scientific article; zbMATH DE number 1349933

From MaRDI portal
Publication:4265362

zbMath0937.94008MaRDI QIDQ4265362

Gadiel Seroussi, Ian F. Blake, Nigel P. Smart

Publication date: 11 October 1999


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Avoiding side-channel attacks by computing isogenous and isomorphic elliptic curvesPairing-based cryptography on elliptic curvesPolynomial interpolation of the Naor-Reingold pseudo-random functionOn the 2-adic valuation of the cardinality of elliptic curves over finite extensions of \(\mathbb{F}_{q}\)Generating anomalous elliptic curvesNew lattice attacks on DSA schemesUnnamed ItemSelf-inversive Hilbert space operator polynomials with spectrum on the unit circleComments on efficient batch verification test for digital signatures based on elliptic curvesHigh-performance generic-point parallel scalar multiplicationFurther refinement of pairing computation based on Miller's algorithmA review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass pointEfficient software-implementation of finite fields with applications to cryptographyHardware implementation of finite-field divisionOn the complexity of parallel algorithms for computing inverses in \(\text{GF}(2^m)\) with \(m\) primeScalable and systolic architecture for computing double exponentiation over \(\text{GF}(2^m)\)Analysis and design of a secure key exchange schemeA semantically secure public key cryptoscheme using bit-pair shadowsA provably secure non-iterative hash function resisting birthday attackA Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical SecurityThe generalized Weil pairing and the discrete logarithm problem on elliptic curvesSmall exponent point groups on elliptic curvesModular composition modulo triangular sets and applicationsComplexity of computation in finite fieldsInferring sequences produced by elliptic curve generators using Coppersmith's methodsSubgroup Security in Pairing-Based CryptographyIrreducible compositions of polynomials over finite fields of even characteristicAttacking the linear congruential generator on elliptic curves via lattice techniquesExponential sums over points of elliptic curvesSelf-pairings on supersingular elliptic curves with embedding degree \textit{three}On the Security of Supersingular Isogeny CryptosystemsShort signatures without random oracles and the SDH assumption in bilinear groupsCryptography on elliptic curves over \(p\) -adic number fieldsA public key cryptosystem based on three new provable problemsSpreading alerts quietly and the subgroup escape problemFast arithmetics in Artin-Schreier towers over finite fieldsFormalization of definitions and theorems related to an elliptic curve over a finite prime field by using MizarSome lattice attacks on DSA and ECDSASolving \(x+x^{2^l}+\ldots +x^{2^{ml}}=a\) over \(\mathbb{F}_{2^n} \)On oracle factoring of integersRecent progress on the elliptic curve discrete logarithm problemSingular points of cyclic weighted shift matricesA note on the kernel of group homomorphism of the Weil descent methodFault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptographyEndomorphisms for faster elliptic curve cryptography on a large class of curvesCounting points on hyperelliptic curves in average polynomial timeNovel bit-parallel multiplier for \(\mathrm{GF}(2^m)\) defined by all-one polynomial using generalized Karatsuba algorithmEfficient selective identity-based encryption without random oraclesOn hardware and software implementation of arithmetic in finite fields of characteristic 7 for calculation of pairingsPrivate key agreement and secure communication for heterogeneous sensor networksClosed formulae for the Weil pairing inversionThe Diffie-Hellman key exchange protocol and non-Abelian nilpotent groupsExtended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysisAll-in-one group-oriented cryptosystem based on bilinear pairingComputational hardness of IFP and ECDLPAssessing the effectiveness of artificial neural networks on problems related to elliptic curve cryptographyComputing the height of volcanoes of \(\ell \)-isogenies of elliptic curves over finite fieldsSolving some affine equations over finite fieldsImproving e-payment security using elliptic curve cryptosystemA nonlinear elliptic curve cryptosystem based on matricesA transform property of Kloosterman sumsHow to compute modular exponentiation with large operators based on the right-to-left binary algorithmSelf-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceabilityEfficient algorithms for Koblitz curves over fields of characteristic threeProtecting ECC against fault attacks: the ring extension method revisitedComputing the $\ell $-power torsion of an elliptic curve over a finite