann, Johannes; Hamdy, Safuat}, A survey on IQ cryptography, 1-15 [Zbl 0983.94034]NEWLINENEWLINE\\textit{Couveignes, Jean-Marc}, Algebraic groups and discrete logarithm, 17-27 [Zbl 1022.11066]NEWLINENEWLINE\\textit{Dilcher, Karl}, Fermat numbers, Wieferich and Wilson primes: computations and generalizations, 29-48 [Zbl 1016.11058]NEWLINENEWLINE\\textit{Enge, Andreas}, How to distinguish hyperelliptic curves in even characteristic., 49-58 [Zbl 1116.14306]NEWLINENEWLINE\\textit{Galbraith, Steven D.}, Limitations of constructive Weil descent, 59-70 [Zbl 1016.11020]NEWLINENEWLINE\\textit{Gro\u0161ek, Otokar; Magliveras, Spyros S.; Wei, Wandi}, On the security of a public-key cryptosystem, 71-75 [Zbl 0985.94027]NEWLINENEWLINE\\textit{Hoffstein, Jeffrey; Silverman, Joseph}, Optimizations for NTRU, 77-88 [Zbl 0987.94027]NEWLINENEWLINE\\textit{Jacobson, Michael J. jun.; Scheidler, Renate; Williams, Hugh C.}, The efficiency and security of a real quadratic field based key exchange protocol, 89-112 [Zbl 0986.94024]NEWLINENEWLINE\\textit{Odlyzko, Andrew}, Mathematics, cryptology, and technology, ix-x [Zbl 0987.94028]NEWLINENEWLINE\\textit{Kubiak, Przemys\u0142aw}, Extending the binary gcd algorithms, 113-135 [Zbl 1014.11079]NEWLINENEWLINE\\textit{Kucner, Daniel; Kuty\u0142owski, Miros\u0142aw}, Stochastic kleptography detection, 137-149 [Zbl 0986.94025]NEWLINENEWLINE\\textit{Lenstra, Arjen K.; Verheul, Eric R.}, An overview of the XTR public key system, 151-180 [Zbl 0986.94029]NEWLINENEWLINE\\textit{M\u00fcller, Siguna}, A survey of IND-CCA secure public-key encryption schemes relative to factoring, 181-196 [Zbl 0985.94506]NEWLINENEWLINE\\textit{M\u00fcller, Volker}, Efficient point multiplication for elliptic curves over special optimal extension fields, 197-207 [Zbl 1019.11037]NEWLINENEWLINE\\textit{Niederreiter, Harald}, Error-correcting codes and cryptography, 209-219 [Zbl 0989.94027]NEWLINENEWLINE\\textit{Patarin, Jacques}, Secret public key schemes, 221-237 [Zbl 0987.94030]NEWLINENEWLINE\\textit{Peth\u0151, Attila}, Index form surfaces and construction of elliptic curves over large finite fields, 239-247 [Zbl 1014.11021]NEWLINENEWLINE\\textit{te Riele, Herman}, On the size of solutions of the inequality \\(\\varphi(ax-b)<\\varphi(ax)\\), 249-255 [Zbl 1020.11084]NEWLINENEWLINE\\textit{Schnorr, Claus Peter}, Security of DL-encryption and signatures against generic attacks -- a survey, 257-282 [Zbl 0987.94029]NEWLINENEWLINE\\textit{Teske, Edlyn}, Square-root algorithms for the discrete logarithm problem (a survey), 283-301 [Zbl 1001.11059]NEWLINENEWLINE\\textit{Zimmer, Horst G.}, Height functions on elliptic curves., 303-322 [Zbl 1046.11041]","type":"string"},"datatype":"string"},"type":"statement","id":"Q2761408$640E62E1-1AB6-455F-B11E-77C645BBC587","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Publication:2761408","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Publication:2761408"}}}}}