No abstract available.
Cited By
- Geffert V (2019). Unary Coded PSPACE-Complete Languages in ASPACE(loglog n), Theory of Computing Systems, 63:4, (688-714), Online publication date: 1-May-2019.
- Li X, Huang T, Liao Q and Xia X (2019). Optimal Estimates of Two Common Remainders for a Robust Generalized Chinese Remainder Theorem, IEEE Transactions on Signal Processing, 67:7, (1824-1837), Online publication date: 1-Apr-2019.
- Hazay C, Mikkelsen G, Rabin T, Toft T and Nicolosi A (2019). Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting, Journal of Cryptology, 32:2, (265-323), Online publication date: 1-Apr-2019.
- Osipyan V and Litvinov K A mathematical model of the cryptosystem based on the linear Diophantine equation Proceedings of the 11th International Conference on Security of Information and Networks, (1-4)
- Wu J, Liao X and Yang B (2017). Color image encryption based on chaotic systems and elliptic curve ElGamal scheme, Signal Processing, 141:C, (109-124), Online publication date: 1-Dec-2017.
- Osipyan V, Tlusten V, Laktionova N and Vakhrusheva N The duality principle in the theory of development generalized A-M knapsack cryptosystems Proceedings of the 10th International Conference on Security of Information and Networks, (200-205)
- Asif S and Kong Y (2017). Highly Parallel Modular Multiplier for Elliptic Curve Cryptography in Residue Number System, Circuits, Systems, and Signal Processing, 36:3, (1027-1051), Online publication date: 1-Mar-2017.
- Osipyan V Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method Proceedings of the 8th International Conference on Security of Information and Networks, (338-341)
- Osipyan V Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method Proceedings of the 8th International Conference on Security of Information and Networks, (338-341)
- V.O. O Mathematical model of the polyalphabetic information security system based on the normal generalized knapsack Proceedings of the 7th International Conference on Security of Information and Networks, (180-185)
- Osipyan V Information protection systems based on universal knapsack problem Proceedings of the 6th International Conference on Security of Information and Networks, (343-346)
- Kar J and Majhi B A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique Proceedings of the 2011 International Conference on Communication, Computing & Security, (493-498)
- Dong F and Fan H Study on RSA based identity authentication algorithm and application in wireless controlling system of aids to navigation Proceedings of the 2010 international conference on Web information systems and mining, (7-13)
- Chi H and Cao Y Generating parallel random sequences via parameterizing EICGs for heterogeneous computing environments Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV, (409-417)
- Saxena N and Yi J (2019). Noninteractive self-certification for long-lived mobile ad hoc networks, IEEE Transactions on Information Forensics and Security, 4:4, (946-955), Online publication date: 1-Dec-2009.
- Wang P and Han B A new sequential multi-signature scheme with signers' intentions Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (4442-4445)
- Álvarez R, Tortosa L, Vicent J and Zamora A (2009). Analysis and design of a secure key exchange scheme, Information Sciences: an International Journal, 179:12, (2014-2021), Online publication date: 1-May-2009.
- Du X, Guizani M, Xiao Y and Chen H (2009). A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks, IEEE Transactions on Wireless Communications, 8:3, (1223-1229), Online publication date: 1-Mar-2009.
- Karatop A and Savaş E An identity-based key infrastructure suitable for messaging and its application to e-mail Proceedings of the 4th international conference on Security and privacy in communication netowrks, (1-11)
- Alvarez R, Martinez F, Vicent J and Zamora A A new public key cryptosystem based on matrices Proceedings of the 6th WSEAS international conference on Information security and privacy, (36-39)
- Muralidhara V and Sen S A result on the distribution of quadratic residues with applications to elliptic curve cryptography Proceedings of the cryptology 8th international conference on Progress in cryptology, (48-57)
- Askoxylakis I, Pramateftakis M, Kastanis D and Traganitis A Integration of a secure mobile payment system in a GSM/UMTS SIM smart card Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security, (40-50)
- Catalano D and Gennaro R (2007). Cramer-Damgård signatures revisited, Theoretical Computer Science, 370:1-3, (186-200), Online publication date: 1-Feb-2007.
- Almuhammadi S and Sui N Safe Credential-Based Trust Protocols Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence, (949-952)
- Bandyopadhyay S, Bhattacharyya D and Pal A (2006). Secure delivery of handwritten signature, Ubiquity, 2006:October, (1-12), Online publication date: 1-Oct-2006.
- Malkin M and Kalker T A cryptographic method for secure watermark detection Proceedings of the 8th international conference on Information hiding, (26-41)
- Dijk M, Clarke D, Gassend B, Suh G and Devadas S (2006). Speeding up Exponentiation using an Untrusted Computational Resource, Designs, Codes and Cryptography, 39:2, (253-273), Online publication date: 1-May-2006.
- Climent J, Ferrández F, Vicent J and Zamora A (2006). A nonlinear elliptic curve cryptosystem based on matrices, Applied Mathematics and Computation, 174:1, (150-164), Online publication date: 1-Mar-2006.
