Search

Your search keyword '"discrete logarithms"' showing total 121 results

Search Constraints

Start Over You searched for: Descriptor "discrete logarithms" Remove constraint Descriptor: "discrete logarithms"
121 results on '"discrete logarithms"'

Search Results

1. Extending Regev’s Factoring Algorithm to Compute Discrete Logarithms

2. A New Fast Algorithm for Computation of on Finite Fermat Fields

3. Cheating identifiable polynomial based secret sharing scheme for audio and image.

4. Discrete logarithm problem in matrix

5. Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE

6. Quantum algorithms for computing general discrete logarithms and orders with tradeoffs

7. Enhanced VSDL Hash Algorithm for Data Integrity and Protection

8. Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)

9. Computing Low-Weight Discrete Logarithms

10. On computing the degree of a Chebyshev Polynomial from its value.

11. Quantum Algorithms for Computing Short Discrete Logarithms and Factoring RSA Integers

12. On post-processing in the quantum algorithm for computing short discrete logarithms.

14. Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption

15. The Security of All RSA and Discrete Log Bits.

16. Kangaroos in Side-Channel Attacks

19. Computing Small Discrete Logarithms Faster

20. Correspondences on Hyperelliptic Curves and Applications to the Discrete Logarithm

21. Factor base discrete logarithms in Kummer extensions.

22. On computing the degree of a Chebyshev Polynomial from its value

23. An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve

25. Quantum algorithms for computing general discrete logarithms and orders with tradeoffs

28. Key Authentication Scheme-based on Discrete Logarithms and Chinese Remainder Theorem.

29. Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)

30. Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation

34. Diffie-Hellman Oracles

36. Cryptanalysis of Zuhua Shao key Authentication Scheme.

37. Technical history of discrete logarithms in small characteristic finite fields.

38. Quantum algorithms for computing general discrete logarithms and orders with tradeoffs

39. A New Proxy Signature with Revocation Based On Security Advancement.

40. Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE

41. Efficient Convertible Multi-authenticated Encryption Scheme for Group Communications.

42. Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing.

43. Harnessing Mathematics for Secure Cryptographic Techniques

44. An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce.

45. Construction of k-ary pseudorandom elliptic curve sequences.

46. The Modified Signature Scheme Based on Factoring and Discrete Logarithms.

47. BIST-Based Fault Diagnosis for Read-Only Memories.

48. High Volume Diagnosis in Memory BIST Based on Compressed Failure Data.

49. A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM.

50. Self-certified multi-proxy signature schemes with message recovery.

Catalog

Books, media, physical & digital resources