Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Logaritmo discreto")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 118

  • Page / 5
Export

Selection :

  • and

Server-aided verification : Theory and practiceGIRAULT, Marc; LEFRANC, David.Lecture notes in computer science. 2005, pp 605-623, issn 0302-9743, isbn 3-540-30684-6, 1Vol, 19 p.Conference Paper

Short exponent Diffie-Hellman problemsKOSHIBA, Takeshi; KUROSAWA, Kaoru.Lecture notes in computer science. 2004, pp 173-186, issn 0302-9743, isbn 3-540-21018-0, 14 p.Conference Paper

A shorter proof for an explicit formula for discrete logarithms in finite fieldsWAN, Zhe-Xian.Discrete mathematics. 2008, Vol 308, Num 21, pp 4914-4915, issn 0012-365X, 2 p.Conference Paper

Generalized environmental security from number theoretic assumptionsMALKIN, Tal; MORIARTY, Ryan; YAKOVENKO, Nikolai et al.Lecture notes in computer science. 2006, pp 343-359, issn 0302-9743, isbn 3-540-32731-2, 1Vol, 17 p.Conference Paper

Cryptanalysis of a divisor class group based public-key cryptosystemYUN, Aaram; KIM, Jaeheon; DONG HOON LEE et al.Lecture notes in computer science. 2004, pp 442-450, issn 0302-9743, isbn 3-540-22156-5, 9 p.Conference Paper

Cryptanalysis of an efficient secure group signature schemeLI, Li-Hua; LIU, Chi-Yu; HWANG, Min-Shiang et al.Operating systems review. 2004, Vol 38, Num 4, pp 66-69, issn 0163-5980, 4 p.Article

On the autocorrelation of cyclotomic generatorsMEIDL, Wilfried; WINTERHOF, Arne.Lecture notes in computer science. 2004, pp 1-11, issn 0302-9743, isbn 3-540-21324-4, 11 p.Conference Paper

Construction of Pseudo-random Binary Sequences from Elliptic Curves by Using Discrete LogarithmZHIXIONG CHEN; SHENGQIANG LI; GUOZHEN XIAO et al.Lecture notes in computer science. 2006, pp 285-294, issn 0302-9743, isbn 3-540-44523-4, 1Vol, 10 p.Conference Paper

A comparison of CEILIDH and XTRGRANGER, R; PAGE, D; STAM, M et al.Lecture notes in computer science. 2004, pp 235-249, issn 0302-9743, isbn 3-540-22156-5, 15 p.Conference Paper

An Algorithm to Solve the Discrete Logarithm Problem with the Number Field SieveCOMMEINE, An; SEMAEV, Igor.Lecture notes in computer science. 2006, pp 174-190, issn 0302-9743, isbn 3-540-33851-9, 1Vol, 17 p.Conference Paper

Cryptanalysis of two signature schemes based on bilinear pairings in CISC '05PARK, Haeryong; ZHENGJUN CAO; LIHUA LIU et al.Lecture notes in computer science. 2006, pp 1-12, issn 0302-9743, isbn 3-540-49608-4, 1Vol, 12 p.Conference Paper

Public key cryptography and RFID tagsMCLOONE, M; ROBSHAW, M. J. B.Lecture notes in computer science. 2006, pp 372-384, issn 0302-9743, isbn 978-3-540-69327-7, 1Vol, 13 p.Conference Paper

Fault cryptanalysis of ElGamal signature schemeBIERNAT, Janusz; NIKODEM, Maciej.Lecture notes in computer science. 2005, pp 327-336, issn 0302-9743, isbn 3-540-29002-8, 1Vol, 10 p.Conference Paper

From digital signature to ID-based identification/signatureKUROSAWA, Kaoru; HENG, Swee-Huay.Lecture notes in computer science. 2004, pp 248-261, issn 0302-9743, isbn 3-540-21018-0, 14 p.Conference Paper

Concurrent signaturesLIQUN CHEN; KUDLA, Caroline; PATERSON, Kenneth G et al.Lecture notes in computer science. 2004, pp 287-305, issn 0302-9743, isbn 3-540-21935-8, 19 p.Conference Paper

A new baby-step giant-step algorithm and some applications to cryptanalysisCORON, Jean Sébastien; LEFRANC, David; POUPARD, Guillaume et al.Lecture notes in computer science. 2005, pp 47-60, issn 0302-9743, isbn 3-540-28474-5, 14 p.Conference Paper

Finding collisions on a public road, or do secure hash functions need secret coins?HSIAO, Chun-Yuan; REYZIN, Leonid.Lecture notes in computer science. 2004, pp 92-105, issn 0302-9743, isbn 3-540-22668-0, 14 p.Conference Paper

Factorization-based fail-stop signatures revisitedSCHMIDT-SAMOA, Katja.Lecture notes in computer science. 2004, pp 118-131, issn 0302-9743, isbn 3-540-23563-9, 14 p.Conference Paper

The security of cryptosystems based on class semigroups of imaginary quadratic non-maximal ordersJACOBSON, Michael J.Lecture notes in computer science. 2004, pp 149-156, issn 0302-9743, isbn 3-540-22379-7, 8 p.Conference Paper

A New Secure Oblivious Transfer ProtocolKIM, Soon-Gohn; KANG, Heau-Jo.Lecture notes in computer science. 2006, pp 690-699, issn 0302-9743, isbn 3-540-34070-X, 10 p.Conference Paper

Cryptography, connections, cocycles and crystals: A p-adic exploration of the discrete logarithm problemGOPALKRISHNA GADIYAR, H; SANGEETA MAINI, K. M; PADMA, R et al.Lecture notes in computer science. 2004, pp 305-314, issn 0302-9743, isbn 3-540-24130-2, 10 p.Conference Paper

Factoring-based proxy signature schemes with forward-securityZHENCHUAN CHAI; ZHENFU CAO.Lecture notes in computer science. 2004, pp 1034-1040, issn 0302-9743, isbn 3-540-24127-2, 7 p.Conference Paper

Complementary elliptic curve for cryptographic useTEO CHUN YEW; KAMARULHAILI, Hailiza; SUMARI, Putra et al.International conference on information and communication technologies. 2003, pp 229-234, isbn 974-615-089-8, 1Vol, 6 p.Conference Paper

Programmable Hash Functions and Their ApplicationsHOFHEINZ, Dennis; KILTZ, Eike.Journal of cryptology. 2012, Vol 25, Num 3, pp 484-527, issn 0933-2790, 44 p.Article

A DL Based Short Strong Designated Verifier Signature Scheme with Low ComputationLIN, Han-Yu; WU, Tzong-Sun; YEH, Yi-Shiung et al.Journal of information science and engineering. 2011, Vol 27, Num 2, pp 451-463, issn 1016-2364, 13 p.Article

  • Page / 5