Cryptography and computational number theory. Proceedings of the workshop, CCNT'99, Singapore, November 22--26, 1999 (Q1595878)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Cryptography and computational number theory. Proceedings of the workshop, CCNT'99, Singapore, November 22--26, 1999
scientific article

    Statements

    Cryptography and computational number theory. Proceedings of the workshop, CCNT'99, Singapore, November 22--26, 1999 (English)
    0 references
    14 February 2001
    0 references
    The articles of this volume will be reviewed individually. Indexed articles: \textit{Alonso, Cesar; Gutierrez, Jaime; Rubio, Rosario}, On the dimension and the number of parameters of a unirational variety, 3-9 [Zbl 1001.14022] \textit{Conflitti, Alessandro}, On elements of high order in finite fields, 11-14 [Zbl 1003.11058] \textit{Ding, Cunsheng; Kohel, David R.; Ling, San}, Counting the number of points on affine diagonal curves, 15-24 [Zbl 0994.11025] \textit{Friedlander, John B.; Pomerance, Carl; Shparlinski, Igor E.}, Small values of the Carmichael function and cryptographic applications, 25-32 [Zbl 0996.11075] \textit{von zur Gathen, Joachim; Pappalardi, Francesco}, Density estimates related to Gauß periods, 33-41 [Zbl 1010.11069] \textit{Han, Wenbao}, The distribution of the coefficients of primitive polynomials over finite fields, 43-57 [Zbl 0997.11110] \textit{Hoffstein, Jeffrey; Lieman, Daniel}, The distribution of the quadratic symbol in function fields and a faster mathematical stream cipher, 59-68 [Zbl 0999.94533] \textit{Kohel, David R.}, Rational groups of elliptic curves suitable for cryptography, 69-80 [Zbl 1012.11107] \textit{Lam, Kwok Yan; Sica, Francesco}, Effective determination of the proportion of split primes in number fields, 81-92 [Zbl 1020.11081] \textit{Mihăilescu, Preda}, Algorithms for generating, testing and proving primes: A survey, 93-122 [Zbl 0998.11073] \textit{Peralta, René}, Elliptic curve factorization using a ``partially oblivious'' function, 123-128 [Zbl 1012.11108] \textit{van der Poorten, Alf}, The Hermite-Serret algorithm and \(12^2 + 33^2\), 129-136 [Zbl 0996.11025] \textit{Xing, Chaoping}, Applications of algebraic curves to constructions of sequences, 137-146 [Zbl 1011.94011] \textit{Alexandris, Nikos; Burmester, Mike; Chrissikopoulos, Vassilis; Desmedt, Yvo}, Designated 2-verifier proofs and their application to electronic commerce, 149-163 [Zbl 1002.94530] \textit{Dawson, Ed; Simpson, Leonie; Golić, Jovan}, A survey of divide and conquer attacks on certain irregularly clocked stream ciphers, 165-185 [Zbl 1003.94520] \textit{De Bonis, Annalisa; De Santis, Alfredo}, New results on the randomness of visual cryptography schemes, 187-201 [Zbl 1002.94531] \textit{Gollmann, Dieter}, Authentication -- Myths and misconceptions, 203-225 [Zbl 0998.94549] \textit{González Vasco, Maria Isabel; Näslund, Mats}, A survey of hard core functions, 227-255 [Zbl 1002.94533] \textit{González Vasco, Maria Isabel; Shparlinski, Igor E.}, On the security of Diffie-Hellman bits, 257-268 [Zbl 0997.94548] \textit{Hoffstein, Jeffrey; Silverman, Joseph H.}, Polynomial rings and efficient public key authentication. II, 269-286 [Zbl 1002.94535] \textit{Mihăilescu, Preda}, Security of biased sources for cryptographic keys, 287-302 [Zbl 1003.94529] \textit{Näslund, Mats; Russell, Alexander}, Achieving optimal fairness from biased coinflips, 303-319 [Zbl 1096.60501] \textit{Nguyen, Phong Q.}, The dark side of the hidden number problem: Lattice attacks on DSA, 321-330 [Zbl 1003.94530] \textit{Nguyen, Phong Q.; Shparlinski, Igor E.; Stern, Jacques}, Distribution of modular sums and the security of the server aided exponentiation, 331-342 [Zbl 1002.94534] \textit{Safavi-Naini, Rei; Susilo, Willy}, A general construction for fail-stop signature using authentication codes, 343-356 [Zbl 0997.94551] \textit{Safavi-Naini, Rei; Wang, Huaxiong}, Robust additive secret sharing schemes over \(\mathbb{Z}_m\), 357-368 [Zbl 0997.94550] \textit{Silverman, Robert D.}, RSA public key validation, 369-378 [Zbl 0999.94534]
    0 references
    Cryptography
    0 references
    Computational number theory
    0 references
    Workshop
    0 references
    Singapore (Singapore)
    0 references
    Proceedings
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references