Number theoretic algorithms and cryptology
- 1 January 1991
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- A key exchange system based on real quadratic fields Extended abstractPublished by Springer Nature ,2001
- On the Computation of Discrete Logarithms in Class GroupsPublished by Springer Nature ,2001
- On the Complexity and Efficiency of a New Key Exchange SystemPublished by Springer Nature ,2001
- Reducing elliptic curve logarithms to logarithms in a finite fieldPublished by Association for Computing Machinery (ACM) ,1991
- Implementation of a Key Exchange Protocol Using Real Quadratic FieldsPublished by Springer Nature ,1991
- The search for provably secure cryptosystemsProceedings of Symposia in Applied Mathematics, 1991
- The number field sievePublished by Association for Computing Machinery (ACM) ,1990
- A key-exchange system based on imaginary quadratic fieldsJournal of Cryptology, 1988
- Elliptic curve cryptosystemsMathematics of Computation, 1987
- New directions in cryptographyIEEE Transactions on Information Theory, 1976