Public-Key Cryptography and Computational Number Theory : : Proceedings of the International Conference organized by the Stefan Banach International Mathematical Center Warsaw, Poland, September 11-15, 2000 / / ed. by Kazimierz Alster, Jerzy Urbanowicz, Hugh C. Williams.

The Proceedings contain twenty selected, refereed contributions arising from the International Conference on Public-Key Cryptography and Computational Number Theory held in Warsaw, Poland, on September 11-15, 2000. The conference, attended by eightyfive mathematicians from eleven countries, was orga...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DGBA Backlist Complete English Language 2000-2014 PART1
HerausgeberIn:
MitwirkendeR:
Place / Publishing House:Berlin ;, Boston : : De Gruyter, , [2011]
©2001
Year of Publication:2011
Edition:Reprint 2011
Language:English
Series:De Gruyter Proceedings in Mathematics
Online Access:
Physical Description:1 online resource (331 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • I-VI
  • Preface
  • Mathematics, cryptology, and technology
  • Table of contents
  • A survey on IQ cryptography
  • Algebraic groups and discrete logarithm
  • Fermat numbers, Wieferich and Wilson primes: computations and generalizations
  • How to distinguish hyperelliptic curves in even characteristic
  • Limitations of constructive Weil descent
  • On the security of a public-key cryptosystem
  • Optimizations for NTRU
  • The efficiency and security of a real quadratic field based key exchange protocol
  • Extending the binary gcd algorithms
  • Stochastic kleptography detection
  • An overview of the XTR public key system
  • A survey of IND-CCA secure public-key encryption schemes relative to factoring
  • Efficient point multiplication for elliptic curves over special optimal extension fields
  • Error-correcting codes and cryptography
  • Secret public key schemes
  • Index form surfaces and construction of elliptic curves over large finite fields
  • On the size of solutions of the inequality φ(ax + b) < φ(ax)
  • Security of DL-encryption and signatures against generic attacks—a survey
  • Square-root algorithms for the discrete logarithm problem (a survey)
  • Height functions on elliptic curves
  • List of participants
  • List of contributors