Ito, Takuma; Kobayashi, Koutaro; Kurokawa, Takashi; Shinohara, Naoyuki; Uchiyama, Shigenori A technique to reduce memory usage of M4GB algorithm. (English) Zbl 07780427 JSIAM Lett. 15, 125-128 (2023). MSC: 68W30 13P10 94A60 PDFBibTeX XMLCite \textit{T. Ito} et al., JSIAM Lett. 15, 125--128 (2023; Zbl 07780427) Full Text: DOI
Mohanrasu, S. S.; Udhayakumar, K.; Priyanka, T. M. C.; Gowrisankar, A.; Banerjee, Santo; Rakkiyappan, R. Event-triggered impulsive controller design for synchronization of delayed chaotic neural networks and its fractal reconstruction: an application to image encryption. (English) Zbl 1510.93123 Appl. Math. Modelling 115, 490-512 (2023). MSC: 93C27 93C23 93D20 68T07 94A08 PDFBibTeX XMLCite \textit{S. S. Mohanrasu} et al., Appl. Math. Modelling 115, 490--512 (2023; Zbl 1510.93123) Full Text: DOI
Takeshita, Jonathan; Karl, Ryan; Gong, Ting; Jung, Taeho SLAP: simpler, improved private stream aggregation from ring learning with errors. (English) Zbl 1516.94055 J. Cryptology 36, No. 2, Paper No. 8, 37 p. (2023). Reviewer: Rainer Horsch (Oberteuringen) MSC: 94A60 94A62 81P94 PDFBibTeX XMLCite \textit{J. Takeshita} et al., J. Cryptology 36, No. 2, Paper No. 8, 37 p. (2023; Zbl 1516.94055) Full Text: DOI
Ito, Takuma; Hoshi, Yuta; Shinohara, Naoyuki; Uchiyama, Shigenori Polynomial selection of \(F_4\) for solving the MQ problem. (English) Zbl 07647808 JSIAM Lett. 14, 135-138 (2022). MSC: 65-XX 68-XX PDFBibTeX XMLCite \textit{T. Ito} et al., JSIAM Lett. 14, 135--138 (2022; Zbl 07647808) Full Text: DOI
Hashimoto, Yasufumi Key recovery attack on Hufu-UOV. (English) Zbl 1503.94050 JSIAM Lett. 14, 1-4 (2022). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Hashimoto}, JSIAM Lett. 14, 1--4 (2022; Zbl 1503.94050) Full Text: DOI
Chizhov, Ivan V.; Borodin, Mikhail A. Classification of Hadamard products of one-codimensional subcodes of Reed-Muller codes. (English. Russian original) Zbl 1512.94124 Discrete Math. Appl. 32, No. 5, 297-311 (2022); translation from Diskretn. Mat. 32, No. 1, 115-134 (2020). MSC: 94B05 94A60 PDFBibTeX XMLCite \textit{I. V. Chizhov} and \textit{M. A. Borodin}, Discrete Math. Appl. 32, No. 5, 297--311 (2022; Zbl 1512.94124); translation from Diskretn. Mat. 32, No. 1, 115--134 (2020) Full Text: DOI
Ikematsu, Yasuhiko A study on randomness used in signature generation of UOV. (English) Zbl 1498.94090 Giri, Debasis (ed.) et al., Proceedings of the seventh international conference on mathematics and computing, ICMC 2021, Shibpur, India, March 2–5, 2021. Singapore: Springer. Adv. Intell. Syst. Comput. 1412, 39-50 (2022). MSC: 94A62 94A60 81P94 PDFBibTeX XMLCite \textit{Y. Ikematsu}, Adv. Intell. Syst. Comput. 1412, 39--50 (2022; Zbl 1498.94090) Full Text: DOI
Ceria, Michela; Rinaldo, Giancarlo; Sala, Massimiliano Bits, bytes and friends. (English) Zbl 07542487 Crittografia 4. Rome: Aracne Editrice (ISBN 979-12-5994-079-7/pbk; 979-12-5994-080-3/ebook). 85 p. (2022). Reviewer: Manish Kumar (Hyderabad) MSC: 68-01 94-01 00A06 68Q99 94A60 94D10 PDFBibTeX XMLCite \textit{M. Ceria} et al., Bits, bytes and friends. Rome: Aracne Editrice (2022; Zbl 07542487) Full Text: Link
Athukorala, Pabasara; Chathurangi, Madusha; Ranasinghe, Rajitha A variant of RSA using continued fractions. (English) Zbl 1500.94017 J. Discrete Math. Sci. Cryptography 25, No. 1, 127-134 (2022). MSC: 94A60 11A55 PDFBibTeX XMLCite \textit{P. Athukorala} et al., J. Discrete Math. Sci. Cryptography 25, No. 1, 127--134 (2022; Zbl 1500.94017) Full Text: DOI
Kures, Miroslav Cube-root-subgroups of \(\operatorname{SL}_2\) over imaginary quadratic integers. (English) Zbl 1520.20103 Comput. Sci. J. Mold. 29, No. 2(86), 227-240 (2021). MSC: 20G30 11T71 94A60 15A63 PDFBibTeX XMLCite \textit{M. Kures}, Comput. Sci. J. Mold. 29, No. 2(86), 227--240 (2021; Zbl 1520.20103) Full Text: Link
Teli, Tawseef Ahmed; Masoodi, Faheem Syeed; Bahmdi, Alwi M. HIBE: hierarchical identity-based encryption. (English) Zbl 1504.94191 Bin Ahmad, Khairol Amali (ed.) et al., Functional encryption. Cham: Springer. EAI/Springer Innov. Commun. Comput., 187-203 (2021). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{T. A. Teli} et al., in: Functional encryption. Cham: Springer. 187--203 (2021; Zbl 1504.94191) Full Text: DOI
Ito, Takuma; Nitta, Atsushi; Hoshi, Yuta; Shinohara, Naoyuki; Uchiyama, Shigenori Polynomial selection for computing Gröbner bases. (English) Zbl 07614413 JSIAM Lett. 13, 72-75 (2021). MSC: 65-XX 68-XX PDFBibTeX XMLCite \textit{T. Ito} et al., JSIAM Lett. 13, 72--75 (2021; Zbl 07614413) Full Text: DOI
Hashimoto, Yasufumi Vulnerability of Diene-Thabet-Yusuf’s cubic multivariate signature scheme. (English) Zbl 1481.94142 Ryukyu Math. J. 34, 1-4 (2021). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{Y. Hashimoto}, Ryukyu Math. J. 34, 1--4 (2021; Zbl 1481.94142) Full Text: Link
Ryabko, Boris; Fionov, Andrey Cryptography in the information society. (English) Zbl 1466.94001 Hackensack, NJ: World Scientific (ISBN 978-981-12-2615-1/hbk; 978-981-12-2617-5/ebook). xii, 273 p. (2021). MSC: 94-01 94A60 PDFBibTeX XMLCite \textit{B. Ryabko} and \textit{A. Fionov}, Cryptography in the information society. Hackensack, NJ: World Scientific (2021; Zbl 1466.94001) Full Text: DOI
