Li, Huorong; Lin, Jingqiang; Li, Bingyu; Cheng, Wangzhao PoS: constructing practical and efficient public key cryptosystems based on symmetric cryptography with SGX. (English) Zbl 07297666 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer (ISBN 978-3-030-01949-5/pbk; 978-3-030-01950-1/ebook). Lecture Notes in Computer Science 11149, 767-777 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{H. Li} et al., Lect. Notes Comput. Sci. 11149, 767--777 (2018; Zbl 07297666) Full Text: DOI
Xu, Shengmin; Yang, Guomin; Mu, Yi; Liu, Ximeng Efficient attribute-based encryption with blackbox traceability. (English) Zbl 1421.94079 Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 182-200 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Xu} et al., Lect. Notes Comput. Sci. 11192, 182--200 (2018; Zbl 1421.94079) Full Text: DOI
Martin, Keith M. Everyday cryptography. Fundamental principles and applications. 2nd edition. (English) Zbl 1364.94004 Oxford: Oxford University Press (ISBN 978-0-19-878800-3/hbk; 978-0-19-878801-0/pbk). xxxi, 673 p. (2017). MSC: 94-01 94A15 94A60 94A62 PDF BibTeX XML Cite \textit{K. M. Martin}, Everyday cryptography. Fundamental principles and applications. 2nd edition. Oxford: Oxford University Press (2017; Zbl 1364.94004)
Hughes, Andrew; Mandal, Debasis; Pavan, A.; Russell, Nathan; Selman, Alan L. A thirty year old conjecture about promise problems. (English) Zbl 1353.68102 Comput. Complexity 25, No. 4, 883-919 (2016). MSC: 68Q17 68Q15 94A60 PDF BibTeX XML Cite \textit{A. Hughes} et al., Comput. Complexity 25, No. 4, 883--919 (2016; Zbl 1353.68102) Full Text: DOI
Shakiba, Ali; Hooshmandasl, Mohammad Reza; Meybodi, Mohsen Alambardar Cryptanalysis of multiplicative coupled cryptosystems based on the Chebyshev polynomials. (English) Zbl 1343.94081 Int. J. Bifurcation Chaos Appl. Sci. Eng. 26, No. 7, Article ID 1650112, 11 p. (2016). MSC: 94A60 41A10 PDF BibTeX XML Cite \textit{A. Shakiba} et al., Int. J. Bifurcation Chaos Appl. Sci. Eng. 26, No. 7, Article ID 1650112, 11 p. (2016; Zbl 1343.94081) Full Text: DOI
Gligoroski, Danilo; Samardjiska, Simona Semantic security and key-privacy with random split of St-Gen codes. (English) Zbl 06617637 Beckmann, Arnold (ed.) et al., Pursuit of the universal. 12th conference on computability in Europe, CiE 2016, Paris, France, June 27 – July 1, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-40188-1/pbk; 978-3-319-40189-8/ebook). Lecture Notes in Computer Science 9709, 105-114 (2016). MSC: 68Qxx PDF BibTeX XML Cite \textit{D. Gligoroski} and \textit{S. Samardjiska}, Lect. Notes Comput. Sci. 9709, 105--114 (2016; Zbl 06617637) Full Text: DOI
Buchmann, Johannes Introduction to cryptography. 6th revised edition. (Einführung in die Kryptographie.) (German) Zbl 1336.94002 Springer-Lehrbuch. Heidelberg: Springer Spektrum (ISBN 978-3-642-39774-5/pbk; 978-3-0642-39775-2/ebook). xxvi, 330 p. (2016). MSC: 94-01 94A60 94A62 00A06 11T71 14G50 68P25 11Y05 11Y11 PDF BibTeX XML Cite \textit{J. Buchmann}, Einführung in die Kryptographie. Heidelberg: Springer Spektrum (2016; Zbl 1336.94002) Full Text: DOI
Peretz, Y. On multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fields. (English) Zbl 1339.94058 Finite Fields Appl. 39, 1-35 (2016). MSC: 94A60 12E20 68Q17 PDF BibTeX XML Cite \textit{Y. Peretz}, Finite Fields Appl. 39, 1--35 (2016; Zbl 1339.94058) Full Text: DOI
Zhou, Ri-gui; Li, Wei; Huan, Tian-tian Comment on the “Quantum public-key cryptosystem”. (English) Zbl 1320.81048 Int. J. Theor. Phys. 54, No. 3, 1033-1037 (2015). MSC: 81P94 94A60 PDF BibTeX XML Cite \textit{R.-g. Zhou} et al., Int. J. Theor. Phys. 54, No. 3, 1033--1037 (2015; Zbl 1320.81048) Full Text: DOI
Yasuda, Takanori; Sakurai, Kouichi A security analysis of uniformly-layered Rainbow defined over non-commutative rings. (English) Zbl 1353.94078 Pac. J. Math. Ind. 6, 81-89 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Yasuda} and \textit{K. Sakurai}, Pac. J. Math. Ind. 6, 81--89 (2014; Zbl 1353.94078) Full Text: DOI
Akyıldız, Ersan; Ashraf, Muhammad An overview of trace based public key cryptography over finite fields. (English) Zbl 1312.94026 J. Comput. Appl. Math. 259 B, 599-621 (2014). MSC: 94A60 11T71 PDF BibTeX XML Cite \textit{E. Akyıldız} and \textit{M. Ashraf}, J. Comput. Appl. Math. 259, Part B, 599--621 (2014; Zbl 1312.94026) Full Text: DOI
Ashraf, Muhammad; Kırlar, Barış Bülent Message transmission for GH-public key cryptosystem. (English) Zbl 1338.94060 J. Comput. Appl. Math. 259, Part B, 578-585 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Ashraf} and \textit{B. B. Kırlar}, J. Comput. Appl. Math. 259, Part B, 578--585 (2014; Zbl 1338.94060) Full Text: DOI
Hashimoto, Yasufumi Cryptanalysis of the multivariate signature scheme proposed in PQCrypto 2013. (English) Zbl 1355.94061 Mosca, Michele (ed.), Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1–3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11658-7/pbk). Lecture Notes in Computer Science 8772, 108-125 (2014). MSC: 94A60 81P94 PDF BibTeX XML Cite \textit{Y. Hashimoto}, Lect. Notes Comput. Sci. 8772, 108--125 (2014; Zbl 1355.94061) Full Text: DOI
Hashimoto, Yasufumi Cryptanalysis of the Quaternion Rainbow. (English) Zbl 1344.94051 Sakiyama, Kazuo (ed.) et al., Advances in information and computer security. 8th international workshop on security, IWSEC 2013, Okinawa, Japan, November 18–20, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41382-7/pbk). Lecture Notes in Computer Science 8231, 244-257 (2013). MSC: 94A60 81P94 PDF BibTeX XML Cite \textit{Y. Hashimoto}, Lect. Notes Comput. Sci. 8231, 244--257 (2013; Zbl 1344.94051) Full Text: DOI
Miura, Hiroyuki; Hashimoto, Yasufumi; Takagi, Tsuyoshi Extended algorithm for solving underdefined multivariate quadratic equations. (English) Zbl 1306.94076 Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 118-135 (2013). MSC: 94A60 81P94 11T71 PDF BibTeX XML Cite \textit{H. Miura} et al., Lect. Notes Comput. Sci. 7932, 118--135 (2013; Zbl 1306.94076) Full Text: DOI
Yonemura, Tomoko; Isogai, Taichi; Muratani, Hirofumi; Hanatani, Yoshikazu Factor-4 and 6 (de)compression for values of pairings using trace maps. (English) Zbl 1291.94171 Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 19-34 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Yonemura} et al., Lect. Notes Comput. Sci. 7708, 19--34 (2013; Zbl 1291.94171) Full Text: DOI
Brandner, Günther RSA, Dickson, LUC and Williams: a study on four polynomial-type public-key cryptosystems. (English) Zbl 1277.94015 Appl. Algebra Eng. Commun. Comput. 24, No. 1, 17-36 (2013). MSC: 94A60 11T71 PDF BibTeX XML Cite \textit{G. Brandner}, Appl. Algebra Eng. Commun. Comput. 24, No. 1, 17--36 (2013; Zbl 1277.94015) Full Text: DOI
Azizi, Abdelmalek; Bonnecaze, Alexis; Frey, Gerhard; El Marraki, Mohamed; Nitaj, Abderrahmane; Rolland, Robert; Tena Ayuso, Juan Cryptography: from history to applications. Summer school of CIMPA-UNESCO on cryptography, Oujda, Maroc, May 18–30, 2009. (Cryptographie: de l’histoire aux applications. Ecole d’été de CIMPA-UNESCO de cryptographie, Oujda, Maroc, Mai 18–30, 2009.) (English, French, Arabic) Zbl 1398.94006 Travaux en Cours 80. Paris: Hermann (ISBN 978-2-7056-8118-0). 388 p. (2012). Reviewer: Olaf Ninnemann (Uffing am Staffelsee) MSC: 94-06 94A60 11T71 11Y16 00B25 PDF BibTeX XML Cite \textit{A. Azizi} et al., Cryptographie: de l'histoire aux applications. Ecole d'été de CIMPA-UNESCO de cryptographie, Oujda, Maroc, Mai 18--30, 2009 (Arabic). Paris: Hermann (2012; Zbl 1398.94006)
Kamal, Abdel Alim; Youssef, Amr M. Fault analysis of the NTRUSign digital signature scheme. (English) Zbl 1282.94048 Cryptogr. Commun. 4, No. 2, 131-144 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{A. A. Kamal} and \textit{A. M. Youssef}, Cryptogr. Commun. 4, No. 2, 131--144 (2012; Zbl 1282.94048) Full Text: DOI
Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian Quantum signature scheme with weak arbitrator. (English) Zbl 1261.81060 Int. J. Theor. Phys. 51, No. 7, 2135-2142 (2012). MSC: 81P94 81P40 94A60 PDF BibTeX XML Cite \textit{M.-X. Luo} et al., Int. J. Theor. Phys. 51, No. 7, 2135--2142 (2012; Zbl 1261.81060) Full Text: DOI
Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian Quantum public-key cryptosystem. (English) Zbl 1243.81065 Int. J. Theor. Phys. 51, No. 3, 912-924 (2012). MSC: 81P94 94A60 PDF BibTeX XML Cite \textit{M.-X. Luo} et al., Int. J. Theor. Phys. 51, No. 3, 912--924 (2012; Zbl 1243.81065) Full Text: DOI
Martin, Keith M. Everyday cryptography. Fundamental principles and applications. (English) Zbl 1256.94001 Oxford: Oxford University Press (ISBN 978-0-19-969559-1/pbk). xxii, 530 p. (2012). Reviewer: Wilfried Meidl (Istanbul) MSC: 94-01 94A15 94A60 94A62 PDF BibTeX XML Cite \textit{K. M. Martin}, Everyday cryptography. Fundamental principles and applications. Oxford: Oxford University Press (2012; Zbl 1256.94001)
Ilić, Ivana; Magliveras, Spyros S. Crypto applications of combinatorial group theory. (English) Zbl 1366.94502 Crnković, Dean (ed.) et al., Information security, coding theory and related combinatorics. Information coding and combinatorics. Based on lectures presented at the NATO Advanced Study Institute, Opatija, Croatia, May 31 – June 11, 2010. Amsterdam: IOS Press (ISBN 978-1-60750-662-1/hbk; 978-1-60750-663-8/ebook). NATO Science for Peace and Security Series D: Information and Communication Security 29, 1-16 (2011). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{I. Ilić} and \textit{S. S. Magliveras}, NATO Sci. Peace Secur. Ser. D, Inf. Commun. Secur. 29, 1--16 (2011; Zbl 1366.94502) Full Text: DOI
Tang, Shaohua; Yi, Haibo; Ding, Jintai; Chen, Huan; Chen, Guomin High-speed hardware implementation of Rainbow signature on FPGAs. (English) Zbl 1298.94107 Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 228-243 (2011). MSC: 94A60 81P94 11T71 PDF BibTeX XML Cite \textit{S. Tang} et al., Lect. Notes Comput. Sci. 7071, 228--243 (2011; Zbl 1298.94107) Full Text: DOI
Jao, David; De Feo, Luca Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. (English) Zbl 1290.94094 Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 19-34 (2011). MSC: 94A60 14G50 PDF BibTeX XML Cite \textit{D. Jao} and \textit{L. De Feo}, Lect. Notes Comput. Sci. 7071, 19--34 (2011; Zbl 1290.94094) Full Text: DOI
