Crypto Galore!
From MaRDI portal
Publication:2908530
DOI10.1007/978-3-642-30891-8_3zbMath1358.94002OpenAlexW2915052227MaRDI QIDQ2908530
Publication date: 5 September 2012
Published in: The Multivariate Algorithmic Revolution and Beyond (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-30891-8_3
Analysis of algorithms and problem complexity (68Q25) Cryptography (94A60) History of information and communication theory (94-03) History of computer science (68-03)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Factoring integers with elliptic curves
- Colorings and orientations of graphs
- Another look at security definitions
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- A polynomial-time algorithm for breaking the basic Merkle - Hellman cryptosystem
- Public-Key Encryption in the Bounded-Retrieval Model
- Secret Codes and Online Security: A Seminar for Entering Students
- Random Curves
- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
- Signature Schemes with Bounded Leakage Resilience
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- A note on the complexity of cryptography (Corresp.)
- CRYPTOGRAPHY AS A TEACHING TOOL
- Theory of Cryptography
- Theory of Cryptography
- Algebraic aspects of cryptography. With an appendix on hyperelliptic curves by Alfred J. Menezes, Yi-Hong Wu, and Robert J. Zuccherato
This page was built for publication: Crypto Galore!