Yasuda, Takanori; Wang, Yacheng; Takagi, Tsuyoshi Multivariate encryption schemes based on polynomial equations over real numbers. (English) Zbl 1501.94060 Ding, Jinta (ed.) et al., Post-quantum cryptography. 11th international conference, PQCrypto 2020, Paris, France, April 15–17, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12100, 402-421 (2020). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{T. Yasuda} et al., Lect. Notes Comput. Sci. 12100, 402--421 (2020; Zbl 1501.94060) Full Text: DOI
Xu, Shengmin; Yang, Guomin; Mu, Yi; Liu, Ximeng Efficient attribute-based encryption with blackbox traceability. (English) Zbl 1421.94079 Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 182-200 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Xu} et al., Lect. Notes Comput. Sci. 11192, 182--200 (2018; Zbl 1421.94079) Full Text: DOI Link
Sim, Bo-Yeon; Han, Dong-Guk Key bit-dependent attack on protected PKC using a single trace. (English) Zbl 1506.94068 Liu, Joseph K. (ed.) et al., Information security practice and experience. 13th international conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10701, 168-185 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{B.-Y. Sim} and \textit{D.-G. Han}, Lect. Notes Comput. Sci. 10701, 168--185 (2017; Zbl 1506.94068) Full Text: DOI
Martin, Keith M. Everyday cryptography. Fundamental principles and applications. 2nd edition. (English) Zbl 1364.94004 Oxford: Oxford University Press (ISBN 978-0-19-878800-3/hbk; 978-0-19-878801-0/pbk). xxxi, 673 p. (2017). MSC: 94-01 94A15 94A60 94A62 PDFBibTeX XMLCite \textit{K. M. Martin}, Everyday cryptography. Fundamental principles and applications. 2nd edition. Oxford: Oxford University Press (2017; Zbl 1364.94004)
Hughes, Andrew; Mandal, Debasis; Pavan, A.; Russell, Nathan; Selman, Alan L. A thirty year old conjecture about promise problems. (English) Zbl 1353.68102 Comput. Complexity 25, No. 4, 883-919 (2016). MSC: 68Q17 68Q15 94A60 PDFBibTeX XMLCite \textit{A. Hughes} et al., Comput. Complexity 25, No. 4, 883--919 (2016; Zbl 1353.68102) Full Text: DOI
Shakiba, Ali; Hooshmandasl, Mohammad Reza; Meybodi, Mohsen Alambardar Cryptanalysis of multiplicative coupled cryptosystems based on the Chebyshev polynomials. (English) Zbl 1343.94081 Int. J. Bifurcation Chaos Appl. Sci. Eng. 26, No. 7, Article ID 1650112, 11 p. (2016). MSC: 94A60 41A10 PDFBibTeX XMLCite \textit{A. Shakiba} et al., Int. J. Bifurcation Chaos Appl. Sci. Eng. 26, No. 7, Article ID 1650112, 11 p. (2016; Zbl 1343.94081) Full Text: DOI
Gligoroski, Danilo; Samardjiska, Simona Semantic security and key-privacy with random split of St-Gen codes. (English) Zbl 1479.94320 Beckmann, Arnold (ed.) et al., Pursuit of the universal. 12th conference on computability in Europe, CiE 2016, Paris, France, June 27 – July 1, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9709, 105-114 (2016). MSC: 94A62 94A60 94B25 PDFBibTeX XMLCite \textit{D. Gligoroski} and \textit{S. Samardjiska}, Lect. Notes Comput. Sci. 9709, 105--114 (2016; Zbl 1479.94320) Full Text: DOI
Buchmann, Johannes Introduction to cryptography. 6th revised edition. (Einführung in die Kryptographie.) (German) Zbl 1336.94002 Springer-Lehrbuch. Heidelberg: Springer Spektrum (ISBN 978-3-642-39774-5/pbk; 978-3-0642-39775-2/ebook). xxvi, 330 p. (2016). MSC: 94-01 94A60 94A62 00A06 11T71 14G50 68P25 11Y05 11Y11 PDFBibTeX XMLCite \textit{J. Buchmann}, Einführung in die Kryptographie. 6th revised edition. Heidelberg: Springer Spektrum (2016; Zbl 1336.94002) Full Text: DOI
Peretz, Y. On multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fields. (English) Zbl 1339.94058 Finite Fields Appl. 39, 1-35 (2016). MSC: 94A60 12E20 68Q17 PDFBibTeX XMLCite \textit{Y. Peretz}, Finite Fields Appl. 39, 1--35 (2016; Zbl 1339.94058) Full Text: DOI
Zhou, Ri-gui; Li, Wei; Huan, Tian-tian Comment on the “Quantum public-key cryptosystem”. (English) Zbl 1320.81048 Int. J. Theor. Phys. 54, No. 3, 1033-1037 (2015). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{R.-g. Zhou} et al., Int. J. Theor. Phys. 54, No. 3, 1033--1037 (2015; Zbl 1320.81048) Full Text: DOI
Yasuda, Takanori; Sakurai, Kouichi A security analysis of uniformly-layered Rainbow defined over non-commutative rings. (English) Zbl 1353.94078 Pac. J. Math. Ind. 6, 81-89 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Yasuda} and \textit{K. Sakurai}, Pac. J. Math. Ind. 6, 81--89 (2014; Zbl 1353.94078) Full Text: DOI
Akyıldız, Ersan; Ashraf, Muhammad An overview of trace based public key cryptography over finite fields. (English) Zbl 1312.94026 J. Comput. Appl. Math. 259 B, 599-621 (2014). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{E. Akyıldız} and \textit{M. Ashraf}, J. Comput. Appl. Math. 259, Part B, 599--621 (2014; Zbl 1312.94026) Full Text: DOI
Ashraf, Muhammad; Kırlar, Barış Bülent Message transmission for GH-public key cryptosystem. (English) Zbl 1338.94060 J. Comput. Appl. Math. 259, Part B, 578-585 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Ashraf} and \textit{B. B. Kırlar}, J. Comput. Appl. Math. 259, Part B, 578--585 (2014; Zbl 1338.94060) Full Text: DOI
