Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Public-key cryptography and co...
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Save to List
Permanent link
Public-key cryptography and computational number theory : proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000 / editors, Kazimierz Alster, Jerzy Urbanowicz, Hugh C. Williams.
Saved in:
Bibliographic Details
Corporate Author:
International Conference on Public-Key Cryptography and Computational Number Theory
Other Authors:
Alster, Kazimierz
,
Urbanowicz, Jerzy, 1951-
,
Williams, Hugh C.
Format:
eBook
Language:
English
Published:
Berlin ; New York :
Walter de Gruyter,
©2001.
Series:
Proceedings in mathematics.
Subjects:
Coding theory
>
Congresses.
Public key cryptography
>
Congresses.
COMPUTERS
>
Information Theory.
Coding theory
Public key cryptography
Conference papers and proceedings
Online Access:
Click for online access
Holdings
Description
Table of Contents
Similar Items
Staff View
Table of Contents:
Preface
Mathematics, cryptology, and technology
A survey on IQ cryptography
Algebraic groups and discrete logarithm
Fermat numbers, Wieferich and Wilson primes: computations and generalizations
How to distinguish hyperelliptic curves in even characteristic
Limitations of constructive Weil descent
On the security of a public-key cryptosystem
Optimizations for NTRU
The efficiency and security of a real quadratic field based key exchange protocol
Extending the binary gcd algorithms
Stochastic kleptography detection
An overview of the XTR public key systemA survey of IND-CCA secure public-key encryption schemes relative to factoring
Efficient point multiplication for elliptic curves over special optimal extension fields
Error-correcting codes and cryptography
Secret public key schemes
Index form surfaces and construction of elliptic curves over large finite fields
On the size of solutions of the inequality Ï?(ax + b) <Ï?(ax)
Security of DL-encryption and signatures against generic attacks � a survey
Square-root algorithms for the discrete logarithm problem (a survey)Height functions on elliptic curves
List of participants
List of contributors
Similar Items
Mathematics of public key cryptography
by: Galbraith, Steven D.
Published: (2012)
Public-key cryptography -- PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual event, March 8-11, 2022, Proceedings. Part I
Published: (2022)
Public-key cryptography -- PKC 2022 : 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual event, March 8-11, 2022, Proceedings. Part II
Published: (2022)
Public-key cryptography -- PKC 2021 : 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, proceedings. Part II
Published: (2021)
Public-key cryptography -- PKC 2021 : 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, proceedings. Part I
Published: (2021)