Algebraic aspects of cryptography. With an appendix on hyperelliptic curves by Alfred J. Menezes, Yi-Hong Wu, and Robert J. Zuccherato
zbMATH Open0890.94001MaRDI QIDQ5906858FDOQ5906858
Authors: Neal Koblitz
Publication date: 8 February 1998
Published in: Algorithms and Computation in Mathematics (Search for Journal in Brave)
Recommendations
- Algebraic aspects of cryptography. With an appendix on hyperelliptic curves by Alfred J. Menezes, Yi-Hong Wu, and Robert J. Zuccherato
- scientific article; zbMATH DE number 5917127
- scientific article; zbMATH DE number 2154287
- Algebraic curves and cryptography
- Algebraic curves and cryptography
- Algebra for cryptography. With a preface by Massimiliano Sala
- Algebraic curves in cryptography
- Elliptic curves and their applications to cryptography. An introduction
- Cryptographic aspects of real hyperelliptic curves
- Symmetric Cryptography and Algebraic Curves
Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Number-theoretic algorithms; complexity (11Y16) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01)
Cited In (71)
- Polly Two: a new algebraic polynomial-based public-key scheme
- A double large prime variation for small genus hyperelliptic index calculus
- Linear complexity of sequences on Koblitz curves of genus 2
- An explicit construction for \(n\)-contact curves to a smooth cubic via divisions of polynomials and Zariski tuples
- Discrete algebraic methods. Arithmetic, cryptography, automata and groups
- A ciphertext-only attack on Polly Two
- Cryptanalysis of the TRMS Signature Scheme of PKC’05
- Interpolation of the discrete logarithm in \(\mathbb{F}_{q}\) by Boolean functions and by polynomials in several variables modulo a divisor of \(q-1\).
- Geometric characterization of strongly normal extensions
- Hypergroupoids and cryptosystems
- A one-way function from thermodynamics and applications to cryptography
- Polly cracker, revisited
- Algebra for cryptologists
- Algebraic curves and cryptography
- Montgomery Ladder for All Genus 2 Curves in Characteristic 2
- Algebro-geometric solution of the discrete KP equation over a finite field out of a hyperelliptic curve
- Algorithmic problems in right-angled Artin groups: complexity and applications
- Lattice polly cracker cryptosystems
- A Cryptanalysis of the Double-Round Quadratic Cryptosystem
- Selection of secure hyperelliptic curves of \textit{g=2} based on a subfield
- On the security of biquadratic \(C^\ast\) public-key cryptosystems and its generalizations
- On counting and generating curves over small finite fields
- On the key exchange with new cubical maps based on graphs
- Computing discrete logarithms in the Jacobian of high-genus hyperelliptic curves over even characteristic finite fields
- On the iterations of the maps \(ax^{2^k}+b\) and \((a x^{2^k} + b)^{-1}\) over finite fields of characteristic two
- Formulae for arithmetic on genus 2 hyperelliptic curves
- Supersingular hyperelliptic curves of genus 2 over finite fields
- Public-key cryptography and invariant theory
- A review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass point
- Linear complexity of some sequences derived from hyperelliptic curves of genus 2
- Counting isomorphism classes of pointed hyperelliptic curves of genus 4 over finite fields with odd characteristic
- Isomorphism classes of hyperelliptic curves of genus 3 over finite fields
- Irreducible compositions of polynomials over finite fields of even characteristic
- A public key cryptosystem using a group of permutation polynomials
- Recurrent methods for constructing irreducible polynomials over \(\mathbb F_{q}\) of odd characteristics.
- On the complexity of the discrete logarithm and Diffie-Hellman problems
- Efficient RSA key generation and threshold Paillier in the two-party setting
- On dynamical systems of large girth or cycle indicator and their applications to multivariate cryptography
- Cryptosystems using linear groups
- A generic approach to searching for Jacobians
- Computing discrete logarithms in high-genus hyperelliptic Jacobians in provably subexponential time
- An algorithm to compute volcanoes of 2-isogenies of elliptic curves over finite fields
- The Diffie-Hellman key exchange protocol and non-Abelian nilpotent groups
- On families of graphs of large cycle indicator, matrices of large order and key exchange protocols with nonlinear polynomial maps of small degree
- On the comparison of cryptographical properties of two different families of graphs with large cycle indicator
- Gröbner basis cryptosystems
- Eta pairing computation on general divisors over hyperelliptic curves \(y^2=x^p - x+d\)
- Constructing and deconstructing intentional weaknesses in symmetric ciphers
- On small world semiplanes with generalised Schubert cells
- Performance of algebraic graphs based stream-ciphers using large finite fields
- The implementation of cubic public keys based on a new family of algebraic graphs
- A new method for decomposition in the Jacobian of small genus hyperelliptic curves
- Almost Primality of Group Orders of Elliptic Curves Defined over Small Finite Fields
- Generic groups, collision resistance, and ECDSA
- A note on the kernel of group homomorphism of the Weil descent method
- Extending the GLS endomorphism to speed up GHS Weil descent using Magma
- Preimage selective trapdoor function: how to repair an easy problem
- Quantum algorithms for algebraic problems
- On Schubert cells in Grassmannians and new algorithms of multivariate cryptography
- Algebra for cryptography. With a preface by Massimiliano Sala
- Discrete algebraic methods. Arithmetic, cryptography, automata and groups
- Monoidal categories, representation gap and cryptography
- On new examples of families of multivariate stable maps and their cryptographical applications
- On Eulerian semigroups of multivariate transformations and their cryptographic applications
- On new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groups
- Factoring integers and oracles for elliptic and hyperelliptic curves
- Algebraic curves in cryptography
- Crypto galore!
- On the family of cubical multivariate cryptosystems based on the algebraic graph over finite commutative rings of characteristic 2
- Public-key cryptosystems and signature schemes from \(p\)-adic lattices
- Course in algebra and algorithmics. Applications to RSA and to discrete logarithm cryptology
This page was built for publication: Algebraic aspects of cryptography. With an appendix on hyperelliptic curves by Alfred J. Menezes, Yi-Hong Wu, and Robert J. Zuccherato
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5906858)