Hashimoto, Yasufumi; Takagi, Tsuyoshi; Sakurai, Kouichi General fault attacks on multivariate public key cryptosystems. (English) Zbl 1290.94084 Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 1-18 (2011). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Hashimoto} et al., Lect. Notes Comput. Sci. 7071, 1--18 (2011; Zbl 1290.94084) Full Text: DOI
Mishkovski, Igor; Kocarev, Ljupco Chaos-based public-key cryptography. (English) Zbl 1221.94053 Kocarev, Ljupco (ed.) et al., Chaos-based cryptography. Berlin: Springer (ISBN 978-3-642-20541-5/hbk; 978-3-642-20542-2/ebook). Studies in Computational Intelligence 354, 27-65 (2011). MSC: 94A60 94A62 33C45 37N99 68P25 PDF BibTeX XML Cite \textit{I. Mishkovski} and \textit{L. Kocarev}, Stud. Comput. Intell. 354, 27--65 (2011; Zbl 1221.94053) Full Text: DOI
McAndrew, Alasdair Introduction to cryptography with open source software. (English) Zbl 1263.94002 Discrete Mathematics and its Applications. Boca Raton, FL: CRC Press (ISBN 978-1-4398-2570-9/hbk). xix, 441 p. (2011). MSC: 94-01 94A60 94A62 PDF BibTeX XML Cite \textit{A. McAndrew}, Introduction to cryptography with open source software. Boca Raton, FL: CRC Press (2011; Zbl 1263.94002)
Hrdina, Jaroslav; Kureš, Miroslav; Vašík, Petr A note on tame polynomial automorphisms and the security of TTM cryptosystem. (English) Zbl 1242.94029 Appl. Comput. Math. 9, No. 2, 226-233 (2010). MSC: 94A60 14R10 PDF BibTeX XML Cite \textit{J. Hrdina} et al., Appl. Comput. Math. 9, No. 2, 226--233 (2010; Zbl 1242.94029) Full Text: Link
Buchmann, Johannes Introduction to cryptography. 5th ed. (Einführung in die Krytographie.) (German) Zbl 1208.94001 Springer-Lehrbuch. Berlin: Springer (ISBN 978-3-642-11185-3/pbk; 978-3-642-11186-0/ebook). xxiv, 278 p. (2010). Reviewer: Ralph-Hardo Schulz (Berlin) MSC: 94-01 94A60 11T71 14G50 68P25 94A62 11Y05 11Y11 PDF BibTeX XML Cite \textit{J. Buchmann}, Einführung in die Krytographie. Berlin: Springer (2010; Zbl 1208.94001) Full Text: DOI
Konstantinou, Elisavet; Kontogeorgis, Aristides; Stamatiou, Yannis C; Zaroliagis, Christos On the efficient generation of prime-order elliptic curves. (English) Zbl 1195.94063 J. Cryptology 23, No. 3, 477-503 (2010). MSC: 94A60 11T71 14H52 PDF BibTeX XML Cite \textit{E. Konstantinou} et al., J. Cryptology 23, No. 3, 477--503 (2010; Zbl 1195.94063) Full Text: DOI
Garber, David Braid group cryptography. (English) Zbl 1203.94100 Berrick, A. Jon (ed.) et al., Braids. Introductory lectures on braids, configurations and their applications. Based on the program “Braids”, IMS, Singapore, May 14–July 13, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-4291-40-8/hbk). Lecture Notes Series. Institute for Mathematical Sciences. National University of Singapore 19, 329-403 (2010). Reviewer: R. W. van der Waall (Huizen) MSC: 94A60 94A62 20F36 20F10 PDF BibTeX XML Cite \textit{D. Garber}, Lect. Notes Ser., Inst. Math. Sci., Natl. Univ. Singap. 19, 329--403 (2010; Zbl 1203.94100) Full Text: arXiv
Karpfinger, Christian; Kiechle, Hubert Cryptology. Algebraic methods and algorithms. (Kryptologie. Algebraische Methoden und Algorithmen.) (German) Zbl 1190.94001 Studium. Wiesbaden: Vieweg+Teubner (ISBN 978-3-8348-0884-4/pbk). ix, 261 p. (2010). Reviewer: Wilfried Meidl (Istanbul) MSC: 94-01 94A60 11T71 PDF BibTeX XML Cite \textit{C. Karpfinger} and \textit{H. Kiechle}, Kryptologie. Algebraische Methoden und Algorithmen. Wiesbaden: Vieweg+Teubner (2010; Zbl 1190.94001)
Abisha, P. J.; Thomas, D. G.; Samuel, D. Jayaseelan Public key cryptosystems and line pictures. (English) Zbl 1195.94046 J. Comb. Math. Comb. Comput. 69, 5-14 (2009). Reviewer: Richard A. Mollin (Calgary) MSC: 94A60 11Y05 PDF BibTeX XML Cite \textit{P. J. Abisha} et al., J. Comb. Math. Comb. Comput. 69, 5--14 (2009; Zbl 1195.94046)
Claycomb, William; Shin, Dongwan Protecting sensitive information in directory services using virtual directories. (English) Zbl 1184.68232 Bertino, Elisa (ed.) et al., Collaborative computing: networking, applications and worksharing. 4th international ICST conference, CollaborateCom 2008, Orlando, FL, USA, November 13–16, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-03353-7/pbk; 978-3-642-03354-4/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 10, 244-257 (2009). MSC: 68P25 PDF BibTeX XML Cite \textit{W. Claycomb} and \textit{D. Shin}, Lect. Notes Comput. Sci. Soc.-Inform. Telecommun. Eng. 10, 244--257 (2009; Zbl 1184.68232) Full Text: DOI
Zhou, Haijian; Luo, Ping; Wang, Daoshun; Dai, Yiqi Probability method for cryptanalysis of general multivariate modular linear equation. (English) Zbl 1181.94109 Sci. China, Ser. F. 52, No. 10, 1792-1800 (2009). MSC: 94A60 PDF BibTeX XML Cite \textit{H. Zhou} et al., Sci. China, Ser. F 52, No. 10, 1792--1800 (2009; Zbl 1181.94109) Full Text: DOI
Rososhek, S. K. Cryptosystems in automorphism groups of group rings of Abelian groups. (English. Russian original) Zbl 1156.94375 J. Math. Sci., New York 154, No. 3, 386-391 (2008); translation from Fundam. Prikl. Mat. 13, No. 3, 157-164 (2007). MSC: 94A60 20C05 16S34 PDF BibTeX XML Cite \textit{S. K. Rososhek}, J. Math. Sci., New York 154, No. 3, 386--391 (2008; Zbl 1156.94375); translation from Fundam. Prikl. Mat. 13, No. 3, 157--164 (2007) Full Text: DOI
