Alfred Menezes

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Critical perspectives on provable security: fifteen years of ``another look papers
Advances in Mathematics of Communications
2019-09-19Paper
On the cost of computing isogenies between supersingular elliptic curves2019-02-20Paper
On the security of the WOTS-PRF signature scheme
Advances in Mathematics of Communications
2019-02-15Paper
On isogeny graphs of supersingular elliptic curves over finite fields
Finite Fields and their Applications
2018-12-19Paper
Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields
Advances in Mathematics of Communications
2018-11-15Paper
Another look at tightness. II: Practical issues in cryptography2017-10-23Paper
On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One
IEEE Transactions on Computers
2017-09-08Paper
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields
IEEE Transactions on Computers
2017-08-08Paper
Fault Attacks on Pairing-Based Protocols: Revisited
IEEE Transactions on Computers
2017-05-16Paper
Type 2 structure-preserving signature schemes revisited
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Cryptocash, cryptocurrencies, and cryptocontracts
Designs, Codes and Cryptography
2016-02-02Paper
The random oracle model: a twenty-year retrospective
Designs, Codes and Cryptography
2015-10-26Paper
Computing discrete logarithms in \(\mathbb F_{3^{6 \cdot 137}}\) and \(\mathbb F_{3^{6 \cdot 163}}\) using Magma
Arithmetic of Finite Fields
2015-10-01Paper
Another Look at Security Theorems for 1-Key Nested MACs
Open Problems in Mathematics and Computational Science
2015-06-22Paper
Weakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptography
Finite Fields and their Applications
2015-01-30Paper
Another look at non-uniformity
Groups - Complexity - Cryptology
2014-05-02Paper
Weakness of $\mathbb{F}_{3^{6 \cdot 509}}$ for Discrete Logarithm Cryptography
Pairing-Based Cryptography – Pairing 2013
2014-02-18Paper
Another look at HMAC
Journal of Mathematical Cryptology
2013-11-12Paper
Another look at security definitions
Advances in Mathematics of Communications
2013-05-06Paper
Generalizations of Verheul's theorem to asymmetric pairings
Advances in Mathematics of Communications
2013-05-06Paper
Implementing pairings at the 192-bit security level
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Another look at provable security. (Abstract)
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Another look at tightness
Selected Areas in Cryptography
2012-06-08Paper
Discrete logarithms, Diffie-Hellman, and reductions
Vietnam Journal of Mathematics
2012-03-29Paper
Parallelizing the Weil and Tate pairings
Cryptography and Coding
2011-12-16Paper
On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited
Discrete Applied Mathematics
2011-08-10Paper
A generic variant of NIST'S KAS2 key agreement protocol
Information Security and Privacy
2011-07-07Paper
Elliptic curve cryptography: the serpentine course of a paradigm shift
Journal of Number Theory
2011-04-08Paper
On reusing ephemeral keys in Diffie-Hellman key agreement protocols
International Journal of Applied Cryptography
2011-04-05Paper
Intractable problems in cryptography2011-01-03Paper
Combined security analysis of the one- and three-pass unified model key agreement protocols
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
On the asymptotic effectiveness of Weil descent attacks
Journal of Mathematical Cryptology
2010-11-12Paper
On the efficiency and security of pairing-based protocols in the type 1 and type 4 settings
Arithmetic of Finite Fields
2010-07-20Paper
The brave new world of bodacious assumptions in cryptography2010-05-25Paper
Comparing two pairing-based aggregate signature schemes
Designs, Codes and Cryptography
2010-05-19Paper
A new protocol for the nearby friend problem
Cryptography and Coding
2010-01-07Paper
Reusing static keys in key agreement protocols
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Comparing the pre- and post-specified peer models for key agreement
International Journal of Applied Cryptography
2009-05-12Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
An introduction to pairing-based cryptography2009-03-16Paper
Another look at non-standard discrete log and Diffie-Hellman problems
