scientific article; zbMATH DE number 2204782

From MaRDI portal
Publication:5316395

zbMath1116.11002MaRDI QIDQ5316395

Victor Shoup

Publication date: 13 September 2005


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (44)

A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard ModelNon-malleable codes for bounded parallel-time tamperingFactoring multi-power RSA moduli with primes sharing least or most significant bitsA linear-time algorithm for the orbit problem over cyclic groupsA babystep-giantstep method for faster deterministic integer factorizationSome properties of the factors of Fermat numbersThe \(\mathbb Q\)-curve construction for endomorphism-accelerated elliptic curvesIdentity-based signature scheme based on quadratic residuesEfficient cryptosystems from \(2^k\)-th power residue symbolsBreaking Goppa-based McEliece with hintsFair and distributed peer-to-peer allocation of a common, refillable resourceDecoding McEliece with a hint -- secret Goppa key parts reveal everythingNumerical estimates on the Landau-Siegel zero and other related quantitiesPublic-Key Cryptosystems with Primitive Power Roots of UnityA unified strategy to compute some special functions of number-theoretic interestDiscrete logarithm based additively homomorphic encryption and secure data aggregationProgrammable hash functions and their applicationsSecurity models and proof strategies for plaintext-aware encryptionLattice-based completely non-malleable public-key encryption in the standard modelGood reduction of Puiseux series and applicationsResource fairness and composability of cryptographic protocolsComputationally efficient approach to implementation of the Chinese remainder theorem algorithm in minimally redundant residue number systemSimultaneous modular reduction and Kronecker substitution for small finite fieldsConfined guessing: new signatures from standard assumptionsSpeeding Up the Pollard Rho Method on Prime FieldsThe Berlekamp-Massey algorithm revisitedUnnamed ItemSolving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?Relations Among Notions of Plaintext AwarenessDiscrete logarithm problems with auxiliary inputsContributory Password-Authenticated Group Key Exchange with Join CapabilityShort fail-stop signature scheme based on factorization and discrete logarithm assumptionsRemarks on Gödel’s code as a hash functionSymmetric cryptoalgorithms in the residue number systemFault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also VulnerableStructure computation and discrete logarithms in finite abelian $p$-groupsVerifiable random functions: relations to identity-based key encapsulation and new constructionsOptimal Randomness Extraction from a Diffie-Hellman ElementFactorization patterns on nonlinear families of univariate polynomials over a finite fieldIsogeny-based key compression without pairingsAn Efficient Implementation of the CRT Algorithm Based on an Interval-Index Characteristic and Minimum-Redundancy Residue CodeFactorization Tests and Algorithms Arising from Counting Modular Forms and Automorphic RepresentationsUsing basis dependence distance vectors in the modified Floyd-Warshall algorithmAuthenticated hash tables based on cryptographic accumulators




This page was built for publication: