×

Found 32 Documents (Results 1–32)

Efficient modular arithmetic. (English) Zbl 1483.94036

Bos, Joppe W. (ed.) et al., Computational cryptography. Algorithmic aspects of cryptology. A tribute to Arjen K. Lenstra on the occasion of his 65th birthday. Cambridge: Cambridge University Press. Lond. Math. Soc. Lect. Note Ser. 469, 223-250 (2021).
MSC:  94A60 94-03 94-02
PDFBibTeX XMLCite
Full Text: DOI Link

Cryptanalysis of the generalised Legendre pseudorandom function. (English) Zbl 1472.94052

Galbraith, Steven D. (ed.), ANTS XIV. Proceedings of the fourteenth algorithmic number theory symposium, Auckland, New Zealand, virtual event, June 29 – July 4, 2020. Berkeley, CA: Mathematical Sciences Publishers (MSP). Open Book Ser. 4, 267-282 (2020).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

A new perspective on the powers of two descent for discrete logarithms in finite fields. (English) Zbl 07721134

Scheidler, Renate (ed.) et al., ANTS XIII. Proceedings of the thirteenth algorithmic number theory symposium, University of Wisconsin-Madison, WI, USA, July 16–20, 2018. Berkeley, CA: Mathematical Sciences Publishers (MSP). Open Book Ser. 2, 343-352 (2019).
MSC:  11T71 11Y16
PDFBibTeX XMLCite
Full Text: DOI arXiv

CSI-FiSh: efficient isogeny based signatures through class group computations. (English) Zbl 1456.94050

Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11921, 227-247 (2019).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Parametrizations for families of ECM-friendly curves. (English) Zbl 1458.11092

Burr, Michael (ed.), Proceedings of the 42nd international symposium on symbolic and algebraic computation, ISSAC 2017, Kaiserslautern, Germany, July 25–28, 2017. New York, NY: Association for Computing Machinery (ACM). 165-171 (2017).
MSC:  11G05 68W30
PDFBibTeX XMLCite
Full Text: DOI HAL

Computation of a 768-bit prime field discrete logarithm. (English) Zbl 1411.11135

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10210, 185-201 (2017).
MSC:  11T71 11Y16 94A60
PDFBibTeX XMLCite
Full Text: DOI

The tower number field sieve. (English) Zbl 1375.94096

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 31-55 (2015).
MSC:  94A60 11Y16
PDFBibTeX XMLCite
Full Text: DOI

Mersenne factorization factory. (English) Zbl 1306.11098

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 358-377 (2014).
MSC:  11Y05 94A60
PDFBibTeX XMLCite
Full Text: DOI

Breaking ‘128-bit secure’ supersingular binary curves. (Or how to solve discrete logarithms in \({\mathbb F}_{2^{4 \cdot 1223}}\) and \({\mathbb F}_{2^{12 \cdot 367}}\)). (English) Zbl 1334.94080

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 126-145 (2014).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Finding ECM-friendly curves through a study of Galois properties. (English) Zbl 1344.11043

Howe, Everett W. (ed.) et al., ANTS X. Proceedings of the tenth algorithmic number theory symposium, San Diego, CA, USA, July 9–13, 2012. Berkeley, CA: Mathematical Sciences Publishers (MSP) (ISBN 978-1-935107-00-2/hbk; 978-1-935107-01-9/ebook). The Open Book Series 1, 63-86 (2013).
MSC:  11G05 11Y05 11G15
PDFBibTeX XMLCite
Full Text: arXiv

Universal security. From bits and mips to pools, lakes – and beyond. (English) Zbl 1320.94072

Fischlin, Marc (ed.) et al., Number theory and cryptography. Papers in honor of Johannes Buchmann on the occasion of his 60th birthday. Berlin: Springer (ISBN 978-3-642-42000-9/pbk). Lecture Notes in Computer Science 8260, 121-124 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Using the cloud to determine key strengths. (English) Zbl 1295.94093

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 17-39 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

ECM at work. (English) Zbl 1292.94036

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 467-484 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Public keys. (English) Zbl 1296.94127

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 626-642 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the use of the negation map in the Pollard rho method. (English) Zbl 1260.11080

Hanrot, Guillaume (ed.) et al., Algorithmic number theory. 9th international symposium, ANTS-IX, Nancy, France, July 19–23, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14517-9/pbk). Lecture Notes in Computer Science 6197, 66-82 (2010).
MSC:  11Y16 14G50 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Factorization of a 768-bit RSA modulus. (English) Zbl 1196.11167

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 333-350 (2010).
MSC:  11Y05 94A60
PDFBibTeX XMLCite
Full Text: DOI

ECC2K-130 on Cell CPUs. (English) Zbl 1284.94054

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 225-242 (2010).
PDFBibTeX XMLCite
Full Text: DOI Link

A kilobit special number field sieve factorization. (English) Zbl 1153.11344

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 1-12 (2007).
PDFBibTeX XMLCite
Full Text: DOI

Proving the primality of very large numbers with fastECPP. (English) Zbl 1125.11359

Buell, Duncan (ed.), Algorithmic number theory. 6th international symposium, ANTS-VI, Burlington, VT, USA, June 13–18, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22156-5/pbk). Lecture Notes in Computer Science 3076, 194-207 (2004).
MSC:  11Y11
PDFBibTeX XMLCite
Full Text: DOI

Framed mixed Tate motives and the value of zeta-functions of number fields at 2 and 3. (Gerahmte gemischte Tate-Motive und die Werte von Zetafunktionen zu Zahlkörpern an den Stellen 2 und 3.) (German) Zbl 0971.14022

Bonner Mathematische Schriften. 340. Bonn: Univ. Bonn, Mathematisch-Naturwissenschaftliche Fakultät, 77 S. (2001).
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software