Publication | Date of Publication | Type |
---|
Critical perspectives on provable security: fifteen years of ``another look papers | 2019-09-19 | Paper |
On the cost of computing isogenies between supersingular elliptic curves | 2019-02-20 | Paper |
On the security of the WOTS-PRF signature scheme | 2019-02-15 | Paper |
On isogeny graphs of supersingular elliptic curves over finite fields | 2018-12-19 | Paper |
Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields | 2018-11-15 | Paper |
Another look at tightness. II: Practical issues in cryptography | 2017-10-23 | Paper |
On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One | 2017-09-08 | Paper |
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields | 2017-08-08 | Paper |
Fault Attacks on Pairing-Based Protocols: Revisited | 2017-05-16 | Paper |
Type 2 Structure-Preserving Signature Schemes Revisited | 2016-06-10 | Paper |
Cryptocash, cryptocurrencies, and cryptocontracts | 2016-02-02 | Paper |
The random oracle model: a twenty-year retrospective | 2015-10-26 | Paper |
Computing Discrete Logarithms in $${\mathbb F}_{3^{6 \cdot 137}}$$ and $${\mathbb F}_{3^{6 \cdot 163}}$$ Using Magma | 2015-10-01 | Paper |
Another Look at Security Theorems for 1-Key Nested MACs | 2015-06-22 | Paper |
Weakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptography | 2015-01-30 | Paper |
Another look at non-uniformity | 2014-05-02 | Paper |
Weakness of $\mathbb{F}_{3^{6 \cdot 509}}$ for Discrete Logarithm Cryptography | 2014-02-18 | Paper |
Another look at HMAC | 2013-11-12 | Paper |
Another look at security definitions | 2013-05-06 | Paper |
Generalizations of Verheul's theorem to asymmetric pairings | 2013-05-06 | Paper |
Implementing Pairings at the 192-Bit Security Level | 2013-04-04 | Paper |
Another Look at Provable Security | 2012-06-29 | Paper |
Another Look at Tightness | 2012-06-08 | Paper |
Discrete logarithms, Diffie-Hellman, and reductions | 2012-03-29 | Paper |
Parallelizing the Weil and Tate Pairings | 2011-12-16 | Paper |
On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited | 2011-08-10 | Paper |
A Generic Variant of NIST’s KAS2 Key Agreement Protocol | 2011-07-07 | Paper |
Elliptic curve cryptography: the serpentine course of a paradigm shift | 2011-04-08 | Paper |
On reusing ephemeral keys in Diffie-Hellman key agreement protocols | 2011-04-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q3062282 | 2011-01-03 | Paper |
Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols | 2010-12-07 | Paper |
On the asymptotic effectiveness of Weil descent attacks | 2010-11-12 | Paper |
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings | 2010-07-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q3561288 | 2010-05-25 | Paper |
Comparing two pairing-based aggregate signature schemes | 2010-05-19 | Paper |
A New Protocol for the Nearby Friend Problem | 2010-01-07 | Paper |
Reusing Static Keys in Key Agreement Protocols | 2009-12-17 | Paper |
Comparing the pre- and post-specified peer models for key agreement | 2009-05-12 | Paper |
Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q3614009 | 2009-03-16 | Paper |
Another look at non-standard discrete log and Diffie-Hellman problems | 2009-03-03 | Paper |
Comparing the Pre- and Post-specified Peer Models for Key Agreement | 2008-07-08 | Paper |
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols | 2008-04-11 | Paper |
Another Look at “Provable Security”. II | 2008-04-11 | Paper |
Another look at HMQV | 2008-02-21 | Paper |
Supersingular Elliptic Curves in Cryptography | 2007-11-29 | Paper |
Software Implementation of Arithmetic in | 2007-11-15 | Paper |
Another look at ``provable security | 2007-05-24 | Paper |
Another look at generic groups | 2007-04-05 | Paper |
Formulas for cube roots in \(\mathbb F_{3^m}\) | 2007-03-02 | Paper |
Cryptography and Coding | 2006-11-01 | Paper |
Cryptographic implications of Hess' generalized GHS attack | 2006-09-12 | Paper |
On the number of trace-one elements in polynomial bases for \({\mathbb F}_{2^n}\) | 2006-05-29 | Paper |
Algebraic curves and cryptography | 2005-09-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4664851 | 2005-04-08 | Paper |
A Survey of Public-Key Cryptosystems | 2005-02-25 | Paper |
Security of signature schemes in a multi-user setting | 2005-01-17 | Paper |
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree | 2004-11-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4826108 | 2004-11-10 | Paper |
Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman Problem | 2004-08-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4800273 | 2003-09-30 | Paper |
Validation of Elliptic Curve Public Keys | 2003-07-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4788576 | 2003-05-19 | Paper |
An efficient protocol for authenticated key agreement | 2003-04-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q2765411 | 2003-02-25 | Paper |
The state of elliptic curve cryptography | 2002-10-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536202 | 2002-06-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724449 | 2002-06-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4940065 | 2000-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250828 | 2000-02-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4263430 | 2000-02-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4387321 | 1998-11-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4718481 | 1996-12-08 | Paper |
Reducing elliptic curve logarithms to logarithms in a finite field | 1994-10-03 | Paper |
Counting Points on Elliptic Curves Over F 2 m | 1994-07-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279672 | 1994-05-24 | Paper |
Elliptic curve cryptosystems and their implementation | 1994-01-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q3141896 | 1993-11-01 | Paper |
A note on cyclic groups, finite fields, and the discrete logarithm problem | 1992-12-14 | Paper |
Subgroup Refinement Algorithms for Root Finding in $GF(q)$ | 1992-06-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q3211242 | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3349031 | 1990-01-01 | Paper |
On the Number of Self-Dual Bases of GF(q m ) Over GF(q) | 1990-01-01 | Paper |