scientific article

From MaRDI portal
Publication:3792737

zbMath0648.10001MaRDI QIDQ3792737

Neal Koblitz

Publication date: 1987


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (35)

Finding pseudoprimesA one-way function from thermodynamics and applications to cryptographyEfficient data mappings for parity-declustered data layoutsGeometry of \(p\)-adic Siegel discsHardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related SchemesFast generation of prime numbers and secure public-key cryptographic parameters.Speeding up the computations of elliptic curves cryptoschemesAnalysis and design of a secure key exchange schemeBatch Diffie-Hellman key agreement systemsApplying quick exponentiation for block upper triangular matricesHighly parallel modular multiplier for elliptic curve cryptography in residue number systemHyperelliptic cryptosystemsRSA, Dickson, LUC and Williams: a study on four polynomial-type public-key cryptosystemsEfficient RSA key generation and threshold Paillier in the two-party settingOn the subfield subcodes of Hermitian codesAn approximate expression related with RSA fixed pointsDistributed user identification by zero-knowledge access rights provingSome remarks on the arithmetic properties of recursive sequences on elliptic curves over a finite fieldA congruence for the number of alternating permutationsThe block cipher SquareCryptanalysis of a public key system based on Diophantine equationsDensity of Carmichael numbers with three prime factorsA fast modular square computing method based on the generalized Chinese remainder theorem for prime moduliA nonlinear elliptic curve cryptosystem based on matricesThe Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise AppearanceAlgorithms of information authentication for the automatic control systems on the basis of structures in finite vector spacesA serial version of the Pohlig-Hellman algorithm for computing discrete logarithmsOn the security properties of Russian standardized elliptic curvesAn algorithmic view of pseudochaosNew algorithms and protocols for information authentication in automatic control systemsCryptography and elliptic curvesOn Carmichael polynomialsGeneralized strong pseudoprime tests and applicationsElliptic curve cryptosystems and their implementationSome remarks on strong Fibonacci pseudoprimes




This page was built for publication: