scientific article; zbMATH DE number 2081059
From MaRDI portal
Publication:4474166
zbMATH Open1062.94550MaRDI QIDQ4474166FDOQ4474166
Publication date: 4 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2248/22480067.htm
Title of this publication is not available (Why is that?)
Recommendations
Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Cited In (19)
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Secure and Efficient Pairing at 256-Bit Security Level
- A Brief History of Pairings
- On the elliptic curves \(y^{2}=x^{3} - c\) with embedding degree one
- Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields
- Updating key size estimations for pairings
- New number-theoretic cryptographic primitives
- Computation of a 768-Bit Prime Field Discrete Logarithm
- A taxonomy of pairing-friendly elliptic curves
- On the security of RSA with primes sharing least-significant bits
- An Adaptation of the NICE Cryptosystem to Real Quadratic Orders
- Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case
- Weakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptography
- List signature schemes
- A security analysis of two classes of RSA-like cryptosystems
- Instantiability of RSA-OAEP under chosen-plaintext attack
- The number field sieve for integers of low weight
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH
- Selecting cryptographic key sizes
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4474166)