An Introduction to Mathematical Cryptography
From MaRDI portal
Publication:5459445
DOI10.1007/978-0-387-77993-5zbMath1160.94001OpenAlexW4298107213MaRDI QIDQ5459445
Jill Pipher, Joseph H. Silverman, Jeffrey Hoffstein
Publication date: 28 April 2008
Published in: Undergraduate Texts in Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-0-387-77993-5
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01)
Related Items (41)
Complexity analysis of a top down algorithm motivated by power product expansions ⋮ Dictionary based codes involving power product expansions ⋮ Dictionary coding via perfect polynomials ⋮ The soft graphic integer sub-decomposition method for elliptic scalar multiplication ⋮ The elliptic scalar multiplication graph and its application in elliptic curve cryptography ⋮ AUTHENTICATED TRIPARTITE KEY AGREEMENT PROTOCOL USING DIGITAL SIGNATURE ALGORITHM ⋮ Group ring based public key cryptosystems ⋮ Improved lower bound for Diffie-Hellman problem using multiplicative group of a finite field as auxiliary group ⋮ A deterministic algorithm for the discrete logarithm problem in a semigroup ⋮ A Public Key Cryptosystem Using Hiil's Cipher ⋮ Computational Number Theory and Cryptography ⋮ A non-commutative cryptosystem based on quaternion algebras ⋮ Isogenies of abelian varieties over finite fields ⋮ PASS-encrypt: a public key cryptosystem based on partial evaluation of polynomials ⋮ Provably secure proxy signature scheme from factorization ⋮ Efficient Nyberg-Rueppel type of NTRU digital signature algorithm ⋮ New orthogonality criterion for shortest vector of lattices and its applications ⋮ $$\mathsf {HIKE}$$ : Walking the Privacy Trail ⋮ A key agreement protocol based on spiking neural P systems with anti-spikes ⋮ Security considerations for Galois non-dual RLWE families ⋮ Fault analysis of the NTRUSign digital signature scheme ⋮ Storage efficient algorithm for Hermite normal form using LLL ⋮ ETRU: NTRU over the Eisenstein integers ⋮ Cryptanalysis of the Knapsack Generator ⋮ Unnamed Item ⋮ Cryptanalysis of Dual RSA ⋮ Deciphering an Undergraduate Cryptology Course ⋮ Unnamed Item ⋮ NTRU over rings beyond \(\mathbb{Z}\) ⋮ An experimental comparison of some LLL-type lattice basis reduction algorithms ⋮ Cryptanalysis of a Matrix-based MOR System ⋮ Towards Optimal Bounds for Implicit Factorization Problem ⋮ Symmetric cryptoalgorithms in the residue number system ⋮ Fast projective synchronization of fractional order chaotic and reverse chaotic systems with its application to an affine cipher using date of birth (DOB) ⋮ Automorphisms of types and their applications ⋮ Lifting and Elliptic Curve Discrete Logarithms ⋮ On the Rabin Signature ⋮ Satins, lattices, and extended Euclid's algorithm ⋮ Residue number system asymmetric cryptoalgorithms ⋮ The Rabin cryptosystem revisited ⋮ Some remarks on the oscillator group
This page was built for publication: An Introduction to Mathematical Cryptography