1018 results in Cryptography ,Cryptology and Coding
20 - The Diffie–Hellman problem and cryptographic applications
- from PART V - CRYPTOGRAPHY RELATED TO DISCRETE LOGARITHMS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 405-417
-
- Chapter
- Export citation
3 - Hash functions and MACs
- from PART I - BACKGROUND
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 54-58
-
- Chapter
- Export citation
Contents
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp v-xii
-
- Chapter
- Export citation
5 - Varieties
- from PART II - ALGEBRAIC GROUPS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 66-85
-
- Chapter
- Export citation
4 - Preliminary remarks on algebraic groups
- from PART II - ALGEBRAIC GROUPS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 61-65
-
- Chapter
- Export citation
12 - Primality testing and integer factorisation using algebraic groups
- from PART III - EXPONENTIATION, FACTORING AND DISCRETE LOGARITHMS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 238-245
-
- Chapter
- Export citation
16 - Lattices
- from PART IV - LATTICES
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 337-346
-
- Chapter
- Export citation
Author index
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 603-607
-
- Chapter
- Export citation
19 - Coppersmith's method and related applications
- from PART IV - LATTICES
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 380-402
-
- Chapter
- Export citation
2 - Basic algorithmic number theory
- from PART I - BACKGROUND
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 13-53
-
- Chapter
- Export citation
1 - Introduction
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 1-10
-
- Chapter
- Export citation
PART IV - LATTICES
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 335-336
-
- Chapter
- Export citation
15 - Factoring and discrete logarithms in subexponential time
- from PART III - EXPONENTIATION, FACTORING AND DISCRETE LOGARITHMS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 301-334
-
- Chapter
- Export citation
21 - The Diffie–Hellman problem
- from PART V - CRYPTOGRAPHY RELATED TO DISCRETE LOGARITHMS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 418-451
-
- Chapter
- Export citation
Acknowledgements
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp xiv-xiv
-
- Chapter
- Export citation
Appendix A - Background mathematics
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 564-578
-
- Chapter
- Export citation
13 - Basic discrete logarithm algorithms
- from PART III - EXPONENTIATION, FACTORING AND DISCRETE LOGARITHMS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 246-261
-
- Chapter
- Export citation
18 - Algorithms for the closest and shortest vector problems
- from PART IV - LATTICES
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 366-379
-
- Chapter
- Export citation
8 - Rational maps on curves and divisors
- from PART II - ALGEBRAIC GROUPS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 121-137
-
- Chapter
- Export citation
6 - Tori, LUC and XTR
- from PART II - ALGEBRAIC GROUPS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 86-100
-
- Chapter
- Export citation