Hashimoto, Yasufumi Cryptanalysis of the multivariate signature scheme proposed in PQCrypto 2013. (English) Zbl 1355.94061 Mosca, Michele (ed.), Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1–3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11658-7/pbk). Lecture Notes in Computer Science 8772, 108-125 (2014). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{Y. Hashimoto}, Lect. Notes Comput. Sci. 8772, 108--125 (2014; Zbl 1355.94061) Full Text: DOI
Hashimoto, Yasufumi Cryptanalysis of the Quaternion Rainbow. (English) Zbl 1344.94051 Sakiyama, Kazuo (ed.) et al., Advances in information and computer security. 8th international workshop on security, IWSEC 2013, Okinawa, Japan, November 18–20, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41382-7/pbk). Lecture Notes in Computer Science 8231, 244-257 (2013). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{Y. Hashimoto}, Lect. Notes Comput. Sci. 8231, 244--257 (2013; Zbl 1344.94051) Full Text: DOI
Miura, Hiroyuki; Hashimoto, Yasufumi; Takagi, Tsuyoshi Extended algorithm for solving underdefined multivariate quadratic equations. (English) Zbl 1306.94076 Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 118-135 (2013). MSC: 94A60 81P94 11T71 PDFBibTeX XMLCite \textit{H. Miura} et al., Lect. Notes Comput. Sci. 7932, 118--135 (2013; Zbl 1306.94076) Full Text: DOI
Yonemura, Tomoko; Isogai, Taichi; Muratani, Hirofumi; Hanatani, Yoshikazu Factor-4 and 6 (de)compression for values of pairings using trace maps. (English) Zbl 1291.94171 Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 19-34 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Yonemura} et al., Lect. Notes Comput. Sci. 7708, 19--34 (2013; Zbl 1291.94171) Full Text: DOI
Brandner, Günther RSA, Dickson, LUC and Williams: a study on four polynomial-type public-key cryptosystems. (English) Zbl 1277.94015 Appl. Algebra Eng. Commun. Comput. 24, No. 1, 17-36 (2013). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{G. Brandner}, Appl. Algebra Eng. Commun. Comput. 24, No. 1, 17--36 (2013; Zbl 1277.94015) Full Text: DOI
Azizi, Abdelmalek; Bonnecaze, Alexis; Frey, Gerhard; El Marraki, Mohamed; Nitaj, Abderrahmane; Rolland, Robert; Tena Ayuso, Juan Cryptography: from history to applications. Summer school of CIMPA-UNESCO on cryptography, Oujda, Maroc, May 18–30, 2009. (Cryptographie: de l’histoire aux applications. Ecole d’été de CIMPA-UNESCO de cryptographie, Oujda, Maroc, Mai 18–30, 2009.) (English, French, Arabic) Zbl 1398.94006 Travaux en Cours 80. Paris: Hermann (ISBN 978-2-7056-8118-0). 388 p. (2012). Reviewer: Olaf Ninnemann (Uffing am Staffelsee) MSC: 94-06 94A60 11T71 11Y16 00B25 PDFBibTeX XMLCite \textit{A. Azizi} et al., Cryptographie: de l'histoire aux applications. Ecole d'été de CIMPA-UNESCO de cryptographie, Oujda, Maroc, Mai 18--30, 2009 (Arabic). Paris: Hermann (2012; Zbl 1398.94006)
Kamal, Abdel Alim; Youssef, Amr M. Fault analysis of the NTRUSign digital signature scheme. (English) Zbl 1282.94048 Cryptogr. Commun. 4, No. 2, 131-144 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{A. A. Kamal} and \textit{A. M. Youssef}, Cryptogr. Commun. 4, No. 2, 131--144 (2012; Zbl 1282.94048) Full Text: DOI
Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian Quantum signature scheme with weak arbitrator. (English) Zbl 1261.81060 Int. J. Theor. Phys. 51, No. 7, 2135-2142 (2012). MSC: 81P94 81P40 94A60 PDFBibTeX XMLCite \textit{M.-X. Luo} et al., Int. J. Theor. Phys. 51, No. 7, 2135--2142 (2012; Zbl 1261.81060) Full Text: DOI
Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian Quantum public-key cryptosystem. (English) Zbl 1243.81065 Int. J. Theor. Phys. 51, No. 3, 912-924 (2012). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{M.-X. Luo} et al., Int. J. Theor. Phys. 51, No. 3, 912--924 (2012; Zbl 1243.81065) Full Text: DOI
Martin, Keith M. Everyday cryptography. Fundamental principles and applications. (English) Zbl 1256.94001 Oxford: Oxford University Press (ISBN 978-0-19-969559-1/pbk). xxii, 530 p. (2012). Reviewer: Wilfried Meidl (Istanbul) MSC: 94-01 94A15 94A60 94A62 PDFBibTeX XMLCite \textit{K. M. Martin}, Everyday cryptography. Fundamental principles and applications. Oxford: Oxford University Press (2012; Zbl 1256.94001)
Ilić, Ivana; Magliveras, Spyros S. Crypto applications of combinatorial group theory. (English) Zbl 1366.94502 Crnković, Dean (ed.) et al., Information security, coding theory and related combinatorics. Information coding and combinatorics. Based on lectures presented at the NATO Advanced Study Institute, Opatija, Croatia, May 31 – June 11, 2010. Amsterdam: IOS Press (ISBN 978-1-60750-662-1/hbk; 978-1-60750-663-8/ebook). NATO Science for Peace and Security Series D: Information and Communication Security 29, 1-16 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{I. Ilić} and \textit{S. S. Magliveras}, NATO Sci. Peace Secur. Ser. D, Inf. Commun. Secur. 29, 1--16 (2011; Zbl 1366.94502) Full Text: DOI
Tang, Shaohua; Yi, Haibo; Ding, Jintai; Chen, Huan; Chen, Guomin High-speed hardware implementation of Rainbow signature on FPGAs. (English) Zbl 1298.94107 Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 228-243 (2011). MSC: 94A60 81P94 11T71 PDFBibTeX XMLCite \textit{S. Tang} et al., Lect. Notes Comput. Sci. 7071, 228--243 (2011; Zbl 1298.94107) Full Text: DOI
Jao, David; De Feo, Luca Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. (English) Zbl 1290.94094 Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 19-34 (2011). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{D. Jao} and \textit{L. De Feo}, Lect. Notes Comput. Sci. 7071, 19--34 (2011; Zbl 1290.94094) Full Text: DOI
Hashimoto, Yasufumi; Takagi, Tsuyoshi; Sakurai, Kouichi General fault attacks on multivariate public key cryptosystems. (English) Zbl 1290.94084 Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 1-18 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Hashimoto} et al., Lect. Notes Comput. Sci. 7071, 1--18 (2011; Zbl 1290.94084) Full Text: DOI
Mishkovski, Igor; Kocarev, Ljupco Chaos-based public-key cryptography. (English) Zbl 1221.94053 Kocarev, Ljupco (ed.) et al., Chaos-based cryptography. Berlin: Springer (ISBN 978-3-642-20541-5/hbk; 978-3-642-20542-2/ebook). Studies in Computational Intelligence 354, 27-65 (2011). MSC: 94A60 94A62 33C45 37N99 68P25 PDFBibTeX XMLCite \textit{I. Mishkovski} and \textit{L. Kocarev}, Stud. Comput. Intell. 354, 27--65 (2011; Zbl 1221.94053) Full Text: DOI
McAndrew, Alasdair Introduction to cryptography with open source software. (English) Zbl 1263.94002 Discrete Mathematics and its Applications. Boca Raton, FL: CRC Press (ISBN 978-1-4398-2570-9/hbk). xix, 441 p. (2011). MSC: 94-01 94A60 94A62 PDFBibTeX XMLCite \textit{A. McAndrew}, Introduction to cryptography with open source software. Boca Raton, FL: CRC Press (2011; Zbl 1263.94002)
Hrdina, Jaroslav; Kureš, Miroslav; Vašík, Petr A note on tame polynomial automorphisms and the security of TTM cryptosystem. (English) Zbl 1242.94029 Appl. Comput. Math. 9, No. 2, 226-233 (2010). MSC: 94A60 14R10 PDFBibTeX XMLCite \textit{J. Hrdina} et al., Appl. Comput. Math. 9, No. 2, 226--233 (2010; Zbl 1242.94029) Full Text: Link
Buchmann, Johannes Introduction to cryptography. 5th ed. (Einführung in die Krytographie.) (German) Zbl 1208.94001 Springer-Lehrbuch. Berlin: Springer (ISBN 978-3-642-11185-3/pbk; 978-3-642-11186-0/ebook). xxiv, 278 p. (2010). Reviewer: Ralph-Hardo Schulz (Berlin) MSC: 94-01 94A60 11T71 14G50 68P25 94A62 11Y05 11Y11 PDFBibTeX XMLCite \textit{J. Buchmann}, Einführung in die Krytographie. 5th ed. Berlin: Springer (2010; Zbl 1208.94001) Full Text: DOI
Konstantinou, Elisavet; Kontogeorgis, Aristides; Stamatiou, Yannis C; Zaroliagis, Christos On the efficient generation of prime-order elliptic curves. (English) Zbl 1195.94063 J. Cryptology 23, No. 3, 477-503 (2010). MSC: 94A60 11T71 14H52 PDFBibTeX XMLCite \textit{E. Konstantinou} et al., J. Cryptology 23, No. 3, 477--503 (2010; Zbl 1195.94063) Full Text: DOI
Garber, David Braid group cryptography. (English) Zbl 1203.94100 Berrick, A. Jon (ed.) et al., Braids. Introductory lectures on braids, configurations and their applications. Based on the program “Braids”, IMS, Singapore, May 14–July 13, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-4291-40-8/hbk). Lecture Notes Series. Institute for Mathematical Sciences. National University of Singapore 19, 329-403 (2010). Reviewer: R. W. van der Waall (Huizen) MSC: 94A60 94A62 20F36 20F10 PDFBibTeX XMLCite \textit{D. Garber}, Lect. Notes Ser., Inst. Math. Sci., Natl. Univ. Singap. 19, 329--403 (2010; Zbl 1203.94100) Full Text: arXiv
Karpfinger, Christian; Kiechle, Hubert Cryptology. Algebraic methods and algorithms. (Kryptologie. Algebraische Methoden und Algorithmen.) (German) Zbl 1190.94001 Studium. Wiesbaden: Vieweg+Teubner (ISBN 978-3-8348-0884-4/pbk). ix, 261 p. (2010). Reviewer: Wilfried Meidl (Istanbul) MSC: 94-01 94A60 11T71 PDFBibTeX XMLCite \textit{C. Karpfinger} and \textit{H. Kiechle}, Kryptologie. Algebraische Methoden und Algorithmen. Wiesbaden: Vieweg+Teubner (2010; Zbl 1190.94001)
Abisha, P. J.; Thomas, D. G.; Samuel, D. Jayaseelan Public key cryptosystems and line pictures. (English) Zbl 1195.94046 J. Comb. Math. Comb. Comput. 69, 5-14 (2009). Reviewer: Richard A. Mollin (Calgary) MSC: 94A60 11Y05 PDFBibTeX XMLCite \textit{P. J. Abisha} et al., J. Comb. Math. Comb. Comput. 69, 5--14 (2009; Zbl 1195.94046)
Claycomb, William; Shin, Dongwan Protecting sensitive information in directory services using virtual directories. (English) Zbl 1184.68232 Bertino, Elisa (ed.) et al., Collaborative computing: networking, applications and worksharing. 4th international ICST conference, CollaborateCom 2008, Orlando, FL, USA, November 13–16, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-03353-7/pbk; 978-3-642-03354-4/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 10, 244-257 (2009). MSC: 68P25 PDFBibTeX XMLCite \textit{W. Claycomb} and \textit{D. Shin}, in: Collaborative computing: networking, applications and worksharing. 4th international ICST conference, CollaborateCom 2008, Orlando, FL, USA, November 13--16, 2008. Revised selected papers. Berlin: Springer. 244--257 (2009; Zbl 1184.68232) Full Text: DOI
