Pages that link to "Item:Q2880040"
From MaRDI portal
The following pages link to Mathematics of Public Key Cryptography (Q2880040):
Displayed 50 items.
- Factoring multi-power RSA moduli with primes sharing least or most significant bits (Q285897) (← links)
- Chiral polyhedra arising from almost simple groups with socle \(PSL(2,q)\) (Q314044) (← links)
- The \(\mathbb Q\)-curve construction for endomorphism-accelerated elliptic curves (Q321311) (← links)
- On the distribution of Atkin and Elkies primes (Q404278) (← links)
- The pairing computation on Edwards curves (Q460158) (← links)
- Computational hardness of IFP and ECDLP (Q505664) (← links)
- Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors (Q515394) (← links)
- Computing representation matrices for the action of Frobenius on cohomology groups (Q820979) (← links)
- Improved supersingularity testing of elliptic curves using Legendre form (Q831974) (← links)
- Access structures of hyperelliptic secret sharing schemes (Q897323) (← links)
- Recent progress on the elliptic curve discrete logarithm problem (Q908041) (← links)
- Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction (Q1630230) (← links)
- Quantum lattice enumeration and tweaking discrete pruning (Q1633464) (← links)
- On the hardness of the computational ring-LWR problem and its applications (Q1633465) (← links)
- On the statistical leak of the GGH13 multilinear map and some variants (Q1633467) (← links)
- Distorting the volcano (Q1679701) (← links)
- Towards practical key exchange from ordinary isogeny graphs (Q1710681) (← links)
- CSIDH: an efficient post-quantum commutative group action (Q1710683) (← links)
- Computing supersingular isogenies on Kummer surfaces (Q1710684) (← links)
- Efficient post-quantum undeniable signature on 64-bit ARM (Q1746974) (← links)
- Volumes and distributions for random unimodular complex and quaternion lattices (Q1753812) (← links)
- Improved attacks on knapsack problem with their variants and a knapsack type ID-scheme (Q1784985) (← links)
- Extending the GLS endomorphism to speed up GHS Weil descent using Magma (Q1979955) (← links)
- Computational problems in supersingular elliptic curve isogenies (Q1994699) (← links)
- Coppersmith's lattices and ``focus groups'': an attack on small-exponent RSA (Q1998906) (← links)
- Analysis of DeepBKZ reduction for finding short lattice vectors (Q2004968) (← links)
- Geometry of biquadratic and cyclic cubic log-unit lattices (Q2043488) (← links)
- Low weight discrete logarithm and subset sum in \(2^{0.65n}\) with polynomial memory (Q2055649) (← links)
- Computing projective equivalences of planar curves birationally equivalent to elliptic and hyperelliptic curves (Q2065639) (← links)
- Lattice size and generalized basis reduction in dimension three (Q2066314) (← links)
- Improving the Gaudry-Schost algorithm for multidimensional discrete logarithms (Q2068384) (← links)
- Trisections on certain rational elliptic surfaces and families of Zariski pairs degenerating to the same conic-line arrangement (Q2071814) (← links)
- Rational \(D(q)\)-quadruples (Q2076520) (← links)
- A deterministic algorithm for finding \(r\)-power divisors (Q2093686) (← links)
- Linear complexity of sequences on Koblitz curves of genus 2 (Q2103481) (← links)
- An explicit construction for \(n\)-contact curves to a smooth cubic via divisions of polynomials and Zariski tuples (Q2105254) (← links)
- Detecting affine equivalences between implicit planar algebraic curves (Q2105873) (← links)
- Hashing to elliptic curves of \(j\)-invariant 1728 (Q2120982) (← links)
- Optimum attack on 3-round Feistel-2 structure (Q2128756) (← links)
- Linear complexity of some sequences derived from hyperelliptic curves of genus 2 (Q2130031) (← links)
- The Elekes-Szabó problem and the uniformity conjecture (Q2142700) (← links)
- Divisibility by 2 on quartic models of elliptic curves and rational Diophantine \(D(q)\)-quintuples (Q2150977) (← links)
- A new approach for finding low-weight polynomial multiples (Q2151296) (← links)
- A new adaptive attack on SIDH (Q2152168) (← links)
- Reusing nonces in Schnorr signatures (and keeping it secure...) (Q2167718) (← links)
- The polynomial learning with errors problem and the smearing condition (Q2168804) (← links)
- Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions (Q2223693) (← links)
- Linear forms in logarithms and the mathematical method of Diophantine equations: applications in chemistry and physics (Q2230708) (← links)
- Cryptanalysis of elliptic curve hidden number problem from PKC 2017 (Q2291665) (← links)
- A note on isotropic discrepancy and spectral test of lattice point sets (Q2307483) (← links)