fieldOn the bit security of the Diffie-Hellman keyAsymptotic granularity reduction and its applicationRamanujan's class invariants and their use in elliptic curve cryptographyComplexity bounds on Semaev's naive index calculus method for ECDLPAlgebraic approaches for solving isogeny problems of prime power degreesOn automorphism groups of cyclotomic function fields over finite fieldsComputing pairings using \(x\)-coordinates onlyInferring sequences produced by a linear congruential generator on elliptic curves missing high-order bitsAlgebraic cryptography: new constructions and their security against provable breakComputing Hilbert class polynomials with the Chinese remainder theoremConstructive and destructive use of compilers in elliptic curve cryptographyInferring Sequences Produced by a Linear Congruential Generator on Elliptic Curves Using Coppersmith’s MethodsOperations of points on elliptic curve in affine coordinatesCryptographic hash functions from expander graphsBinary Kloosterman Sums with Value 4On the complexity of the discrete logarithm and Diffie-Hellman problemsComputing zeta functions of Artin-Schreier curves over finite fields. IIA note on window \(\tau\)-NAF algorithmA blind signature scheme based on bilinear pairingsSelf-certified multi-proxy signature schemes with message recoveryOn the relationship between squared pairings and plain pairingsEfficient system parameters for Identity-Based Encryption using supersingular elliptic curvesNovel hybrid-size digit-serial systolic multiplier over \(\mathrm{GF}(2^m)\)The GN-authenticated key agreementEfficient algorithms for speeding up the computations of elliptic curve cryptosystemsEfficient proxy signature schemes using self-certified public keysAn efficient deterministic test for Kloosterman sum zerosDesign, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor NetworksConstructive and destructive facets of Weil descent on elliptic curvesUnnamed ItemOn the arithmetic operations over finite fields of characteristic three with low complexityA note on the \(x\)-coordinate of points on an elliptic curve in characteristic twoRecurrent methods for constructing irreducible polynomials over \(\mathbb F_{q}\) of odd characteristics.Efficient FPGA design of exception-free generic elliptic curve cryptosystemsAn efficient ECDSA-based signature scheme for wireless networksEfficient Arithmetic on Elliptic Curves over Fields of Characteristic ThreeHardware realization of fast elliptic curve point multiplication using balanced ternary representation and pre-computation overGF(p)Modular equations for hyperelliptic curvesGeneralised Mersenne numbers revisitedSNARGs and PPAD hardness from the decisional Diffie-Hellman assumptionHorizontal racewalking using radical isogeniesThe "Elliptic" matrices and a new kind of cryptographyAcceleration of Index Calculus for Solving ECDLP over Prime Fields and Its LimitationA Tree-Based Approach for Computing Double-Base ChainsA note on factorisation patterns of division polynomials of elliptic curves over finite fieldsOn the number of isogeny classes of pairing-friendly elliptic curves and statistics of MNT curvesModular polynomials via isogeny volcanoesFinding smooth integers in short intervals using CRT decodingA NEW HYBRID ENCRYPTION SCHEMEDeterministic methods of Ramanujan graph construction for use in cryptographic algorithms based on generalized cellular automataMinimality and other properties of the width-𝑤 nonadjacent formFast algorithms for computing isogenies between elliptic curvesAlgebraic curves and cryptographyChoosing the correct elliptic curve in the CM methodA comparison of different finite fields for elliptic curve cryptosystemsPairings in Trusted ComputingOn the efficient generation of prime-order elliptic curvesОб алгоритмах построения изогений эллиптических кривых над конечными полями и их приложенияхО вычислении кратных точек на эллиптических кривых над конечными полями с использованием нескольких оснований систем счисления и новых видов координатOptimizing Double-Base Elliptic-Curve Single-Scalar MultiplicationEndomorphisms for Faster Elliptic Curve Cryptography on a Large Class of CurvesНесколько замечаний о задаче дискретного логарифмирования на эллиптических кривыхConstruction of strong elliptic curves suitable for cryptographic applicationsExponent Recoding and Regular Exponentiation AlgorithmsLifting and Elliptic Curve Discrete LogarithmsEfficient scalar multiplication for elliptic curves over binary fieldsFinding the Eigenvalue in Elkies' AlgorithmType-Based Proxy Re-encryption and Its ConstructionA Public-Key Encryption Scheme with Pseudo-random CiphertextsDistribution and Polynomial Interpolation of the Dodis-Yampolskiy Pseudo-Random Function