Zhou, Haijian; Luo, Ping; Wang, Daoshun; Dai, Yiqi Probability method for cryptanalysis of general multivariate modular linear equation. (English) Zbl 1181.94109 Sci. China, Ser. F. 52, No. 10, 1792-1800 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Zhou} et al., Sci. China, Ser. F 52, No. 10, 1792--1800 (2009; Zbl 1181.94109) Full Text: DOI
Rososhek, S. K. Cryptosystems in automorphism groups of group rings of Abelian groups. (English. Russian original) Zbl 1156.94375 J. Math. Sci., New York 154, No. 3, 386-391 (2008); translation from Fundam. Prikl. Mat. 13, No. 3, 157-164 (2007). MSC: 94A60 20C05 16S34 PDFBibTeX XMLCite \textit{S. K. Rososhek}, J. Math. Sci., New York 154, No. 3, 386--391 (2008; Zbl 1156.94375); translation from Fundam. Prikl. Mat. 13, No. 3, 157--164 (2007) Full Text: DOI
Wätjen, Dietmar Cryptography. Foundations, algorithms, protocols. 2nd ed. (Kryptographie. Grundlagen, Algorithmen, Protokolle.) (German) Zbl 1187.94030 Heidelberg: Spektrum Akademischer Verlag (ISBN 978-3-8274-1916-3/hbk). xi, 343 p. (2008). MSC: 94A60 94-01 68P25 94A62 PDFBibTeX XMLCite \textit{D. Wätjen}, Kryptographie. Grundlagen, Algorithmen, Protokolle. 2nd ed. Heidelberg: Spektrum Akademischer Verlag (2008; Zbl 1187.94030)
Buchmann, Johannes Introduction to cryptography. 4th extended ed. (Einführung in die Kryptographie.) (German) Zbl 1145.94001 Berlin: Springer (ISBN 978-3-540-74451-1/pbk). xxii, 274 p. (2008). Reviewer: Wilfried Meidl (Istanbul) MSC: 94-01 94A60 94A62 68P25 11Y16 11Y05 11Y11 PDFBibTeX XMLCite \textit{J. Buchmann}, Einführung in die Kryptographie. 4th extended ed. Berlin: Springer (2008; Zbl 1145.94001) Full Text: DOI
Elias, Grace; Miri, Ali; Yeap, Tet-Hin On efficient implementation of FPGA-based hyperelliptic curve cryptosystems. (English) Zbl 1124.68030 Comput. Electr. Eng. 33, No. 5-6, 349-366 (2007). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{G. Elias} et al., Comput. Electr. Eng. 33, No. 5--6, 349--366 (2007; Zbl 1124.68030) Full Text: DOI
Beutelspacher, Albrecht Cryptology. An introduction to the science of encoding, concealing and hiding. 8th ed. (Kryptologie. Einführung in die Wissenschaft vom Verschlüsseln, Verbergen und Verheimlichen. Ohne alle Geheimniskrämerei, aber nicht ohne hinterlistigen Schalk, dargestellt zum Nutzen und Ergötzen des allgemeinen Publikums.) (German) Zbl 1152.94001 Wiesbaden: Vieweg (ISBN 978-3-8348-0253-8/pbk). xii, 155 p. (2007). Reviewer: Wilfried Meidl (Istanbul) MSC: 94-01 94A60 94A62 94A55 PDFBibTeX XMLCite \textit{A. Beutelspacher}, Kryptologie. Einführung in die Wissenschaft vom Verschlüsseln, Verbergen und Verheimlichen. Ohne alle Geheimniskrämerei, aber nicht ohne hinterlistigen Schalk, dargestellt zum Nutzen und Ergötzen des allgemeinen Publikums. 8th ed. Wiesbaden: Vieweg (2007; Zbl 1152.94001)
Castagnos, Guilhem An efficient probabilistic public-key cryptosystem over quadratic fields quotients. (English) Zbl 1129.11056 Finite Fields Appl. 13, No. 3, 563-576 (2007). Reviewer: John H. Loxton (Greenwich) MSC: 11T71 94A60 11B39 11R11 68P25 PDFBibTeX XMLCite \textit{G. Castagnos}, Finite Fields Appl. 13, No. 3, 563--576 (2007; Zbl 1129.11056) Full Text: DOI
González Vasco, María Isabel; Pérez García, David Attacking a public key cryptosystem based on tree replacement. (English) Zbl 1106.94022 Discrete Appl. Math. 155, No. 1, 61-67 (2007). MSC: 94A60 05C05 05C90 PDFBibTeX XMLCite \textit{M. I. González Vasco} and \textit{D. Pérez García}, Discrete Appl. Math. 155, No. 1, 61--67 (2007; Zbl 1106.94022) Full Text: DOI
Gebhardt, Volker Computer aided discovery of a fast algorithm for testing conjugacy in braid groups. (English) Zbl 1148.20025 Bosma, Wieb (ed.) et al., Discovering mathematics with Magma. Reducing the abstract to the concrete. Berlin: Springer (ISBN 3-540-37632-1/hbk). Algorithms and Computation in Mathematics 19, 261-285 (2006). MSC: 20F36 20-04 20F10 68W30 94A60 PDFBibTeX XMLCite \textit{V. Gebhardt}, Algorithms Comput. Math. 19, 261--285 (2006; Zbl 1148.20025) Full Text: DOI
Nikov, Ventzislav; Nikova, Svetla; Preneel, Bart A weakness in some oblivious transfer and zero-knowledge protocols. (English) Zbl 1172.94592 Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 348-363 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Nikov} et al., Lect. Notes Comput. Sci. 4284, 348--363 (2006; Zbl 1172.94592) Full Text: DOI
Coglianese, Michael; Goi, Bok-Min MaTRU: A new NTRU-based cryptosystem. (English) Zbl 1153.94362 Maitra, Subhamoy (ed.) et al., Progress in cryptology – INDOCRYPT 2005. 6th international conference on cryptology in India, Bangalore, India, December 10–12, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30805-8/pbk). Lecture Notes in Computer Science 3797, 232-243 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Coglianese} and \textit{B.-M. Goi}, Lect. Notes Comput. Sci. 3797, 232--243 (2005; Zbl 1153.94362) Full Text: DOI
Gjøsteen, Kristian Homomorphic cryptosystems based on subgroup membership problems. (English) Zbl 1126.94328 Dawson, Ed (ed.) et al., Progress in cryptology – Mycrypt 2005. First international conference on cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28–30, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28938-0/pbk). Lecture Notes in Computer Science 3715, 314-327 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Gjøsteen}, Lect. Notes Comput. Sci. 3715, 314--327 (2005; Zbl 1126.94328) Full Text: DOI