Wätjen, Dietmar Cryptography. Foundations, algorithms, protocols. 2nd ed. (Kryptographie. Grundlagen, Algorithmen, Protokolle.) (German) Zbl 1187.94030 Heidelberg: Spektrum Akademischer Verlag (ISBN 978-3-8274-1916-3/hbk). xi, 343 p. (2008). MSC: 94A60 94-01 68P25 94A62 PDF BibTeX XML Cite \textit{D. Wätjen}, Kryptographie. Grundlagen, Algorithmen, Protokolle. 2nd ed. Heidelberg: Spektrum Akademischer Verlag (2008; Zbl 1187.94030)
Buchmann, Johannes Introduction to cryptography. 4th extended ed. (Einführung in die Kryptographie.) (German) Zbl 1145.94001 Berlin: Springer (ISBN 978-3-540-74451-1/pbk). xxii, 274 p. (2008). Reviewer: Wilfried Meidl (Istanbul) MSC: 94-01 94A60 94A62 68P25 11Y16 11Y05 11Y11 PDF BibTeX XML Cite \textit{J. Buchmann}, Einführung in die Kryptographie. 4th extended ed. Berlin: Springer (2008; Zbl 1145.94001) Full Text: DOI
Elias, Grace; Miri, Ali; Yeap, Tet-Hin On efficient implementation of FPGA-based hyperelliptic curve cryptosystems. (English) Zbl 1124.68030 Comput. Electr. Eng. 33, No. 5-6, 349-366 (2007). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{G. Elias} et al., Comput. Electr. Eng. 33, No. 5--6, 349--366 (2007; Zbl 1124.68030) Full Text: DOI
Beutelspacher, Albrecht Cryptology. An introduction to the science of encoding, concealing and hiding. 8th ed. (Kryptologie. Einführung in die Wissenschaft vom Verschlüsseln, Verbergen und Verheimlichen. Ohne alle Geheimniskrämerei, aber nicht ohne hinterlistigen Schalk, dargestellt zum Nutzen und Ergötzen des allgemeinen Publikums.) (German) Zbl 1152.94001 Wiesbaden: Vieweg (ISBN 978-3-8348-0253-8/pbk). xii, 155 p. (2007). Reviewer: Wilfried Meidl (Istanbul) MSC: 94-01 94A60 94A62 94A55 PDF BibTeX XML Cite \textit{A. Beutelspacher}, Kryptologie. Einführung in die Wissenschaft vom Verschlüsseln, Verbergen und Verheimlichen. Ohne alle Geheimniskrämerei, aber nicht ohne hinterlistigen Schalk, dargestellt zum Nutzen und Ergötzen des allgemeinen Publikums. 8th ed. Wiesbaden: Vieweg (2007; Zbl 1152.94001)
Castagnos, Guilhem An efficient probabilistic public-key cryptosystem over quadratic fields quotients. (English) Zbl 1129.11056 Finite Fields Appl. 13, No. 3, 563-576 (2007). Reviewer: John H. Loxton (Greenwich) MSC: 11T71 94A60 11B39 11R11 68P25 PDF BibTeX XML Cite \textit{G. Castagnos}, Finite Fields Appl. 13, No. 3, 563--576 (2007; Zbl 1129.11056) Full Text: DOI
González Vasco, María Isabel; Pérez García, David Attacking a public key cryptosystem based on tree replacement. (English) Zbl 1106.94022 Discrete Appl. Math. 155, No. 1, 61-67 (2007). MSC: 94A60 05C05 05C90 PDF BibTeX XML Cite \textit{M. I. González Vasco} and \textit{D. Pérez García}, Discrete Appl. Math. 155, No. 1, 61--67 (2007; Zbl 1106.94022) Full Text: DOI
Gebhardt, Volker Computer aided discovery of a fast algorithm for testing conjugacy in braid groups. (English) Zbl 1148.20025 Bosma, Wieb (ed.) et al., Discovering mathematics with Magma. Reducing the abstract to the concrete. Berlin: Springer (ISBN 3-540-37632-1/hbk). Algorithms and Computation in Mathematics 19, 261-285 (2006). MSC: 20F36 20-04 20F10 68W30 94A60 PDF BibTeX XML Cite \textit{V. Gebhardt}, Algorithms Comput. Math. 19, 261--285 (2006; Zbl 1148.20025) Full Text: DOI
Nikov, Ventzislav; Nikova, Svetla; Preneel, Bart A weakness in some oblivious transfer and zero-knowledge protocols. (English) Zbl 1172.94592 Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 348-363 (2006). MSC: 94A60 PDF BibTeX XML Cite \textit{V. Nikov} et al., Lect. Notes Comput. Sci. 4284, 348--363 (2006; Zbl 1172.94592) Full Text: DOI
Coglianese, Michael; Goi, Bok-Min MaTRU: A new NTRU-based cryptosystem. (English) Zbl 1153.94362 Maitra, Subhamoy (ed.) et al., Progress in cryptology – INDOCRYPT 2005. 6th international conference on cryptology in India, Bangalore, India, December 10–12, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30805-8/pbk). Lecture Notes in Computer Science 3797, 232-243 (2005). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Coglianese} and \textit{B.-M. Goi}, Lect. Notes Comput. Sci. 3797, 232--243 (2005; Zbl 1153.94362) Full Text: DOI
Gjøsteen, Kristian Homomorphic cryptosystems based on subgroup membership problems. (English) Zbl 1126.94328 Dawson, Ed (ed.) et al., Progress in cryptology – Mycrypt 2005. First international conference on cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28–30, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28938-0/pbk). Lecture Notes in Computer Science 3715, 314-327 (2005). MSC: 94A60 PDF BibTeX XML Cite \textit{K. Gjøsteen}, Lect. Notes Comput. Sci. 3715, 314--327 (2005; Zbl 1126.94328) Full Text: DOI
Lempken, Wolfgang; van Trung, Tran On minimal logarithmic signatures of finite groups. (English) Zbl 1081.94038 Exp. Math. 14, No. 3, 257-269 (2005). MSC: 94A62 20D99 94A60 PDF BibTeX XML Cite \textit{W. Lempken} and \textit{T. van Trung}, Exp. Math. 14, No. 3, 257--269 (2005; Zbl 1081.94038) Full Text: DOI Euclid EuDML
Yang, Wu-Chuan; Guan, Dah-Jyh; Laih, Chi-Sung Fast multi-computations with integer similarity strategy. (English) Zbl 1081.94544 Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 138-153 (2005). MSC: 94A60 68M07 PDF BibTeX XML Cite \textit{W.-C. Yang} et al., Lect. Notes Comput. Sci. 3386, 138--153 (2005; Zbl 1081.94544) Full Text: DOI
Bani Hammad, Y.; Carter, G.; Dawson, E.; Müller, W.; Hitchcock, Y. RAK factoring algorithm. (English) Zbl 1096.94022 Australas. J. Comb. 33, 291-305 (2005). MSC: 94A60 11T71 PDF BibTeX XML Cite \textit{Y. Bani Hammad} et al., Australas. J. Comb. 33, 291--305 (2005; Zbl 1096.94022)
Wu, Chia-Long; Lou, Der-Chyuan; Chang, Te-Jen An efficient Montgomery exponentiation algorithm for cryptographic applications. (English) Zbl 1090.68037 Informatica, Vilnius 16, No. 3, 449-468 (2005). MSC: 68P25 PDF BibTeX XML Cite \textit{C.-L. Wu} et al., Informatica, Vilnius 16, No. 3, 449--468 (2005; Zbl 1090.68037)
Pon, Shun-Fu; Lu, Erl-Huei; Jeng, Albert B. One private-key for all DL-based cryptosystems. (English) Zbl 1076.94010 Appl. Math. Comput. 170, No. 1, 666-672 (2005). MSC: 94A60 PDF BibTeX XML Cite \textit{S.-F. Pon} et al., Appl. Math. Comput. 170, No. 1, 666--672 (2005; Zbl 1076.94010) Full Text: DOI
Tsaur, Woei-Jiunn Several security schemes constructed using ECC-based self-certified public key cryptosystems. (English) Zbl 1076.94016 Appl. Math. Comput. 168, No. 1, 447-464 (2005). MSC: 94A60 14G50 PDF BibTeX XML Cite \textit{W.-J. Tsaur}, Appl. Math. Comput. 168, No. 1, 447--464 (2005; Zbl 1076.94016) Full Text: DOI
Nedjah, Nadia; de Macedo Mourelle, Luiza Efficient pre-processing for large window-based modular exponentiation using ant colony. (English) Zbl 1104.68490 Informatica, Ljubl. 29, No. 2, 155-161 (2005). MSC: 68P25 PDF BibTeX XML Cite \textit{N. Nedjah} and \textit{L. de Macedo Mourelle}, Informatica, Ljubl. 29, No. 2, 155--161 (2005; Zbl 1104.68490)
Glukhov, M. M. On the application of rings of integer algebraic numbers to the construction of public-key cryptoschemes. (Russian) Zbl 1183.94034 Chebyshevskiĭ Sb. 5, No. 4(12), 75-81 (2004). Reviewer: Vladimír Lacko (Košice) MSC: 94A60 11R04 PDF BibTeX XML Cite \textit{M. M. Glukhov}, Chebyshevskiĭ Sb. 5, No. 4(12), 75--81 (2004; Zbl 1183.94034)
Chow, Sherman S. M.; Yiu, S. M.; Hui, Lucas C. K.; Chow, K. P. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. (English) Zbl 1092.94505 Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 352-369 (2004). MSC: 94A60 PDF BibTeX XML Cite \textit{S. S. M. Chow} et al., Lect. Notes Comput. Sci. 2971, 352--369 (2004; Zbl 1092.94505) Full Text: DOI
Hromkovič, Juraj Theoretical informatics. Computability, complexity theory, algorithmics, cryptography. An introduction. 2nd, revised and extended ed. (Theoretische Informatik. Berechenbarkeit, Komplexitätstheorie, Algorithmik, Kryptographie. Eine Einführung.) (German) Zbl 1069.68046 Leitfäden der Informatik. Stuttgart: Teubner (ISBN 3-519-10332-X/pbk). 335 p. (2004). MSC: 68Q01 68Q05 68Q15 68-01 68Q25 68Q30 68W20 94A60 94A62 PDF BibTeX XML Cite \textit{J. Hromkovič}, Theoretische Informatik. Berechenbarkeit, Komplexitätstheorie, Algorithmik, Kryptographie. Eine Einführung. 2nd, revised and extended ed. Stuttgart: Teubner (2004; Zbl 1069.68046)
Hu, Denis Goh Chuan; Samsudin, Azman Two way authentication key agreement based on braid groups. (English) Zbl 1088.94021 Int. J. Pure Appl. Math. 16, No. 4, 515-535 (2004). Reviewer: Richard A. Mollin (Calgary) MSC: 94A62 20F36 94A60 PDF BibTeX XML Cite \textit{D. G. C. Hu} and \textit{A. Samsudin}, Int. J. Pure Appl. Math. 16, No. 4, 515--535 (2004; Zbl 1088.94021)
Lou, Der-Chyuan; Wu, Chia-Long Parallel exponentiation using common-multiplicand-multiplication and signed-digit-folding techniques. (English) Zbl 1098.94026 Int. J. Comput. Math. 81, No. 10, 1187-1202 (2004). MSC: 94A60 68W40 68M07 PDF BibTeX XML Cite \textit{D.-C. Lou} and \textit{C.-L. Wu}, Int. J. Comput. Math. 81, No. 10, 1187--1202 (2004; Zbl 1098.94026) Full Text: DOI
Yi, Xun Authenticated key agreement in dynamic peer groups. (English) Zbl 1071.68007 Theor. Comput. Sci. 326, No. 1-3, 363-382 (2004). MSC: 68M12 68M14 94A62 PDF BibTeX XML Cite \textit{X. Yi}, Theor. Comput. Sci. 326, No. 1--3, 363--382 (2004; Zbl 1071.68007) Full Text: DOI
Buchmann, Johannes A. Introduction to cryptography. 2nd ed. (English) Zbl 1098.94001 Undergraduate Texts in Mathematics. New York, NY: Springer (ISBN 0-387-20756-2/pbk). xvi, 335 p. (2004). MSC: 94-01 94A60 68P25 94A62 11Y16 11Y11 PDF BibTeX XML Cite \textit{J. A. Buchmann}, Introduction to cryptography. 2nd ed. New York, NY: Springer (2004; Zbl 1098.94001)
Buchmann, Johannes A. Introduction to cryptography. 2nd ed. (English) Zbl 1050.94002 Undergraduate Texts in Mathematics. New York, NY: Springer (ISBN 0-387-21156-X/hbk). xvi, 335 p. (2004). MSC: 94-01 94A60 94A62 68P25 11Y16 11Y11 PDF BibTeX XML Cite \textit{J. A. Buchmann}, Introduction to cryptography. 2nd ed. New York, NY: Springer (2004; Zbl 1050.94002)
Libert, Benoît; Quisquater, Jean-Jacques Efficient revocation and threshold pairing based cryptosystems. (English) Zbl 1321.94078 Proceedings of the 22nd annual ACM symposium on principles of distributed computing, PODC ’03, Boston, MA, USA, July 13–16, 2003. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-708-7). 163-171 (2003). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{B. Libert} and \textit{J.-J. Quisquater}, in: Proceedings of the 22nd annual ACM symposium on principles of distributed computing, PODC '03, Boston, MA, USA, July 13--16, 2003. New York, NY: Association for Computing Machinery (ACM). 163--171 (2003; Zbl 1321.94078) Full Text: DOI
Howgrave-Graham, Nick; Nguyen, Phong Q.; Pointcheval, David; Proos, John; Silverman, Joseph H.; Singer, Ari; Whyte, William The impact of decryption failures on the security of NTRU encryption. (English) Zbl 1122.94377 Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 226-246 (2003). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Howgrave-Graham} et al., Lect. Notes Comput. Sci. 2729, 226--246 (2003; Zbl 1122.94377) Full Text: DOI
Courtois, Nicolas T.; Patarin, Jacques About the XL algorithm over GF(2). (English) Zbl 1039.94511 Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 141-157 (2003). MSC: 94A60 13P10 11T71 68Q25 PDF BibTeX XML Cite \textit{N. T. Courtois} and \textit{J. Patarin}, Lect. Notes Comput. Sci. 2612, 141--157 (2003; Zbl 1039.94511) Full Text: Link
Pieprzyk, Josef; Hardjono, Thomas; Seberry, Jennifer Fundamentals of computer security. (English) Zbl 1011.68034 Berlin: Springer. xx, 677 p. EUR 64.95/net; sFr. 108.00; £45.50; $ 69.95 (2003). Reviewer: Lenka Fibikova (Essen) MSC: 68P25 68-01 PDF BibTeX XML Cite \textit{J. Pieprzyk} et al., Fundamentals of computer security. Berlin: Springer (2003; Zbl 1011.68034)
Magliveras, Spyros S. Secret- and public-key cryptosystems from group factorizations. (English) Zbl 1050.94011 Tatra Mt. Math. Publ. 25, 11-22 (2002). Reviewer: Rainer Steinwandt (Karlsruhe) MSC: 94A60 20B40 20D40 68P25 20D60 PDF BibTeX XML Cite \textit{S. S. Magliveras}, Tatra Mt. Math. Publ. 25, 11--22 (2002; Zbl 1050.94011)
Park, Young-Ho; Jeong, Sangtae; Kim, Chang Han; Lim, Jongin An alternate decomposition of an integer for faster point multiplication on certain elliptic curves. (English) Zbl 1055.94527 Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 323-334 (2002). MSC: 94A60 14G50 PDF BibTeX XML Cite \textit{Y.-H. Park} et al., Lect. Notes Comput. Sci. 2274, 323--334 (2002; Zbl 1055.94527) Full Text: Link
Itoh, Kouichi; Yajima, Jun; Takenaka, Masahiko; Torii, Naoya DPA countermeasures by improving the window method. (English) Zbl 1020.94521 Kaliski, Burton S. jun. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2523, 303-317 (2002). MSC: 94A60 14G50 PDF BibTeX XML Cite \textit{K. Itoh} et al., Lect. Notes Comput. Sci. 2523, 303--317 (2002; Zbl 1020.94521) Full Text: Link
Trichina, Elena; Bellezza, Antonio Implementation of elliptic curve cryptography with built-in counter measures against side channel attacks. (English) Zbl 1020.94527 Kaliski, Burton S. jun. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2523, 98-113 (2002). MSC: 94A60 14G50 PDF BibTeX XML Cite \textit{E. Trichina} and \textit{A. Bellezza}, Lect. Notes Comput. Sci. 2523, 98--113 (2002; Zbl 1020.94527) Full Text: Link
Gong, Guang; Lam, Charles C. Y. Linear recursive sequences over elliptic curves. (English) Zbl 1035.94532 Helleseth, Tor (ed.) et al., Sequences and their applications. Proceedings of the 2nd international conference (SETA’01), Bergen, Norway, May 13–17, 2001. London: Springer (ISBN 1-85233-529-7). Discrete Mathematics and Theoretical Computer Science, 182-196 (2002). MSC: 94A55 11G20 14G50 94A60 PDF BibTeX XML Cite \textit{G. Gong} and \textit{C. C. Y. Lam}, in: Sequences and their applications. Proceedings of the 2nd international conference (SETA'01), Bergen, Norway, May 13--17, 2001. London: Springer. 182--196 (2002; Zbl 1035.94532)
Watanabe, Yodai; Shikata, Junji; Imai, Hideki Equivalence between semantic security and indistinguishability against chosen ciphertext attacks. (English) Zbl 1033.94547 Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 71-84 (2002). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Watanabe} et al., Lect. Notes Comput. Sci. 2567, 71--84 (2002; Zbl 1033.94547) Full Text: DOI
Magliveras, S. S.; Stinson, D. R.; van Trung, Tran New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups. (English) Zbl 1020.94010 J. Cryptology 15, No. 4, 285-297 (2002). MSC: 94A60 20E99 PDF BibTeX XML Cite \textit{S. S. Magliveras} et al., J. Cryptology 15, No. 4, 285--297 (2002; Zbl 1020.94010) Full Text: DOI
Choi, Dug-Hwan; Choi, Seungbok; Won, Dongho Improvement of probabilistic public key cryptosystems using discrete logarithm. (English) Zbl 0999.94528 Kim, Kwangjo (ed.), Information security and cryptology - ICISC 2001. 4th international conference, Seoul, Korea, December 6-7, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2288, 72-80 (2002). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{D.-H. Choi} et al., Lect. Notes Comput. Sci. 2288, 72--80 (2002; Zbl 0999.94528)
Beutelspacher, Albrecht Cryptology. An introduction to the science of encoding, concealing and hiding. 6., überarb. Aufl. (Kryptologie. Einführung in die Wissenschaft vom Verschlüsseln, Verbergen und Verheimlichen.) (German) Zbl 1005.94001 Wiesbaden: Vieweg. viii, 179 S. (2002). Reviewer: Lenka Fibikova (Essen) MSC: 94-01 94A60 94A62 94A55 PDF BibTeX XML Cite \textit{A. Beutelspacher}, Kryptologie. Einführung in die Wissenschaft vom Verschlüsseln, Verbergen und Verheimlichen. 6., überarb. Aufl. Wiesbaden: Vieweg (2002; Zbl 1005.94001)
