Algebraic aspects of cryptography. With an appendix on hyperelliptic curves by Alfred J. Menezes, Yi-Hong Wu, and Robert J. Zuccherato
From MaRDI portal
Publication:5906858
zbMath0890.94001MaRDI QIDQ5906858
Publication date: 8 February 1998
Published in: Algorithms and Computation in Mathematics (Search for Journal in Brave)
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Number-theoretic algorithms; complexity (11Y16) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01)
Related Items (64)
A one-way function from thermodynamics and applications to cryptography ⋮ Polly cracker, revisited ⋮ Linear complexity of some sequences derived from hyperelliptic curves of genus 2 ⋮ Algorithmic problems in right-angled Artin groups: complexity and applications ⋮ Hypergroupoids and cryptosystems ⋮ On the security of biquadratic \(C^\ast\) public-key cryptosystems and its generalizations ⋮ Crypto Galore! ⋮ A review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass point ⋮ Algebro-geometric solution of the discrete KP equation over a finite field out of a hyperelliptic curve ⋮ On small world semiplanes with generalised Schubert cells ⋮ Unnamed Item ⋮ Irreducible compositions of polynomials over finite fields of even characteristic ⋮ On Eulerian semigroups of multivariate transformations and their cryptographic applications ⋮ Efficient RSA key generation and threshold Paillier in the two-party setting ⋮ Cryptanalysis of the TRMS Signature Scheme of PKC’05 ⋮ Monoidal categories, representation gap and cryptography ⋮ On New Examples of Families of Multivariate Stable Maps and their Cryptographical Applications ⋮ Constructing and deconstructing intentional weaknesses in symmetric ciphers ⋮ On new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groups ⋮ Factoring integers and oracles for elliptic and hyperelliptic curves ⋮ Lattice polly cracker cryptosystems ⋮ Polly Two: a new algebraic polynomial-based public-key scheme ⋮ Gröbner basis cryptosystems ⋮ Cryptosystems using linear groups ⋮ On families of graphs of large cycle indicator, matrices of large order and key exchange protocols with nonlinear polynomial maps of small degree ⋮ On the comparison of cryptographical properties of two different families of graphs with large cycle indicator ⋮ Montgomery Ladder for All Genus 2 Curves in Characteristic 2 ⋮ A note on the kernel of group homomorphism of the Weil descent method ⋮ Performance of algebraic graphs based stream-ciphers using large finite fields ⋮ The implementation of cubic public keys based on a new family of algebraic graphs ⋮ Preimage selective trapdoor function: how to repair an easy problem ⋮ A Cryptanalysis of the Double-Round Quadratic Cryptosystem ⋮ Selection of secure hyperelliptic curves of \textit{g=2} based on a subfield ⋮ Eta pairing computation on general divisors over hyperelliptic curves \(y^2=x^p - x+d\) ⋮ Counting isomorphism classes of pointed hyperelliptic curves of genus 4 over finite fields with odd characteristic ⋮ The Diffie-Hellman key exchange protocol and non-Abelian nilpotent groups ⋮ Extending the GLS endomorphism to speed up GHS Weil descent using Magma ⋮ A new method for decomposition in the Jacobian of small genus hyperelliptic curves ⋮ On the key exchange with new cubical maps based on graphs ⋮ On the family of cubical multivariate cryptosystems based on the algebraic graph over finite commutative rings of characteristic 2 ⋮ Algebraic curves and cryptography ⋮ A ciphertext-only attack on Polly Two ⋮ Isomorphism classes of hyperelliptic curves of genus 3 over finite fields ⋮ Formulae for arithmetic on genus 2 hyperelliptic curves ⋮ Supersingular hyperelliptic curves of genus 2 over finite fields ⋮ An algorithm to compute volcanoes of 2-isogenies of elliptic curves over finite fields ⋮ Computing discrete logarithms in high-genus hyperelliptic Jacobians in provably subexponential time ⋮ A generic approach to searching for Jacobians ⋮ On the iterations of the maps \(ax^{2^k}+b\) and \((a x^{2^k} + b)^{-1}\) over finite fields of characteristic two ⋮ Quantum algorithms for algebraic problems ⋮ Geometric characterization of strongly normal extensions ⋮ Interpolation of the discrete logarithm in \(\mathbb{F}_{q}\) by Boolean functions and by polynomials in several variables modulo a divisor of \(q-1\). ⋮ A public key cryptosystem using a group of permutation polynomials ⋮ On the complexity of the discrete logarithm and Diffie-Hellman problems ⋮ On counting and generating curves over small finite fields ⋮ A double large prime variation for small genus hyperelliptic index calculus ⋮ Generic groups, collision resistance, and ECDSA ⋮ Public-key cryptography and invariant theory ⋮ Linear complexity of sequences on Koblitz curves of genus 2 ⋮ On Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate Cryptography ⋮ An explicit construction for \(n\)-contact curves to a smooth cubic via divisions of polynomials and Zariski tuples ⋮ Computing discrete logarithms in the Jacobian of high-genus hyperelliptic curves over even characteristic finite fields ⋮ Almost Primality of Group Orders of Elliptic Curves Defined over Small Finite Fields ⋮ Recurrent methods for constructing irreducible polynomials over \(\mathbb F_{q}\) of odd characteristics.
This page was built for publication: Algebraic aspects of cryptography. With an appendix on hyperelliptic curves by Alfred J. Menezes, Yi-Hong Wu, and Robert J. Zuccherato