Lempken, Wolfgang; van Trung, Tran On minimal logarithmic signatures of finite groups. (English) Zbl 1081.94038 Exp. Math. 14, No. 3, 257-269 (2005). MSC: 94A62 20D99 94A60 PDFBibTeX XMLCite \textit{W. Lempken} and \textit{T. van Trung}, Exp. Math. 14, No. 3, 257--269 (2005; Zbl 1081.94038) Full Text: DOI Euclid EuDML
Yang, Wu-Chuan; Guan, Dah-Jyh; Laih, Chi-Sung Fast multi-computations with integer similarity strategy. (English) Zbl 1081.94544 Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 138-153 (2005). MSC: 94A60 68M07 PDFBibTeX XMLCite \textit{W.-C. Yang} et al., Lect. Notes Comput. Sci. 3386, 138--153 (2005; Zbl 1081.94544) Full Text: DOI
Bani Hammad, Y.; Carter, G.; Dawson, E.; Müller, W.; Hitchcock, Y. RAK factoring algorithm. (English) Zbl 1096.94022 Australas. J. Comb. 33, 291-305 (2005). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{Y. Bani Hammad} et al., Australas. J. Comb. 33, 291--305 (2005; Zbl 1096.94022)
Wu, Chia-Long; Lou, Der-Chyuan; Chang, Te-Jen An efficient Montgomery exponentiation algorithm for cryptographic applications. (English) Zbl 1090.68037 Informatica, Vilnius 16, No. 3, 449-468 (2005). MSC: 68P25 PDFBibTeX XMLCite \textit{C.-L. Wu} et al., Informatica, Vilnius 16, No. 3, 449--468 (2005; Zbl 1090.68037)
Pon, Shun-Fu; Lu, Erl-Huei; Jeng, Albert B. One private-key for all DL-based cryptosystems. (English) Zbl 1076.94010 Appl. Math. Comput. 170, No. 1, 666-672 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{S.-F. Pon} et al., Appl. Math. Comput. 170, No. 1, 666--672 (2005; Zbl 1076.94010) Full Text: DOI
Tsaur, Woei-Jiunn Several security schemes constructed using ECC-based self-certified public key cryptosystems. (English) Zbl 1076.94016 Appl. Math. Comput. 168, No. 1, 447-464 (2005). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{W.-J. Tsaur}, Appl. Math. Comput. 168, No. 1, 447--464 (2005; Zbl 1076.94016) Full Text: DOI
Nedjah, Nadia; de Macedo Mourelle, Luiza Efficient pre-processing for large window-based modular exponentiation using ant colony. (English) Zbl 1104.68490 Informatica, Ljubl. 29, No. 2, 155-161 (2005). MSC: 68P25 PDFBibTeX XMLCite \textit{N. Nedjah} and \textit{L. de Macedo Mourelle}, Informatica, Ljubl. 29, No. 2, 155--161 (2005; Zbl 1104.68490)
Glukhov, M. M. On the application of rings of integer algebraic numbers to the construction of public-key cryptoschemes. (Russian) Zbl 1183.94034 ChebyshevskiĭSb. 5, No. 4(12), 75-81 (2004). Reviewer: Vladimír Lacko (Košice) MSC: 94A60 11R04 PDFBibTeX XMLCite \textit{M. M. Glukhov}, Chebyshevskiĭ Sb. 5, No. 4(12), 75--81 (2004; Zbl 1183.94034)
Chow, Sherman S. M.; Yiu, S. M.; Hui, Lucas C. K.; Chow, K. P. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. (English) Zbl 1092.94505 Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 352-369 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{S. S. M. Chow} et al., Lect. Notes Comput. Sci. 2971, 352--369 (2004; Zbl 1092.94505) Full Text: DOI
Hromkovič, Juraj Theoretical informatics. Computability, complexity theory, algorithmics, cryptography. An introduction. 2nd, revised and extended ed. (Theoretische Informatik. Berechenbarkeit, Komplexitätstheorie, Algorithmik, Kryptographie. Eine Einführung.) (German) Zbl 1069.68046 Leitfäden der Informatik. Stuttgart: Teubner (ISBN 3-519-10332-X/pbk). 335 p. (2004). MSC: 68Q01 68Q05 68Q15 68-01 68Q25 68Q30 68W20 94A60 94A62 PDFBibTeX XMLCite \textit{J. Hromkovič}, Theoretische Informatik. Berechenbarkeit, Komplexitätstheorie, Algorithmik, Kryptographie. Eine Einführung. 2nd, revised and extended ed. Stuttgart: Teubner (2004; Zbl 1069.68046)
Hu, Denis Goh Chuan; Samsudin, Azman Two way authentication key agreement based on braid groups. (English) Zbl 1088.94021 Int. J. Pure Appl. Math. 16, No. 4, 515-535 (2004). Reviewer: Richard A. Mollin (Calgary) MSC: 94A62 20F36 94A60 PDFBibTeX XMLCite \textit{D. G. C. Hu} and \textit{A. Samsudin}, Int. J. Pure Appl. Math. 16, No. 4, 515--535 (2004; Zbl 1088.94021)
Lou, Der-Chyuan; Wu, Chia-Long Parallel exponentiation using common-multiplicand-multiplication and signed-digit-folding techniques. (English) Zbl 1098.94026 Int. J. Comput. Math. 81, No. 10, 1187-1202 (2004). MSC: 94A60 68W40 68M07 PDFBibTeX XMLCite \textit{D.-C. Lou} and \textit{C.-L. Wu}, Int. J. Comput. Math. 81, No. 10, 1187--1202 (2004; Zbl 1098.94026) Full Text: DOI
Yi, Xun Authenticated key agreement in dynamic peer groups. (English) Zbl 1071.68007 Theor. Comput. Sci. 326, No. 1-3, 363-382 (2004). MSC: 68M12 68M14 94A62 PDFBibTeX XMLCite \textit{X. Yi}, Theor. Comput. Sci. 326, No. 1--3, 363--382 (2004; Zbl 1071.68007) Full Text: DOI
Buchmann, Johannes A. Introduction to cryptography. 2nd ed. (English) Zbl 1098.94001 Undergraduate Texts in Mathematics. New York, NY: Springer (ISBN 0-387-20756-2/pbk). xvi, 335 p. (2004). MSC: 94-01 94A60 68P25 94A62 11Y16 11Y11 PDFBibTeX XMLCite \textit{J. A. Buchmann}, Introduction to cryptography. 2nd ed. New York, NY: Springer (2004; Zbl 1098.94001)
Buchmann, Johannes A. Introduction to cryptography. 2nd ed. (English) Zbl 1050.94002 Undergraduate Texts in Mathematics. New York, NY: Springer (ISBN 0-387-21156-X/hbk). xvi, 335 p. (2004). MSC: 94-01 94A60 94A62 68P25 11Y16 11Y11 PDFBibTeX XMLCite \textit{J. A. Buchmann}, Introduction to cryptography. 2nd ed. New York, NY: Springer (2004; Zbl 1050.94002)
Libert, Benoît; Quisquater, Jean-Jacques Efficient revocation and threshold pairing based cryptosystems. (English) Zbl 1321.94078 Proceedings of the 22nd annual ACM symposium on principles of distributed computing, PODC ’03, Boston, MA, USA, July 13–16, 2003. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-708-7). 163-171 (2003). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{B. Libert} and \textit{J.-J. Quisquater}, in: Proceedings of the 22nd annual ACM symposium on principles of distributed computing, PODC '03, Boston, MA, USA, July 13--16, 2003. New York, NY: Association for Computing Machinery (ACM). 163--171 (2003; Zbl 1321.94078) Full Text: DOI
Howgrave-Graham, Nick; Nguyen, Phong Q.; Pointcheval, David; Proos, John; Silverman, Joseph H.; Singer, Ari; Whyte, William The impact of decryption failures on the security of NTRU encryption. (English) Zbl 1122.94377 Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 226-246 (2003). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Howgrave-Graham} et al., Lect. Notes Comput. Sci. 2729, 226--246 (2003; Zbl 1122.94377) Full Text: DOI
Courtois, Nicolas T.; Patarin, Jacques About the XL algorithm over GF(2). (English) Zbl 1039.94511 Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 141-157 (2003). MSC: 94A60 13P10 11T71 68Q25 PDFBibTeX XMLCite \textit{N. T. Courtois} and \textit{J. Patarin}, Lect. Notes Comput. Sci. 2612, 141--157 (2003; Zbl 1039.94511) Full Text: Link
Pieprzyk, Josef; Hardjono, Thomas; Seberry, Jennifer Fundamentals of computer security. (English) Zbl 1011.68034 Berlin: Springer. xx, 677 p. EUR 64.95/net; sFr. 108.00; £45.50; $ 69.95 (2003). Reviewer: Lenka Fibikova (Essen) MSC: 68P25 68-01 PDFBibTeX XMLCite \textit{J. Pieprzyk} et al., Fundamentals of computer security. Berlin: Springer (2003; Zbl 1011.68034)
Magliveras, Spyros S. Secret- and public-key cryptosystems from group factorizations. (English) Zbl 1050.94011 Tatra Mt. Math. Publ. 25, 11-22 (2002). Reviewer: Rainer Steinwandt (Karlsruhe) MSC: 94A60 20B40 20D40 68P25 20D60 PDFBibTeX XMLCite \textit{S. S. Magliveras}, Tatra Mt. Math. Publ. 25, 11--22 (2002; Zbl 1050.94011)
Park, Young-Ho; Jeong, Sangtae; Kim, Chang Han; Lim, Jongin An alternate decomposition of an integer for faster point multiplication on certain elliptic curves. (English) Zbl 1055.94527 Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 323-334 (2002). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{Y.-H. Park} et al., Lect. Notes Comput. Sci. 2274, 323--334 (2002; Zbl 1055.94527) Full Text: Link
Itoh, Kouichi; Yajima, Jun; Takenaka, Masahiko; Torii, Naoya DPA countermeasures by improving the window method. (English) Zbl 1020.94521 Kaliski, Burton S. jun. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2523, 303-317 (2002). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{K. Itoh} et al., Lect. Notes Comput. Sci. 2523, 303--317 (2002; Zbl 1020.94521) Full Text: Link
Trichina, Elena; Bellezza, Antonio Implementation of elliptic curve cryptography with built-in counter measures against side channel attacks. (English) Zbl 1020.94527 Kaliski, Burton S. jun. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2523, 98-113 (2002). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{E. Trichina} and \textit{A. Bellezza}, Lect. Notes Comput. Sci. 2523, 98--113 (2002; Zbl 1020.94527) Full Text: Link
Gong, Guang; Lam, Charles C. Y. Linear recursive sequences over elliptic curves. (English) Zbl 1035.94532 Helleseth, Tor (ed.) et al., Sequences and their applications. Proceedings of the 2nd international conference (SETA’01), Bergen, Norway, May 13–17, 2001. London: Springer (ISBN 1-85233-529-7). Discrete Mathematics and Theoretical Computer Science, 182-196 (2002). MSC: 94A55 11G20 14G50 94A60 PDFBibTeX XMLCite \textit{G. Gong} and \textit{C. C. Y. Lam}, in: Sequences and their applications. Proceedings of the 2nd international conference (SETA'01), Bergen, Norway, May 13--17, 2001. London: Springer. 182--196 (2002; Zbl 1035.94532)
Watanabe, Yodai; Shikata, Junji; Imai, Hideki Equivalence between semantic security and indistinguishability against chosen ciphertext attacks. (English) Zbl 1033.94547 Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 71-84 (2002). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Watanabe} et al., Lect. Notes Comput. Sci. 2567, 71--84 (2002; Zbl 1033.94547) Full Text: DOI
Magliveras, S. S.; Stinson, D. R.; van Trung, Tran New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups. (English) Zbl 1020.94010 J. Cryptology 15, No. 4, 285-297 (2002). MSC: 94A60 20E99 PDFBibTeX XMLCite \textit{S. S. Magliveras} et al., J. Cryptology 15, No. 4, 285--297 (2002; Zbl 1020.94010) Full Text: DOI
