Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11--15, 2000 - MaRDI portal

Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11--15, 2000 (Q2761408)

From MaRDI portal





scientific article; zbMATH DE number 1683464
Language Label Description Also known as
English
Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11--15, 2000
scientific article; zbMATH DE number 1683464

    Statements

    18 December 2001
    0 references
    Warsaw (Poland)
    0 references
    Proceedings
    0 references
    Conference
    0 references
    Public-key cryptography
    0 references
    Computational number theory
    0 references
    Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11--15, 2000 (English)
    0 references
    The articles of this volume will be reviewed individually.NEWLINENEWLINEIndexed articles:NEWLINENEWLINE\textit{Buchmann, Johannes; Hamdy, Safuat}, A survey on IQ cryptography, 1-15 [Zbl 0983.94034]NEWLINENEWLINE\textit{Couveignes, Jean-Marc}, Algebraic groups and discrete logarithm, 17-27 [Zbl 1022.11066]NEWLINENEWLINE\textit{Dilcher, Karl}, Fermat numbers, Wieferich and Wilson primes: computations and generalizations, 29-48 [Zbl 1016.11058]NEWLINENEWLINE\textit{Enge, Andreas}, How to distinguish hyperelliptic curves in even characteristic., 49-58 [Zbl 1116.14306]NEWLINENEWLINE\textit{Galbraith, Steven D.}, Limitations of constructive Weil descent, 59-70 [Zbl 1016.11020]NEWLINENEWLINE\textit{Grošek, Otokar; Magliveras, Spyros S.; Wei, Wandi}, On the security of a public-key cryptosystem, 71-75 [Zbl 0985.94027]NEWLINENEWLINE\textit{Hoffstein, Jeffrey; Silverman, Joseph}, Optimizations for NTRU, 77-88 [Zbl 0987.94027]NEWLINENEWLINE\textit{Jacobson, Michael J. jun.; Scheidler, Renate; Williams, Hugh C.}, The efficiency and security of a real quadratic field based key exchange protocol, 89-112 [Zbl 0986.94024]NEWLINENEWLINE\textit{Odlyzko, Andrew}, Mathematics, cryptology, and technology, ix-x [Zbl 0987.94028]NEWLINENEWLINE\textit{Kubiak, Przemysław}, Extending the binary gcd algorithms, 113-135 [Zbl 1014.11079]NEWLINENEWLINE\textit{Kucner, Daniel; Kutyłowski, Mirosław}, Stochastic kleptography detection, 137-149 [Zbl 0986.94025]NEWLINENEWLINE\textit{Lenstra, Arjen K.; Verheul, Eric R.}, An overview of the XTR public key system, 151-180 [Zbl 0986.94029]NEWLINENEWLINE\textit{Müller, Siguna}, A survey of IND-CCA secure public-key encryption schemes relative to factoring, 181-196 [Zbl 0985.94506]NEWLINENEWLINE\textit{Müller, Volker}, Efficient point multiplication for elliptic curves over special optimal extension fields, 197-207 [Zbl 1019.11037]NEWLINENEWLINE\textit{Niederreiter, Harald}, Error-correcting codes and cryptography, 209-219 [Zbl 0989.94027]NEWLINENEWLINE\textit{Patarin, Jacques}, Secret public key schemes, 221-237 [Zbl 0987.94030]NEWLINENEWLINE\textit{Pethő, Attila}, Index form surfaces and construction of elliptic curves over large finite fields, 239-247 [Zbl 1014.11021]NEWLINENEWLINE\textit{te Riele, Herman}, On the size of solutions of the inequality \(\varphi(ax-b)<\varphi(ax)\), 249-255 [Zbl 1020.11084]NEWLINENEWLINE\textit{Schnorr, Claus Peter}, Security of DL-encryption and signatures against generic attacks -- a survey, 257-282 [Zbl 0987.94029]NEWLINENEWLINE\textit{Teske, Edlyn}, Square-root algorithms for the discrete logarithm problem (a survey), 283-301 [Zbl 1001.11059]NEWLINENEWLINE\textit{Zimmer, Horst G.}, Height functions on elliptic curves., 303-322 [Zbl 1046.11041]
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references