- Gyarmati K On a fast version of a pseudorandom generator General Theory of Information Transfer and Combinatorics, (326-342)
- Koblitz N and Menezes A Pairing-Based cryptography at high security levels Proceedings of the 10th international conference on Cryptography and Coding, (13-36)
- Sundaram B and Chapman B A grid authentication system with revocation guarantees Proceedings of the 12th international conference on High Performance Computing, (508-517)
- Sundaram B and Chapman B Addressing Credential Revocation in Grid Environments Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing, (323-326)
- Ertaul L and Lu W ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (i) Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (102-113)
- Shirase M and Hibino Y (2005). An architecture for elliptic curve cryptograph computation, ACM SIGARCH Computer Architecture News, 33:1, (124-133), Online publication date: 1-Mar-2005.
- Catalano D and Gennaro R Cramer-Damgård signatures revisited Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography, (313-327)
- Chou J, Lin C and Lee T A novel hierarchical key management scheme based on quadratic residues Proceedings of the Second international conference on Parallel and Distributed Processing and Applications, (858-865)
- Chen T, Chung Y and Huang K (2004). A traceable proxy multisignature scheme based on the elliptic curve cryptosystem, Applied Mathematics and Computation, 159:1, (137-145), Online publication date: 1-Nov-2004.
- Edoh K Elliptic curve cryptography Proceedings of the 1st annual conference on Information security curriculum development, (88-93)
- Wang G, Bao F, Zhou J and Deng R (2004). Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem', IEEE Transactions on Knowledge and Data Engineering, 16:10, (1309-1311), Online publication date: 1-Oct-2004.
- Hof H, Blaß E and Zitterbart M Secure overlay for service centric wireless sensor networks Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks, (125-138)
- Kovalchuk L (2019). Pseudoirreducible Polynomials, Cybernetics and Systems Analysis, 40:4, (610-616), Online publication date: 1-Jul-2004.
- Owens L, Duffy A and Dowling T An Identity Based Encryption system Proceedings of the 3rd international symposium on Principles and practice of programming in Java, (154-159)
- Chaudhuri R (2004). Teaching bit-level algorithm analysis to the undergraduates in computer science, ACM SIGCSE Bulletin, 36:2, (62-63), Online publication date: 1-Jun-2004.
- Mentens N, Ors S and Preneel B An FPGA implementation of an elliptic curve processor GF(2m) Proceedings of the 14th ACM Great Lakes symposium on VLSI, (454-457)
- Müller S (2019). On the Computation of Square Roots in Finite Fields, Designs, Codes and Cryptography, 31:3, (301-312), Online publication date: 1-Mar-2004.
- Dodis Y and Reyzin L Breaking and repairing optimistic fair exchange from PODC 2003 Proceedings of the 3rd ACM workshop on Digital rights management, (47-54)
- Nicolakis T, Pizano C, Prumo B and Webb M Protecting digital archives at the Greek Orthodox Archdiocese of America Proceedings of the 3rd ACM workshop on Digital rights management, (13-26)
- Schwabe E and Sutherland I Efficient mappings for parity-declustered data layouts Proceedings of the 9th annual international conference on Computing and combinatorics, (252-261)
- Park J, Chong E and Siegel H Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures Proceedings of the twenty-second annual symposium on Principles of distributed computing, (172-181)
- Whelan C, Duffy A, Burnett A and Dowling T A Java API for polynomial arithmetic Proceedings of the 2nd international conference on Principles and practice of programming in Java, (139-144)
- Chaudhuri R (2019). Do the arithmetic operations really execute in constant time?, ACM SIGCSE Bulletin, 35:2, (43-44), Online publication date: 1-Jun-2003.
- Lange T and Winterhof A (2003). Interpolation of the discrete logarithm in F by Boolean functions and by polynomials in several variables modulo a divisor of q - 1, Discrete Applied Mathematics, 128:1, (193-206), Online publication date: 15-May-2003.
- Katti R and Brennan J (2003). Low Complexity Multiplication in a Finite Field Using Ring Representation, IEEE Transactions on Computers, 52:4, (418-427), Online publication date: 1-Apr-2003.
- Li Q (2003). On weights in duadic Abelian codes, Discrete Mathematics, 260:1-3, (223-230), Online publication date: 6-Jan-2003.
- Ravi S, Raghunathan A and Chakradhar S Embedding Security in Wireless Embedded Systems Proceedings of the 16th International Conference on VLSI Design
- Grabmeier J, Kaltofen E and Weispfenning V Cited References Computer algebra handbook, (493-622)
- Agou S, Deléglise M and Nicolas J (2019). Short Polynomial Representations for Square Roots Modulo p, Designs, Codes and Cryptography, 28:1, (33-44), Online publication date: 1-Jan-2003.
- Kim H and Oh H Efficient hardware multiplicative inverters Proceedings of the 5th international conference on Information security and cryptology, (313-326)
- Ravi S, Raghunathan A and Potlapally N Securing wireless data Proceedings of the 15th international symposium on System Synthesis, (195-200)
- Burnett A, Winters K and Dowling T A Java implementation of an elliptic curve cryptosystem Proceedings of the inaugural conference on the Principles and Practice of programming, 2002 and Proceedings of the second workshop on Intermediate representation engineering for virtual machines, 2002, (83-88)
- Neff C A verifiable secret shuffle and its application to e-voting Proceedings of the 8th ACM conference on Computer and Communications Security, (116-125)
- Benantar M (2001). The internet public key infrastructure, IBM Systems Journal, 40:3, (648-665), Online publication date: 1-Mar-2001.
