scientific article; zbMATH DE number 1759768
From MaRDI portal
zbMath0995.94538MaRDI QIDQ4536791
Arjen K. Lenstra, Eric R. Verheul
Publication date: 7 October 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Effective compression maps for torus-based cryptography, Private authentication, GENERATING CERTAIN QUINTIC IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS, An efficient probabilistic public-key cryptosystem over quadratic fields quotients, XTR Algorithm: Efficient and Compact Subgroup Trace Representation, Classical attacks on a variant of the RSA cryptosystem, Efficient hardware implementation of finite fields with applications to cryptography, Algebraic generalization of Diffie-Hellman key exchange, Higher-dimensional sieving for the number field sieve algorithms, The special case of cyclotomic fields in quantum algorithms for unit groups, Elliptic curve cryptography: the serpentine course of a paradigm shift, Faster individual discrete logarithms in finite fields of composite extension degree, Security of polynomial transformations of the Diffie-Hellman key., Generating elements of orders dividing \(p^6 \pm p^5 + p^4 \pm p^3 + p^2 \pm+1\), An XTR-based constant round key agreement scheme, Efficient message transmission via twisted Edwards curves, Computing discrete logarithms in \(\mathbb F_{p^6}\), An optimal representation for the trace zero subgroup, Tate and Ate pairings for \(y^2=x^5-\alpha x\) in characteristic five, Efficient Compression of SIDH Public Keys, VSH, an Efficient and Provable Collision-Resistant Hash Function, The Function Field Sieve in the Medium Prime Case, The Diffie-Hellman problem and generalization of Verheul's theorem, Applications to cryptography of twisting commutative algebraic groups, Point Decomposition Problem in Binary Elliptic Curves, Using abelian varieties to improve pairing-based cryptography, A correspondence of certain irreducible polynomials over finite fields, Point compression for the trace zero subgroup over a small degree extension field, High-degree Compression Functions on Alternative Models of Elliptic Curves and their Applications, Message transmission for GH-public key cryptosystem, An overview of trace based public key cryptography over finite fields, New \((k,l,m)\)-verifiable multi-secret sharing schemes based on XTR public key system