×

Found 48 Documents (Results 1–48)

Mathematics of computation through the lens of linear equations and lattices. (English) Zbl 07821717

Beliaev, Dmitry (ed.) et al., International congress of mathematicians 2022, ICM 2022, Helsinki, Finland, virtual, July 6–14, 2022. Volume 6. Sections 12–14. Berlin: European Mathematical Society (EMS). 4914-4969 (2023).
PDFBibTeX XMLCite
Full Text: DOI

On elliptic curve \(L\)-functions integrated encryption scheme. (English) Zbl 07819361

Grześkowiak, Maciej (ed.) et al., Number-theoretic methods in cryptology, NuTMiC 22. Selected papers based on the presentations at the 3rd conference, Poznań, Poland, August 2022. Warsaw: Polish Academy of Sciences, Institute of Mathematics. Banach Cent. Publ. 126, 53-72 (2023).
PDFBibTeX XMLCite
Full Text: DOI

Random algebraic lattices and codes for wireless communications. (English) Zbl 1484.11154

Beresnevich, Victor (ed.) et al., Number theory meets wireless communications. Based on lectures given at the workshop on interactions between number theory and wireless communication, York, UK, July 4–16, 2016. Cham: Springer. Math. Eng. (Cham), 143-177 (2020).
MSC:  11H71 94A05 94A40
PDFBibTeX XMLCite
Full Text: DOI

On the security of distributed multiprime RSA. (English) Zbl 1457.94118

Lee, Jooyoung (ed.) et al., Information security and cryptology – ICISC 2014. 17th international conference, Seoul, South Korea, December 3–5, 2014. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 8949, 18-33 (2015).
MSC:  94A60 11Y05 11T71
PDFBibTeX XMLCite
Full Text: DOI

Additive combinatorics: with a view towards computer science and cryptography – an exposition. (English) Zbl 1303.11022

Borwein, Jonathan M. (ed.) et al., Number theory and related fields. In memory of Alf van der Poorten. Based on the proceedings of the international number theory conference, Newcastle, Australia, March 12–16, 2012. New York, NY: Springer (ISBN 978-1-4614-6641-3/hbk; 978-1-4614-6642-0/ebook). Springer Proceedings in Mathematics & Statistics 43, 99-128 (2013).
PDFBibTeX XMLCite
Full Text: DOI arXiv

The symbiosis between collision and preimage resistance. (English) Zbl 1291.94047

Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 152-171 (2011).
MSC:  94A60 11T71 68P30
PDFBibTeX XMLCite
Full Text: DOI

Satisfying degree-\(d\) equations over \(\mathrm{GF}[2]^{n}\). (English) Zbl 1343.68312

Goldberg, Leslie Ann (ed.) et al., Approximation, randomization, and combinatorial optimization. Algorithms and techniques. 14th international workshop, APPROX 2011, and 15th international workshop, RANDOM 2011, Princeton, NJ, USA, August 17–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22934-3/pbk). Lecture Notes in Computer Science 6845, 242-253 (2011).
PDFBibTeX XMLCite
Full Text: DOI

When \(e\)-th roots become easier than factoring. (English) Zbl 1153.11345

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 13-28 (2007).
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software