Person:1196515: Difference between revisions

From MaRDI portal
Person:1196515
Created automatically from import231006081045
 
m AuthorDisambiguator moved page Alfred J. Menezes to Alfred J. Menezes: Duplicate
 
(No difference)

Latest revision as of 17:48, 12 December 2023

Available identifiers

zbMath Open menezes.alfred-jWikidataQ61477754 ScholiaQ61477754MaRDI QIDQ1196515

List of research outcomes





PublicationDate of PublicationType
Critical perspectives on provable security: fifteen years of ``another look papers2019-09-19Paper
On the cost of computing isogenies between supersingular elliptic curves2019-02-20Paper
On the security of the WOTS-PRF signature scheme2019-02-15Paper
On isogeny graphs of supersingular elliptic curves over finite fields2018-12-19Paper
Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields2018-11-15Paper
Another look at tightness. II: Practical issues in cryptography2017-10-23Paper
On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One2017-09-08Paper
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields2017-08-08Paper
Fault Attacks on Pairing-Based Protocols: Revisited2017-05-16Paper
Type 2 Structure-Preserving Signature Schemes Revisited2016-06-10Paper
Cryptocash, cryptocurrencies, and cryptocontracts2016-02-02Paper
The random oracle model: a twenty-year retrospective2015-10-26Paper
Computing Discrete Logarithms in $${\mathbb F}_{3^{6 \cdot 137}}$$ and $${\mathbb F}_{3^{6 \cdot 163}}$$ Using Magma2015-10-01Paper
Another Look at Security Theorems for 1-Key Nested MACs2015-06-22Paper
Weakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptography2015-01-30Paper
Another look at non-uniformity2014-05-02Paper
Weakness of $\mathbb{F}_{3^{6 \cdot 509}}$ for Discrete Logarithm Cryptography2014-02-18Paper
Another look at HMAC2013-11-12Paper
Another look at security definitions2013-05-06Paper
Generalizations of Verheul's theorem to asymmetric pairings2013-05-06Paper
Implementing Pairings at the 192-Bit Security Level2013-04-04Paper
Another Look at Provable Security2012-06-29Paper
Another Look at Tightness2012-06-08Paper
Discrete logarithms, Diffie-Hellman, and reductions2012-03-29Paper
Parallelizing the Weil and Tate Pairings2011-12-16Paper
On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited2011-08-10Paper
A Generic Variant of NIST’s KAS2 Key Agreement Protocol2011-07-07Paper
Elliptic curve cryptography: the serpentine course of a paradigm shift2011-04-08Paper
On reusing ephemeral keys in Diffie-Hellman key agreement protocols2011-04-05Paper
https://portal.mardi4nfdi.de/entity/Q30622822011-01-03Paper
Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols2010-12-07Paper
On the asymptotic effectiveness of Weil descent attacks2010-11-12Paper
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings2010-07-20Paper
https://portal.mardi4nfdi.de/entity/Q35612882010-05-25Paper
Comparing two pairing-based aggregate signature schemes2010-05-19Paper
A New Protocol for the Nearby Friend Problem2010-01-07Paper
Reusing Static Keys in Key Agreement Protocols2009-12-17Paper
Comparing the pre- and post-specified peer models for key agreement2009-05-12Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
https://portal.mardi4nfdi.de/entity/Q36140092009-03-16Paper
Another look at non-standard discrete log and Diffie-Hellman problems2009-03-03Paper
Comparing the Pre- and Post-specified Peer Models for Key Agreement2008-07-08Paper
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols2008-04-11Paper
Another Look at “Provable Security”. II2008-04-11Paper
Another look at HMQV2008-02-21Paper
Supersingular Elliptic Curves in Cryptography2007-11-29Paper
Software Implementation of Arithmetic in2007-11-15Paper
Another look at ``provable security2007-05-24Paper
Another look at generic groups2007-04-05Paper
Formulas for cube roots in \(\mathbb F_{3^m}\)2007-03-02Paper
Cryptography and Coding2006-11-01Paper
Cryptographic implications of Hess' generalized GHS attack2006-09-12Paper
On the number of trace-one elements in polynomial bases for \({\mathbb F}_{2^n}\)2006-05-29Paper
Algebraic curves and cryptography2005-09-22Paper
https://portal.mardi4nfdi.de/entity/Q46648512005-04-08Paper
A Survey of Public-Key Cryptosystems2005-02-25Paper
Security of signature schemes in a multi-user setting2005-01-17Paper
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree2004-11-18Paper
https://portal.mardi4nfdi.de/entity/Q48261082004-11-10Paper
Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman Problem2004-08-13Paper
https://portal.mardi4nfdi.de/entity/Q48002732003-09-30Paper
Validation of Elliptic Curve Public Keys2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q47885762003-05-19Paper
An efficient protocol for authenticated key agreement2003-04-28Paper
https://portal.mardi4nfdi.de/entity/Q27654112003-02-25Paper
The state of elliptic curve cryptography2002-10-22Paper
https://portal.mardi4nfdi.de/entity/Q45362022002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q27244492002-06-02Paper
https://portal.mardi4nfdi.de/entity/Q49400652000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q42508282000-02-02Paper
https://portal.mardi4nfdi.de/entity/Q42634302000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q43873211998-11-17Paper
https://portal.mardi4nfdi.de/entity/Q47184811996-12-08Paper
Reducing elliptic curve logarithms to logarithms in a finite field1994-10-03Paper
Counting Points on Elliptic Curves Over F 2 m1994-07-10Paper
https://portal.mardi4nfdi.de/entity/Q42796721994-05-24Paper
Elliptic curve cryptosystems and their implementation1994-01-19Paper
https://portal.mardi4nfdi.de/entity/Q31418961993-11-01Paper
A note on cyclic groups, finite fields, and the discrete logarithm problem1992-12-14Paper
Subgroup Refinement Algorithms for Root Finding in $GF(q)$1992-06-28Paper
https://portal.mardi4nfdi.de/entity/Q32112421990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33490311990-01-01Paper
On the Number of Self-Dual Bases of GF(q m ) Over GF(q)1990-01-01Paper

Research outcomes over time

This page was built for person: Alfred J. Menezes