scientific article; zbMATH DE number 1406786
From MaRDI portal
zbMATH Open0939.94564MaRDI QIDQ4940702FDOQ4940702
Authors: Ueli M. Maurer
Publication date: 1 March 2000
Title of this publication is not available (Why is that?)
Recommendations
Cited In (32)
- Computational Number Theory and Cryptography
- The GN-authenticated key agreement
- Title not available (Why is that?)
- On relationship of computational Diffie-Hellman problem and computational square-root exponent problem
- Fast generation of prime numbers and secure public-key cryptographic parameters.
- Cryptographic group and semigroup actions
- Breaking RSA Generically Is Equivalent to Factoring
- On the Equivalence of Generic Group Models
- An observation on associative one-way functions in complexity theory
- Algorithms for black-box fields and their application to cryptography
- The kernel matrix Diffie-Hellman assumption
- Improved lower bound for Diffie-Hellman problem using multiplicative group of a finite field as auxiliary group
- Cryptographic multilinear maps using pro-\(p\) groups
- An Analysis of the Vector Decomposition Problem
- Short paper: The proof is in the pudding. Proofs of work for solving discrete logarithms
- A note on non-interactive zero-knowledge from CDH
- Full quantum equivalence of group action DLog and CDH, and more
- Weakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptography
- Full quantum equivalence of group action DLog and CDH, and more
- An elliptic curve analogue of McCurley's key agreement scheme
- Analysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputs
- On the statistical properties of Diffie-Hellman distributions
- Synthesizers and their application to the parallel construction of pseudo-random functions
- On the complexity of the discrete logarithm and Diffie-Hellman problems
- Pairing-free blind signatures from CDH assumptions
- Comparing two pairing-based aggregate signature schemes
- Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman Problem
- Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
- Generic groups, collision resistance, and ECDSA
- On the impossibility of purely algebraic signatures
- Weakness of $\mathbb{F}_{3^{6 \cdot 509}}$ for Discrete Logarithm Cryptography
- Diffie-Hellman Oracles
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4940702)