- Scanlon T (2001). Public Key Cryptosystems Based on Drinfeld Modules Are Insecure, Journal of Cryptology, 14:4, (225-230), Online publication date: 1-Jan-2001.
- Brown M, Cheung D, Hankerson D, Hernandez J, Kirkup M and Menezes A PGP in constrained wireless devices Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (19-19)
- Koblitz N, Menezes A and Vanstone S (2000). The State of Elliptic Curve Cryptography, Designs, Codes and Cryptography, 19:2-3, (173-193), Online publication date: 1-Mar-2000.
- Solinas J (2000). Efficient Arithmetic on Koblitz Curves, Designs, Codes and Cryptography, 19:2-3, (195-249), Online publication date: 1-Mar-2000.
- Dimitrov V, Jullien G and Miller W (2000). Complexity and Fast Algorithms for Multiexponentiations, IEEE Transactions on Computers, 49:2, (141-147), Online publication date: 1-Feb-2000.
- Molva R and Pannetrat A Scalable multicast security in dynamic groups Proceedings of the 6th ACM conference on Computer and communications security, (101-112)
- Walter C Montgomery's Multiplication Technique Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems, (80-93)
- Kurosawa K and Ogata W (2019). Efficient Rabin-type Digital Signature Scheme, Designs, Codes and Cryptography, 16:1, (53-64), Online publication date: 1-Jan-1999.
- Ateniese G, Steiner M and Tsudik G Authenticated group key agreement and friends Proceedings of the 5th ACM conference on Computer and communications security, (17-26)
- Drolet G (1998). A New Representation of Elements of Finite Fields GF(2m) Yielding Small Complexity Arithmetic Circuits, IEEE Transactions on Computers, 47:9, (938-946), Online publication date: 1-Sep-1998.
- Koc C and Acar T (2019). Montgomery Multiplication in GF(2 ^k, Designs, Codes and Cryptography, 14:1, (57-69), Online publication date: 1-Apr-1998.
- Johnson D and Menezes A Elliptic curve DSA (ECSDA) Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, (13-13)
- Sakurai K and Shizuya H (1998). A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems, Journal of Cryptology, 11:1, (29-43), Online publication date: 1-Jan-1998.
- Stroele A and Mayer F Methods to reduce test application time for accumulator-based self-test Proceedings of the 15th IEEE VLSI Test Symposium
- Joye M and Quisquater J On the importance of securing your bins Proceedings of the 4th ACM conference on Computer and communications security, (135-141)
- Boneh D and Venkatesan R Rounding in lattices and its cryptographic applications Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms, (675-682)
- Nyberg K and Rueppel R (2019). Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem, Designs, Codes and Cryptography, 7:1-2, (61-81), Online publication date: 1-Jan-1996.
- Sakurai K and Shizuya H Relationships among the computational powers of breaking discrete log cryptosystems Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques, (341-355)
- Thiong Ly J (1993). A serial version of the Pohlig-Hellman Algorithm for computing discrete logarithms, Applicable Algebra in Engineering, Communication and Computing, 4:1, (77-80), Online publication date: 1-Mar-1993.
- Davenport J Primality testing revisited Papers from the international symposium on Symbolic and algebraic computation, (123-129)
- Harper G, Menezes A and Vanstone S Public-key cryptosystems with very small key lengths Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques, (163-173)
- Müller W and Oswald A Dickson pseudoprimes and primality testing Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques, (512-516)
- Shizuya H, Itoh T and Sakurai K On the complexity of hyperelliptic discrete logarithm problem Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques, (337-351)
- Kurosawa K, Katayama Y, Ogata W and Tsujii S General public key residue cryptosystems and mental poker protocols Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology, (374-388)
- Lidl R, Müller W and Oswald A (2019). Some remarks on strong fibonacci pseudoprimes, Applicable Algebra in Engineering, Communication and Computing, 1:1, (59-65), Online publication date: 1-Mar-1990.
- Koblitz N A family of Jacobians suitable for discrete log cryptosystems Proceedings on Advances in cryptology, (94-99)
Index Terms
- A course in number theory and cryptography
Recommendations
Identity-Based signcryption from identity-based cryptography
WISA'11: Proceedings of the 12th international conference on Information Security ApplicationsA signcryption scheme encrypts and signs data in a single operation which is more efficient than using an encryption scheme combined with a signature scheme. Identity-based cryptography (IBC) does not require users to pre-compute key pairs and obtain ...
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. Recently, in order to eliminate the use of certificates in certified ...
Nonmalleable Cryptography
The notion of nonmalleable cryptography, an extension of semantically secure cryptography, is defined. Informally, in the context of encryption the additional requirement is that given the ciphertext it is impossible to generate a different ciphertext ...