Choi, Dug-Hwan; Choi, Seungbok; Won, Dongho Improvement of probabilistic public key cryptosystems using discrete logarithm. (English) Zbl 0999.94528 Kim, Kwangjo (ed.), Information security and cryptology - ICISC 2001. 4th international conference, Seoul, Korea, December 6-7, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2288, 72-80 (2002). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D.-H. Choi} et al., Lect. Notes Comput. Sci. 2288, 72--80 (2002; Zbl 0999.94528)
Beutelspacher, Albrecht Cryptology. An introduction to the science of encoding, concealing and hiding. 6., überarb. Aufl. (Kryptologie. Einführung in die Wissenschaft vom Verschlüsseln, Verbergen und Verheimlichen.) (German) Zbl 1005.94001 Wiesbaden: Vieweg. viii, 179 S. (2002). Reviewer: Lenka Fibikova (Essen) MSC: 94-01 94A60 94A62 94A55 PDFBibTeX XMLCite \textit{A. Beutelspacher}, Kryptologie. Einführung in die Wissenschaft vom Verschlüsseln, Verbergen und Verheimlichen. 6., überarb. Aufl. Wiesbaden: Vieweg (2002; Zbl 1005.94001)
Youssef, Amr; Gong, Guang Cryptanalysis of Imai and Matsumoto scheme B asymmetric cryptosystem. (English) Zbl 1011.94544 Rangan, C. Pandu (ed.) et al., Progress in cryptology - INDOCRYPT 2001. 2nd international conference on cryptology in India, Chennai, India, December 16-20, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2247, 214-222 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Youssef} and \textit{G. Gong}, Lect. Notes Comput. Sci. 2247, 214--222 (2001; Zbl 1011.94544)
Nguyen, Phong Q.; Stern, Jacques The two faces of lattices in cryptology. (English) Zbl 1006.94531 Silverman, Joseph H. (ed.), Cryptography and lattices. 1st international conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2146, 146-180 (2001). MSC: 94A60 11H06 PDFBibTeX XMLCite \textit{P. Q. Nguyen} and \textit{J. Stern}, Lect. Notes Comput. Sci. 2146, 146--180 (2001; Zbl 1006.94531) Full Text: Link
Micciancio, Daniele Improving lattice based cryptosystems using the Hermite normal form. (English) Zbl 1006.94529 Silverman, Joseph H. (ed.), Cryptography and lattices. 1st international conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2146, 126-145 (2001). MSC: 94A60 11H06 11Y16 PDFBibTeX XMLCite \textit{D. Micciancio}, Lect. Notes Comput. Sci. 2146, 126--145 (2001; Zbl 1006.94529) Full Text: Link
De Santis, Alfredo; Di Crescenzo, Giovanni; Ostrovsky, Rafail; Persiano, Giuseppe; Sahai, Amit Robust non-interactive zero knowledge. (English) Zbl 1003.94526 Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 566-598 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{A. De Santis} et al., Lect. Notes Comput. Sci. 2139, 566--598 (2001; Zbl 1003.94526) Full Text: Link
Paeng, Seong-Hun; Ha, Kil-Chan; Kim, Jae Heon; Chee, Seongtaek; Park, Choonsik New public key cryptosystem using finite non abelian groups. (English) Zbl 1003.94525 Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 470-485 (2001). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S.-H. Paeng} et al., Lect. Notes Comput. Sci. 2139, 470--485 (2001; Zbl 1003.94525) Full Text: Link
Kim, Hwankoo; Moon, SangJae New public-key cryptosystem using divisor class groups. (English) Zbl 1008.94539 Varadharajan, Vijay (ed.) et al., Information security and privacy. 6th Australasian conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2119, 74-83 (2001). MSC: 94A60 11R58 PDFBibTeX XMLCite \textit{H. Kim} and \textit{S. Moon}, Lect. Notes Comput. Sci. 2119, 74--83 (2001; Zbl 1008.94539) Full Text: DOI
Kim, Seungjoo; Cheon, Jung Hee; Joye, Marc; Lim, Seongan; Mambo, Masahiro; Won, Dongho; Zheng, Yuliang Strong adaptive chosen-ciphertext attacks with memory dump (or: The importance of the order of decryption and validation). (English) Zbl 1024.68527 Honary, Bahram (ed.), Cryptography and coding. 8th IMA international conference, Cirencester, GB, December 17-19, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2260, 114-127 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Kim} et al., Lect. Notes Comput. Sci. 2260, 114--127 (2001; Zbl 1024.68527) Full Text: DOI
Fouque, Pierre-Alain; Poupard, Guillaume; Stern, Jacques Secret sharing decryption in the context of voting or lotteries. (English) Zbl 0999.94548 Frankel, Yair (ed.), Financial cryptography. 4th international conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1962, 90-104 (2001). MSC: 94A62 91B12 94A60 PDFBibTeX XMLCite \textit{P.-A. Fouque} et al., Lect. Notes Comput. Sci. 1962, 90--104 (2001; Zbl 0999.94548)
Niederreiter, Harald Error-correcting codes and cryptography. (English) Zbl 0989.94027 Alster, Kazimierz (ed.) et al., Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000. Berlin: de Gruyter. 209-219 (2001). Reviewer: K.Roegner (Berlin) MSC: 94A60 94B05 PDFBibTeX XMLCite \textit{H. Niederreiter}, in: Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11--15, 2000. Berlin: de Gruyter. 209--219 (2001; Zbl 0989.94027)
Lenstra, Arjen K.; Verheul, Eric R. Selecting cryptographic key sizes. (English) Zbl 1006.94020 J. Cryptology 14, No. 4, 255-293 (2001). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{A. K. Lenstra} and \textit{E. R. Verheul}, J. Cryptology 14, No. 4, 255--293 (2001; Zbl 1006.94020) Full Text: DOI Link