8651 results in Discrete Mathematics, Information Theory and Coding
9 - Elliptic curves
- from PART II - ALGEBRAIC GROUPS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 138-177
-
- Chapter
- Export citation
7 - Curves and divisor class groups
- from PART II - ALGEBRAIC GROUPS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 101-120
-
- Chapter
- Export citation
Mathematics of Public Key Cryptography
-
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012
22 - Digital signatures based on discrete logarithms
- from PART V - CRYPTOGRAPHY RELATED TO DISCRETE LOGARITHMS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 452-468
-
- Chapter
- Export citation
Preface
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp xiii-xiii
-
- Chapter
- Export citation
PART II - ALGEBRAIC GROUPS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 59-60
-
- Chapter
- Export citation
PART VII - ADVANCED TOPICS IN ELLIPTIC AND HYPERELLIPTIC CURVES
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 513-514
-
- Chapter
- Export citation
PART I - BACKGROUND
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 11-12
-
- Chapter
- Export citation
26 - Pairings on elliptic curves
- from PART VII - ADVANCED TOPICS IN ELLIPTIC AND HYPERELLIPTIC CURVES
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 545-563
-
- Chapter
- Export citation
10 - Hyperelliptic curves
- from PART II - ALGEBRAIC GROUPS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 178-212
-
- Chapter
- Export citation
20 - The Diffie–Hellman problem and cryptographic applications
- from PART V - CRYPTOGRAPHY RELATED TO DISCRETE LOGARITHMS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 405-417
-
- Chapter
- Export citation
3 - Hash functions and MACs
- from PART I - BACKGROUND
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 54-58
-
- Chapter
- Export citation
Contents
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp v-xii
-
- Chapter
- Export citation
5 - Varieties
- from PART II - ALGEBRAIC GROUPS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 66-85
-
- Chapter
- Export citation
4 - Preliminary remarks on algebraic groups
- from PART II - ALGEBRAIC GROUPS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 61-65
-
- Chapter
- Export citation
12 - Primality testing and integer factorisation using algebraic groups
- from PART III - EXPONENTIATION, FACTORING AND DISCRETE LOGARITHMS
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 238-245
-
- Chapter
- Export citation
16 - Lattices
- from PART IV - LATTICES
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 337-346
-
- Chapter
- Export citation
Author index
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 603-607
-
- Chapter
- Export citation
19 - Coppersmith's method and related applications
- from PART IV - LATTICES
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 380-402
-
- Chapter
- Export citation
2 - Basic algorithmic number theory
- from PART I - BACKGROUND
-
- Book:
- Mathematics of Public Key Cryptography
- Published online:
- 05 June 2012
- Print publication:
- 15 March 2012, pp 13-53
-
- Chapter
- Export citation