Alfred Menezes

From MaRDI portal
(Redirected from Person:1196515)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Critical perspectives on provable security: fifteen years of ``another look papers
Advances in Mathematics of Communications
2019-09-19Paper
On the cost of computing isogenies between supersingular elliptic curves2019-02-20Paper
On the security of the WOTS-PRF signature scheme
Advances in Mathematics of Communications
2019-02-15Paper
On isogeny graphs of supersingular elliptic curves over finite fields
Finite Fields and their Applications
2018-12-19Paper
Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields
Advances in Mathematics of Communications
2018-11-15Paper
Another look at tightness. II: Practical issues in cryptography2017-10-23Paper
On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One
IEEE Transactions on Computers
2017-09-08Paper
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields
IEEE Transactions on Computers
2017-08-08Paper
Fault Attacks on Pairing-Based Protocols: Revisited
IEEE Transactions on Computers
2017-05-16Paper
Type 2 structure-preserving signature schemes revisited
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Cryptocash, cryptocurrencies, and cryptocontracts
Designs, Codes and Cryptography
2016-02-02Paper
The random oracle model: a twenty-year retrospective
Designs, Codes and Cryptography
2015-10-26Paper
Computing discrete logarithms in \(\mathbb F_{3^{6 \cdot 137}}\) and \(\mathbb F_{3^{6 \cdot 163}}\) using Magma
Arithmetic of Finite Fields
2015-10-01Paper
Another Look at Security Theorems for 1-Key Nested MACs
Open Problems in Mathematics and Computational Science
2015-06-22Paper
Weakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptography
Finite Fields and their Applications
2015-01-30Paper
Another look at non-uniformity
Groups - Complexity - Cryptology
2014-05-02Paper
Weakness of $\mathbb{F}_{3^{6 \cdot 509}}$ for Discrete Logarithm Cryptography
Pairing-Based Cryptography – Pairing 2013
2014-02-18Paper
Another look at HMAC
Journal of Mathematical Cryptology
2013-11-12Paper
Another look at security definitions
Advances in Mathematics of Communications
2013-05-06Paper
Generalizations of Verheul's theorem to asymmetric pairings
Advances in Mathematics of Communications
2013-05-06Paper
Implementing pairings at the 192-bit security level
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Another look at provable security. (Abstract)
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Another look at tightness
Selected Areas in Cryptography
2012-06-08Paper
Discrete logarithms, Diffie-Hellman, and reductions
Vietnam Journal of Mathematics
2012-03-29Paper
Parallelizing the Weil and Tate pairings
Cryptography and Coding
2011-12-16Paper
On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited
Discrete Applied Mathematics
2011-08-10Paper
A generic variant of NIST'S KAS2 key agreement protocol
Information Security and Privacy
2011-07-07Paper
Elliptic curve cryptography: the serpentine course of a paradigm shift
Journal of Number Theory
2011-04-08Paper
On reusing ephemeral keys in Diffie-Hellman key agreement protocols
International Journal of Applied Cryptography
2011-04-05Paper
Intractable problems in cryptography2011-01-03Paper
Combined security analysis of the one- and three-pass unified model key agreement protocols
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
On the asymptotic effectiveness of Weil descent attacks
Journal of Mathematical Cryptology
2010-11-12Paper
On the efficiency and security of pairing-based protocols in the type 1 and type 4 settings
Arithmetic of Finite Fields
2010-07-20Paper
The brave new world of bodacious assumptions in cryptography2010-05-25Paper
Comparing two pairing-based aggregate signature schemes
Designs, Codes and Cryptography
2010-05-19Paper
A new protocol for the nearby friend problem
Cryptography and Coding
2010-01-07Paper
Reusing static keys in key agreement protocols
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Comparing the pre- and post-specified peer models for key agreement
International Journal of Applied Cryptography
2009-05-12Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
An introduction to pairing-based cryptography2009-03-16Paper
Another look at non-standard discrete log and Diffie-Hellman problems
