Public-Key Cryptography and Computational Number Theory : : Proceedings of the International Conference organized by the Stefan Banach International Mathematical Center Warsaw, Poland, September 11-15, 2000 / / ed. by Kazimierz Alster, Jerzy Urbanowicz, Hugh C. Williams.
The Proceedings contain twenty selected, refereed contributions arising from the International Conference on Public-Key Cryptography and Computational Number Theory held in Warsaw, Poland, on September 11-15, 2000. The conference, attended by eightyfive mathematicians from eleven countries, was orga...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter DGBA Backlist Complete English Language 2000-2014 PART1 |
---|---|
HerausgeberIn: | |
MitwirkendeR: | |
Place / Publishing House: | Berlin ;, Boston : : De Gruyter, , [2011] ©2001 |
Year of Publication: | 2011 |
Edition: | Reprint 2011 |
Language: | English |
Series: | De Gruyter Proceedings in Mathematics
|
Online Access: | |
Physical Description: | 1 online resource (331 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- I-VI
- Preface
- Mathematics, cryptology, and technology
- Table of contents
- A survey on IQ cryptography
- Algebraic groups and discrete logarithm
- Fermat numbers, Wieferich and Wilson primes: computations and generalizations
- How to distinguish hyperelliptic curves in even characteristic
- Limitations of constructive Weil descent
- On the security of a public-key cryptosystem
- Optimizations for NTRU
- The efficiency and security of a real quadratic field based key exchange protocol
- Extending the binary gcd algorithms
- Stochastic kleptography detection
- An overview of the XTR public key system
- A survey of IND-CCA secure public-key encryption schemes relative to factoring
- Efficient point multiplication for elliptic curves over special optimal extension fields
- Error-correcting codes and cryptography
- Secret public key schemes
- Index form surfaces and construction of elliptic curves over large finite fields
- On the size of solutions of the inequality φ(ax + b) < φ(ax)
- Security of DL-encryption and signatures against generic attacks—a survey
- Square-root algorithms for the discrete logarithm problem (a survey)
- Height functions on elliptic curves
- List of participants
- List of contributors