Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Discrete logarithm")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 174

  • Page / 7
Export

Selection :

  • and

A shorter proof for an explicit formula for discrete logarithms in finite fieldsWAN, Zhe-Xian.Discrete mathematics. 2008, Vol 308, Num 21, pp 4914-4915, issn 0012-365X, 2 p.Conference Paper

Elliptic curve implementation of zero-knowledge blobsKOBLITZ, N.Journal of cryptology. 1991, Vol 4, Num 3, pp 207-213, issn 0933-2790Article

The discrete logarithm in logarithmic <script small 1>-Class Groups and its applications in k-theoryPAULI, Sebastian; SORIANO-GAFIUK, Florence.Lecture notes in computer science. 2004, pp 367-378, issn 0302-9743, isbn 3-540-22156-5, 12 p.Conference Paper

New multisignature scheme for specified group of verifiersZHANG ZHANG; GUOZHEN XIAO.Applied mathematics and computation. 2004, Vol 157, Num 2, pp 425-431, issn 0096-3003, 7 p.Article

Comments on 'A password authentication scheme based on discrete logarithms'CHA-HON SUN; SHENG-DE WANG.International journal of computer mathematics. 1993, Vol 49, Num 1-2, pp 29-32, issn 0020-7160Article

Resolving large prime(s) variants for discrete logarithm computationHOLT, Andrew J; DAVENPORT, James H.Lecture notes in computer science. 2003, pp 207-222, issn 0302-9743, isbn 3-540-20663-9, 16 p.Conference Paper

Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic CurvesSMITH, Benjamin.Journal of cryptology. 2009, Vol 22, Num 4, pp 505-529, issn 0933-2790, 25 p.Article

Analysis of Low Hamming Weight ProductsJUNG HEE CHEON; KIM, Hongtae.Discrete applied mathematics. 2008, Vol 156, Num 12, pp 2264-2269, issn 0166-218X, 6 p.Article

Partial lifting and the elliptic curve discrete logarithm problemQI CHENG; HUANG, Ming-Deh.Algorithmica. 2006, Vol 46, Num 1, pp 59-68, issn 0178-4617, 10 p.Conference Paper

Proxy blind multi-signature scheme without a secure channelRONGXING LU; ZHENFU CAO; YUAN ZHOU et al.Applied mathematics and computation. 2005, Vol 164, Num 1, pp 179-187, issn 0096-3003, 9 p.Article

An L(1/3) Discrete Logarithm Algorithm for Low Degree CurvesENGE, Andreas; GAUDRY, Pierrick; THOME, Emmanuel et al.Journal of cryptology. 2011, Vol 24, Num 1, pp 24-41, issn 0933-2790, 18 p.Article

Weak fields for ECCMENEZES, Alfred; TESKE, Edlyn; WENG, Annegret et al.Lecture notes in computer science. 2004, pp 366-386, issn 0302-9743, isbn 3-540-20996-4, 21 p.Conference Paper

A threshold GQ signature schemeLIU, Li-Shan; CHU, Cheng-Kang; TZENG, Wen-Guey et al.Lecture notes in computer science. 2003, pp 137-150, issn 0302-9743, isbn 3-540-20208-0, 14 p.Conference Paper

Computation of discrete logarithms in F2607THOME, Emmanuel.Lecture notes in computer science. 2001, pp 107-124, issn 0302-9743, isbn 3-540-42987-5Conference Paper

Converting normal DLP-based signatures into blindWEIDONG QIU.Applied mathematics and computation. 2005, Vol 170, Num 1, pp 657-665, issn 0096-3003, 9 p.Article

Group signature schemes with forward secure propertiesLIN CHEN; XIAOQIN HUANG; JINYUAN YOU et al.Applied mathematics and computation. 2005, Vol 170, Num 2, pp 841-849, issn 0096-3003, 9 p.Article

Cryptanalysis of an efficient secure group signature schemeLI, Li-Hua; LIU, Chi-Yu; HWANG, Min-Shiang et al.Operating systems review. 2004, Vol 38, Num 4, pp 66-69, issn 0163-5980, 4 p.Article

On the autocorrelation of cyclotomic generatorsMEIDL, Wilfried; WINTERHOF, Arne.Lecture notes in computer science. 2004, pp 1-11, issn 0302-9743, isbn 3-540-21324-4, 11 p.Conference Paper

Practical verifiable encryption and decryption of discrete logarithmsCAMENISCH, Jan; SHOUP, Victor.Lecture notes in computer science. 2003, pp 126-144, issn 0302-9743, isbn 3-540-40674-3, 19 p.Conference Paper

Maximal and near-maximal shift register sequences : efficient event counters and easy discrete logarithmsCLARK, D. W; LIH-JYH WENG.IEEE transactions on computers. 1994, Vol 43, Num 5, pp 560-568, issn 0018-9340Article

Generalized environmental security from number theoretic assumptionsMALKIN, Tal; MORIARTY, Ryan; YAKOVENKO, Nikolai et al.Lecture notes in computer science. 2006, pp 343-359, issn 0302-9743, isbn 3-540-32731-2, 1Vol, 17 p.Conference Paper

Cryptanalysis of a divisor class group based public-key cryptosystemYUN, Aaram; KIM, Jaeheon; DONG HOON LEE et al.Lecture notes in computer science. 2004, pp 442-450, issn 0302-9743, isbn 3-540-22156-5, 9 p.Conference Paper

Security of meta-He digital signature scheme based on factoring and discrete logarithmsZUHUA SHAO.Applied mathematics and computation. 2005, Vol 170, Num 2, pp 976-984, issn 0096-3003, 9 p.Article

Server-aided verification : Theory and practiceGIRAULT, Marc; LEFRANC, David.Lecture notes in computer science. 2005, pp 605-623, issn 0302-9743, isbn 3-540-30684-6, 1Vol, 19 p.Conference Paper

Short exponent Diffie-Hellman problemsKOSHIBA, Takeshi; KUROSAWA, Kaoru.Lecture notes in computer science. 2004, pp 173-186, issn 0302-9743, isbn 3-540-21018-0, 14 p.Conference Paper

  • Page / 7