Journal of Mathematical Cryptology
2009-03-03Paper
Comparing the Pre- and Post-specified Peer Models for Key Agreement
Information Security and Privacy
2008-07-08Paper
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Another Look at “Provable Security”. II
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Another look at HMQV
Mathematical Cryptology
2008-02-21Paper
Supersingular Elliptic Curves in Cryptography
Pairing-Based Cryptography – Pairing 2007
2007-11-29Paper
Software Implementation of Arithmetic in
Arithmetic of Finite Fields
2007-11-15Paper
Another look at ``provable security
Journal of Cryptology
2007-05-24Paper
Another look at generic groups
Advances in Mathematics of Communications
2007-04-05Paper
Formulas for cube roots in \(\mathbb F_{3^m}\)
Discrete Applied Mathematics
2007-03-02Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Cryptographic implications of Hess' generalized GHS attack
Applicable Algebra in Engineering, Communication and Computing
2006-09-12Paper
On the number of trace-one elements in polynomial bases for \({\mathbb F}_{2^n}\)
Designs, Codes and Cryptography
2006-05-29Paper
Algebraic curves and cryptography
Finite Fields and their Applications
2005-09-22Paper
scientific article; zbMATH DE number 2154287 (Why is no real title available?)2005-04-08Paper
A Survey of Public-Key Cryptosystems
SIAM Review
2005-02-25Paper
Security of signature schemes in a multi-user setting
Designs, Codes and Cryptography
2005-01-17Paper
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
LMS Journal of Computation and Mathematics
2004-11-18Paper
scientific article; zbMATH DE number 2114384 (Why is no real title available?)2004-11-10Paper
Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman Problem
Mathematics of Computation
2004-08-13Paper
scientific article; zbMATH DE number 1890835 (Why is no real title available?)2003-09-30Paper
Validation of Elliptic Curve Public Keys
Public Key Cryptography — PKC 2003
2003-07-27Paper
scientific article; zbMATH DE number 1857527 (Why is no real title available?)2003-05-19Paper
An efficient protocol for authenticated key agreement
Designs, Codes and Cryptography
2003-04-28Paper
Solving elliptic curve discrete logarithm problems using Weil descent
Journal of the Ramanujan Mathematical Society
2003-02-25Paper
The state of elliptic curve cryptography
Designs, Codes and Cryptography
2002-10-22Paper
scientific article; zbMATH DE number 1759279 (Why is no real title available?)2002-06-25Paper
scientific article; zbMATH DE number 1617935 (Why is no real title available?)2002-06-02Paper
scientific article; zbMATH DE number 1617931 (Why is no real title available?)2001-09-10Paper
scientific article; zbMATH DE number 1409225 (Why is no real title available?)2000-03-01Paper
scientific article; zbMATH DE number 1304129 (Why is no real title available?)2000-02-02Paper
scientific article; zbMATH DE number 1341873 (Why is no real title available?)2000-02-01Paper
scientific article; zbMATH DE number 1149909 (Why is no real title available?)1998-11-17Paper
scientific article; zbMATH DE number 954401 (Why is no real title available?)1996-12-08Paper
Reducing elliptic curve logarithms to logarithms in a finite field
IEEE Transactions on Information Theory
1994-10-03Paper
Counting Points on Elliptic Curves Over F 2 m
Mathematics of Computation
1994-07-10Paper
scientific article; zbMATH DE number 503336 (Why is no real title available?)1994-05-24Paper
Elliptic curve cryptosystems and their implementation
Journal of Cryptology
1994-01-19Paper
scientific article; zbMATH DE number 438988 (Why is no real title available?)1993-11-01Paper
A note on cyclic groups, finite fields, and the discrete logarithm problem
Applicable Algebra in Engineering, Communication and Computing
1992-12-14Paper
Subgroup Refinement Algorithms for Root Finding in $GF(q)$
SIAM Journal on Computing
1992-06-28Paper
On the Number of Self-Dual Bases of GF(q m ) Over GF(q)
Proceedings of the American Mathematical Society
1990-01-01Paper
scientific article; zbMATH DE number 4200379 (Why is no real title available?)1990-01-01Paper
scientific article; zbMATH DE number 4191556 (Why is no real title available?)1990-01-01Paper


Research outcomes over time


This page was built for person: Alfred Menezes