Journal of Mathematical Cryptology
2009-03-03Paper
Comparing the Pre- and Post-specified Peer Models for Key Agreement
Information Security and Privacy
2008-07-08Paper
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Another Look at “Provable Security”. II
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Another look at HMQV
Mathematical Cryptology
2008-02-21Paper
Supersingular Elliptic Curves in Cryptography
Pairing-Based Cryptography – Pairing 2007
2007-11-29Paper
Software Implementation of Arithmetic in
Arithmetic of Finite Fields
2007-11-15Paper
Another look at ``provable security
Journal of Cryptology
2007-05-24Paper
Another look at generic groups
Advances in Mathematics of Communications
2007-04-05Paper
Formulas for cube roots in \(\mathbb F_{3^m}\)
Discrete Applied Mathematics
2007-03-02Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Cryptographic implications of Hess' generalized GHS attack
Applicable Algebra in Engineering, Communication and Computing
2006-09-12Paper
On the number of trace-one elements in polynomial bases for \({\mathbb F}_{2^n}\)
Designs, Codes and Cryptography
2006-05-29Paper
Algebraic curves and cryptography
Finite Fields and their Applications
2005-09-22Paper
scientific article; zbMATH DE number 2154287 (Why is no real title available?)2005-04-08Paper
A Survey of Public-Key Cryptosystems
SIAM Review
2005-02-25Paper
Security of signature schemes in a multi-user setting
Designs, Codes and Cryptography
2005-01-17Paper
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
LMS Journal of Computation and Mathematics
2004-11-18Paper
scientific article; zbMATH DE number 2114384 (Why is no real title available?)2004-11-10Paper
Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman Problem
Mathematics of Computation
2004-08-13Paper
scientific article; zbMATH DE number 1890835 (Why is no real title available?)2003-09-30Paper
Validation of Elliptic Curve Public Keys
Public Key Cryptography — PKC 2003
2003-07-27Paper
scientific article; zbMATH DE number 1857527 (Why is no real title available?)2003-05-19Paper
An efficient protocol for authenticated key agreement
Designs, Codes and Cryptography
2003-04-28Paper
Solving elliptic curve discrete logarithm problems using Weil descent
Journal of the Ramanujan Mathematical Society
2003-02-25Paper
The state of elliptic curve cryptography
Designs, Codes and Cryptography
2002-10-22Paper
scientific article; zbMATH DE number 1759279 (Why is no real title available?)2002-06-25Paper
scientific article; zbMATH DE number 1617935 (Why is no real title available?)2002-06-02Paper
scientific article; zbMATH DE number 1617931 (Why is no real title available?)2001-09-10Paper
scientific article; zbMATH DE number 1409225 (Why is no real title available?)2000-03-01Paper
scientific article; zbMATH DE number 1304129 (Why is no real title available?)2000-02-02Paper
scientific article; zbMATH DE number 1341873 (Why is no real title available?)2000-02-01Paper
scientific article; zbMATH DE number 1149909 (Why is no real title available?)1998-11-17Paper
scientific article; zbMATH DE number 954401 (Why is no real title available?)1996-12-08Paper
Reducing elliptic curve logarithms to logarithms in a finite field
IEEE Transactions on Information Theory
1994-10-03Paper
Counting Points on Elliptic Curves Over F 2 m
Mathematics of Computation
1994-07-10Paper
scientific article; zbMATH DE number 503336 (Why is no real title available?)1994-05-24Paper
Elliptic curve cryptosystems and their implementation
Journal of Cryptology
1994-01-19Paper
scientific article; zbMATH DE number 438988 (Why is no real title available?)1993-11-01Paper
A note on cyclic groups, finite fields, and the discrete logarithm problem
Applicable Algebra in Engineering, Communication and Computing
1992-12-14Paper
Subgroup Refinement Algorithms for Root Finding in $GF(q)$
SIAM Journal on Computing
1992-06-28Paper
On the Number of Self-Dual Bases of GF(q m ) Over GF(q)
Proceedings of the American Mathematical Society
1990-01-01Paper
scientific article; zbMATH DE number 4200379 (Why is no real title available?)1990-01-01Paper
scientific article; zbMATH DE number 4191556 (Why is no real title available?)1990-01-01Paper


Research outcomes over time


This page was built for person: Alfred Menezes