Youssef, Amr; Gong, Guang Cryptanalysis of Imai and Matsumoto scheme B asymmetric cryptosystem. (English) Zbl 1011.94544 Rangan, C. Pandu (ed.) et al., Progress in cryptology - INDOCRYPT 2001. 2nd international conference on cryptology in India, Chennai, India, December 16-20, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2247, 214-222 (2001). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Youssef} and \textit{G. Gong}, Lect. Notes Comput. Sci. 2247, 214--222 (2001; Zbl 1011.94544)
Nguyen, Phong Q.; Stern, Jacques The two faces of lattices in cryptology. (English) Zbl 1006.94531 Silverman, Joseph H. (ed.), Cryptography and lattices. 1st international conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2146, 146-180 (2001). MSC: 94A60 11H06 PDF BibTeX XML Cite \textit{P. Q. Nguyen} and \textit{J. Stern}, Lect. Notes Comput. Sci. 2146, 146--180 (2001; Zbl 1006.94531) Full Text: Link
Micciancio, Daniele Improving lattice based cryptosystems using the Hermite normal form. (English) Zbl 1006.94529 Silverman, Joseph H. (ed.), Cryptography and lattices. 1st international conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2146, 126-145 (2001). MSC: 94A60 11H06 11Y16 PDF BibTeX XML Cite \textit{D. Micciancio}, Lect. Notes Comput. Sci. 2146, 126--145 (2001; Zbl 1006.94529) Full Text: Link
De Santis, Alfredo; Di Crescenzo, Giovanni; Ostrovsky, Rafail; Persiano, Giuseppe; Sahai, Amit Robust non-interactive zero knowledge. (English) Zbl 1003.94526 Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 566-598 (2001). MSC: 94A60 PDF BibTeX XML Cite \textit{A. De Santis} et al., Lect. Notes Comput. Sci. 2139, 566--598 (2001; Zbl 1003.94526) Full Text: Link
Paeng, Seong-Hun; Ha, Kil-Chan; Kim, Jae Heon; Chee, Seongtaek; Park, Choonsik New public key cryptosystem using finite non abelian groups. (English) Zbl 1003.94525 Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 470-485 (2001). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{S.-H. Paeng} et al., Lect. Notes Comput. Sci. 2139, 470--485 (2001; Zbl 1003.94525) Full Text: Link
Kim, Hwankoo; Moon, SangJae New public-key cryptosystem using divisor class groups. (English) Zbl 1008.94539 Varadharajan, Vijay (ed.) et al., Information security and privacy. 6th Australasian conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2119, 74-83 (2001). MSC: 94A60 11R58 PDF BibTeX XML Cite \textit{H. Kim} and \textit{S. Moon}, Lect. Notes Comput. Sci. 2119, 74--83 (2001; Zbl 1008.94539) Full Text: Link
Kim, Seungjoo; Cheon, Jung Hee; Joye, Marc; Lim, Seongan; Mambo, Masahiro; Won, Dongho; Zheng, Yuliang Strong adaptive chosen-ciphertext attacks with memory dump (or: The importance of the order of decryption and validation). (English) Zbl 1024.68527 Honary, Bahram (ed.), Cryptography and coding. 8th IMA international conference, Cirencester, GB, December 17-19, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2260, 114-127 (2001). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Kim} et al., Lect. Notes Comput. Sci. 2260, 114--127 (2001; Zbl 1024.68527) Full Text: DOI
Fouque, Pierre-Alain; Poupard, Guillaume; Stern, Jacques Secret sharing decryption in the context of voting or lotteries. (English) Zbl 0999.94548 Frankel, Yair (ed.), Financial cryptography. 4th international conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1962, 90-104 (2001). MSC: 94A62 91B12 94A60 PDF BibTeX XML Cite \textit{P.-A. Fouque} et al., Lect. Notes Comput. Sci. 1962, 90--104 (2001; Zbl 0999.94548)
Niederreiter, Harald Error-correcting codes and cryptography. (English) Zbl 0989.94027 Alster, Kazimierz (ed.) et al., Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000. Berlin: de Gruyter. 209-219 (2001). Reviewer: K.Roegner (Berlin) MSC: 94A60 94B05 PDF BibTeX XML Cite \textit{H. Niederreiter}, in: Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11--15, 2000. Berlin: de Gruyter. 209--219 (2001; Zbl 0989.94027)
Lenstra, Arjen K.; Verheul, Eric R. Selecting cryptographic key sizes. (English) Zbl 1006.94020 J. Cryptology 14, No. 4, 255-293 (2001). MSC: 94A60 14G50 PDF BibTeX XML Cite \textit{A. K. Lenstra} and \textit{E. R. Verheul}, J. Cryptology 14, No. 4, 255--293 (2001; Zbl 1006.94020) Full Text: DOI
Scanlon, Thomas Public key cryptosystems based on Drinfeld modules are insecure. (English) Zbl 1004.94020 J. Cryptology 14, No. 4, 225-230 (2001). MSC: 94A60 11G09 11T71 PDF BibTeX XML Cite \textit{T. Scanlon}, J. Cryptology 14, No. 4, 225--230 (2001; Zbl 1004.94020) Full Text: DOI
Fouque, Pierre-Alain; Stern, Jacques One round threshold discrete-log key generation without private channels. (English) Zbl 0992.94506 Kim, Kwangjo (ed.), Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1992, 300-316 (2001). MSC: 94A60 PDF BibTeX XML Cite \textit{P.-A. Fouque} and \textit{J. Stern}, Lect. Notes Comput. Sci. 1992, 300--316 (2001; Zbl 0992.94506)
Steinwandt, Rainer Loopholes in two public key cryptosystems using the modular group. (English) Zbl 0991.94047 Kim, Kwangjo (ed.), Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1992, 180-189 (2001). MSC: 94A60 11F06 PDF BibTeX XML Cite \textit{R. Steinwandt}, Lect. Notes Comput. Sci. 1992, 180--189 (2001; Zbl 0991.94047)
