Notice: Unexpected clearActionName after getActionName already called in /var/www/html/includes/context/RequestContext.php on line 338
Alfred J. Menezes - MaRDI portal

Alfred J. Menezes

From MaRDI portal
(Redirected from Person:702186)
Person:1196515

Available identifiers

zbMath Open menezes.alfred-jWikidataQ61477754 ScholiaQ61477754MaRDI QIDQ1196515

List of research outcomes

PublicationDate of PublicationType
Critical perspectives on provable security: fifteen years of ``another look papers2019-09-19Paper
On the cost of computing isogenies between supersingular elliptic curves2019-02-20Paper
On the security of the WOTS-PRF signature scheme2019-02-15Paper
On isogeny graphs of supersingular elliptic curves over finite fields2018-12-19Paper
Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields2018-11-15Paper
Another look at tightness. II: Practical issues in cryptography2017-10-23Paper
On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One2017-09-08Paper
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields2017-08-08Paper
Fault Attacks on Pairing-Based Protocols: Revisited2017-05-16Paper
Type 2 Structure-Preserving Signature Schemes Revisited2016-06-10Paper
Cryptocash, cryptocurrencies, and cryptocontracts2016-02-02Paper
The random oracle model: a twenty-year retrospective2015-10-26Paper
Computing Discrete Logarithms in $${\mathbb F}_{3^{6 \cdot 137}}$$ and $${\mathbb F}_{3^{6 \cdot 163}}$$ Using Magma2015-10-01Paper
Another Look at Security Theorems for 1-Key Nested MACs2015-06-22Paper
Weakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptography2015-01-30Paper
Another look at non-uniformity2014-05-02Paper
Weakness of $\mathbb{F}_{3^{6 \cdot 509}}$ for Discrete Logarithm Cryptography2014-02-18Paper
Another look at HMAC2013-11-12Paper
Another look at security definitions2013-05-06Paper
Generalizations of Verheul's theorem to asymmetric pairings2013-05-06Paper
Implementing Pairings at the 192-Bit Security Level2013-04-04Paper
Another Look at Provable Security2012-06-29Paper
Another Look at Tightness2012-06-08Paper
Discrete logarithms, Diffie-Hellman, and reductions2012-03-29Paper
Parallelizing the Weil and Tate Pairings2011-12-16Paper
On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited2011-08-10Paper
A Generic Variant of NIST’s KAS2 Key Agreement Protocol2011-07-07Paper
Elliptic curve cryptography: the serpentine course of a paradigm shift2011-04-08Paper
On reusing ephemeral keys in Diffie-Hellman key agreement protocols2011-04-05Paper
https://portal.mardi4nfdi.de/entity/Q30622822011-01-03Paper
Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols2010-12-07Paper
On the asymptotic effectiveness of Weil descent attacks2010-11-12Paper
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings2010-07-20Paper
https://portal.mardi4nfdi.de/entity/Q35612882010-05-25Paper
Comparing two pairing-based aggregate signature schemes2010-05-19Paper
A New Protocol for the Nearby Friend Problem2010-01-07Paper
Reusing Static Keys in Key Agreement Protocols2009-12-17Paper
Comparing the pre- and post-specified peer models for key agreement2009-05-12Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
https://portal.mardi4nfdi.de/entity/Q36140092009-03-16Paper
Another look at non-standard discrete log and Diffie-Hellman problems2009-03-03Paper
Comparing the Pre- and Post-specified Peer Models for Key Agreement2008-07-08Paper
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols2008-04-11Paper
Another Look at “Provable Security”. II2008-04-11Paper
Another look at HMQV2008-02-21Paper
Supersingular Elliptic Curves in Cryptography2007-11-29Paper
Software Implementation of Arithmetic in2007-11-15Paper
Another look at ``provable security2007-05-24Paper
Another look at generic groups2007-04-05Paper
Formulas for cube roots in \(\mathbb F_{3^m}\)2007-03-02Paper
Cryptography and Coding2006-11-01Paper
Cryptographic implications of Hess' generalized GHS attack2006-09-12Paper
On the number of trace-one elements in polynomial bases for \({\mathbb F}_{2^n}\)2006-05-29Paper
Algebraic curves and cryptography2005-09-22Paper
https://portal.mardi4nfdi.de/entity/Q46648512005-04-08Paper
A Survey of Public-Key Cryptosystems2005-02-25Paper
Security of signature schemes in a multi-user setting2005-01-17Paper
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree2004-11-18Paper
https://portal.mardi4nfdi.de/entity/Q48261082004-11-10Paper
Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman Problem2004-08-13Paper
https://portal.mardi4nfdi.de/entity/Q48002732003-09-30Paper
Validation of Elliptic Curve Public Keys2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q47885762003-05-19Paper
An efficient protocol for authenticated key agreement2003-04-28Paper
https://portal.mardi4nfdi.de/entity/Q27654112003-02-25Paper
The state of elliptic curve cryptography2002-10-22Paper
https://portal.mardi4nfdi.de/entity/Q45362022002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q27244492002-06-02Paper
https://portal.mardi4nfdi.de/entity/Q49400652000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q42508282000-02-02Paper
https://portal.mardi4nfdi.de/entity/Q42634302000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q43873211998-11-17Paper
https://portal.mardi4nfdi.de/entity/Q47184811996-12-08Paper
Reducing elliptic curve logarithms to logarithms in a finite field1994-10-03Paper
Counting Points on Elliptic Curves Over F 2 m1994-07-10Paper
https://portal.mardi4nfdi.de/entity/Q42796721994-05-24Paper
Elliptic curve cryptosystems and their implementation1994-01-19Paper
https://portal.mardi4nfdi.de/entity/Q31418961993-11-01Paper
A note on cyclic groups, finite fields, and the discrete logarithm problem1992-12-14Paper
Subgroup Refinement Algorithms for Root Finding in $GF(q)$1992-06-28Paper
https://portal.mardi4nfdi.de/entity/Q32112421990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33490311990-01-01Paper
On the Number of Self-Dual Bases of GF(q m ) Over GF(q)1990-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Alfred J. Menezes