Kobara, Kazukuni; Imai, Hideki Semantically secure McEliece public-key cryptosystems – conversions for McEliece PKC –. (English) Zbl 0988.94021 Kim, Kwangjo (ed.), Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1992, 19-35 (2001). MSC: 94A60 PDF BibTeX XML Cite \textit{K. Kobara} and \textit{H. Imai}, Lect. Notes Comput. Sci. 1992, 19--35 (2001; Zbl 0988.94021)
Ye, Dingfeng; Dai, Zongduo; Lam, Kwok-Yan Decomposing attacks on asymmetric cryptography based on mapping compositions. (English) Zbl 1021.94526 J. Cryptology 14, No. 2, 137-150 (2001). MSC: 94A60 12Y05 PDF BibTeX XML Cite \textit{D. Ye} et al., J. Cryptology 14, No. 2, 137--150 (2001; Zbl 1021.94526) Full Text: DOI
Boneh, Dan; DeMillo, Richard A.; Lipton, Richard J. On the importance of eliminating errors in cryptographic computations. (English) Zbl 1018.94014 J. Cryptology 14, No. 2, 101-119 (2001). Reviewer: Josef Vyskoč (Bratislava) MSC: 94A60 PDF BibTeX XML Cite \textit{D. Boneh} et al., J. Cryptology 14, No. 2, 101--119 (2001; Zbl 1018.94014) Full Text: DOI
González Vasco, Maria Isabel; Näslund, Mats A survey of hard core functions. (English) Zbl 1002.94533 Lam, Kwok-Yan (ed.) et al., Cryptography and computational number theory. Proceedings of the workshop, CCNT’99, Singapore, November 22-26, 1999. Basel: Birkhäuser. Prog. Comput. Sci. Appl. Log. 20, 227-255 (2001). MSC: 94A60 PDF BibTeX XML Cite \textit{M. I. González Vasco} and \textit{M. Näslund}, Prog. Comput. Sci. Appl. Log. 20, 227--255 (2001; Zbl 1002.94533)
Volkmann, Lutz Discrete structures. An introduction. (Diskrete Strukturen. Eine Einführung.) (German) Zbl 1024.00001 Aachener Beiträge zur Mathematik. 27. Aachen: Wissenschaftsverlag Mainz in Aachen. iii, 217 S. (2000). Reviewer: B.Randerath (Köln) MSC: 00A05 11-01 05-01 68-01 PDF BibTeX XML Cite \textit{L. Volkmann}, Diskrete Strukturen. Eine Einführung. Aachen: Wissenschaftsverlag Mainz in Aachen (2000; Zbl 1024.00001)
Tao, Renji; Chen, Shihua Input-trees of finite automata and application to cryptanalysis. (English) Zbl 0976.94024 J. Comput. Sci. Technol. 15, No. 4, 305-325 (2000). MSC: 94A60 68Q45 68P25 PDF BibTeX XML Cite \textit{R. Tao} and \textit{S. Chen}, J. Comput. Sci. Technol. 15, No. 4, 305--325 (2000; Zbl 0976.94024) Full Text: DOI
Hankerson, D. R.; Hoffman, D. G.; Leonard, D. A.; Lindner, C. C.; Phelps, K. T.; Rodger, C. A.; Wall, J. R. Coding theory and cryptography. The essentials. 2nd ed., rev. and expanded. (English) Zbl 0955.94001 Pure and Applied Mathematics, Marcel Dekker. 234. New York, NY: Marcel Dekker. 368 p. (2000). Reviewer: T.Helleseth (Bergen) MSC: 94-01 94Bxx 94A60 94B05 94B10 94B15 94B20 11T71 PDF BibTeX XML Cite \textit{D. R. Hankerson} et al., Coding theory and cryptography. The essentials. 2nd ed., rev. and expanded. New York, NY: Marcel Dekker (2000; Zbl 0955.94001)
Wu, Chuan-Kun; Varadharajan, Vijay Public key cryptosystems based on Boolean permutations and their applications. (English) Zbl 0978.94039 Int. J. Comput. Math. 74, No. 2, 167-184 (2000). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{C.-K. Wu} and \textit{V. Varadharajan}, Int. J. Comput. Math. 74, No. 2, 167--184 (2000; Zbl 0978.94039) Full Text: DOI
Gong, Guang; Berson, Thomas A.; Stinson, Douglas R. Elliptic curve pseudorandom sequence generators. (English) Zbl 0993.94547 Heys, Howard (ed.) et al., Selected areas in cryptography. 6th annual international workshop, SAC ’99. Kingston, Ontario, Canada, August 9-10, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1758, 34-48 (2000). MSC: 94A60 94A55 14G50 PDF BibTeX XML Cite \textit{G. Gong} et al., Lect. Notes Comput. Sci. 1758, 34--48 (2000; Zbl 0993.94547)
Imai, Hideki (ed.); Zheng, Yuliang (ed.) Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18–20, 2000. Proceedings. (English) Zbl 0931.00050 Lecture Notes in Computer Science. 1751. Berlin: Springer. xi, 485 p. (2000). MSC: 00B25 94-06 94A60 PDF BibTeX XML Cite \textit{H. Imai} (ed.) and \textit{Y. Zheng} (ed.), Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18--20, 2000. Proceedings. Berlin: Springer (2000; Zbl 0931.00050) Full Text: DOI
Walsh, P. Gary Efficiency vs. security in the implementation of public-key cryptography. (English) Zbl 0963.68069 Calude, C. S. (ed.) et al., Combinatorics, computation & logic. Proceedings of DMTCS ’99 and CATS ’99. Auckland, New Zealand, January 18-21, 1999. Singapore: Springer. Aust. Comput. Sci. Commun. 21, 3, 81-105 (1999). MSC: 68P25 PDF BibTeX XML Cite \textit{P. G. Walsh}, in: Combinatorics, computation \& logic. Proceedings of DMTCS '99 and CATS '99. Auckland, New Zealand, January 18--21, 1999. Singapore: Springer. 81--105 (1999; Zbl 0963.68069)
Paillier, Pascal; Pointcheval, David Efficient public-key cryptosystems provably secure against active adversaries. (English) Zbl 0977.94038 Lam, Kwok Yan (ed.) et al., Advances in cryptology - ASIACRYPT ’99. International conference on the theory and application of cryptology and information security, Singapore, November 14-18, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1716, 165-179 (1999). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Paillier} and \textit{D. Pointcheval}, Lect. Notes Comput. Sci. 1716, 165--179 (1999; Zbl 0977.94038)