Sciweavers

11 search results - page 1 / 3
» sacrypt 2009
Sort
View
SACRYPT
2009
Springer
142views Cryptology» more  SACRYPT 2009»
13 years 11 months ago
On Repeated Squarings in Binary Fields
Kimmo U. Järvinen
SACRYPT
2009
Springer
137views Cryptology» more  SACRYPT 2009»
13 years 9 months ago
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård
Elena Andreeva, Charles Bouillaguet, Orr Dunkelman...
SACRYPT
2009
Springer
176views Cryptology» more  SACRYPT 2009»
13 years 11 months ago
Optimization Strategies for Hardware-Based Cofactorization
Abstract. We use the specific structure of the inputs to the cofactorization step in the general number field sieve (GNFS) in order to optimize the runtime for the cofactorizatio...
Daniel Loebenberger, Jens Putzka
SACRYPT
2009
Springer
212views Cryptology» more  SACRYPT 2009»
13 years 11 months ago
Compact McEliece Keys from Goppa Codes
The classical McEliece cryptosystem is built upon the class of Goppa codes, which remains secure to this date in contrast to many other families of codes but leads to very large pu...
Rafael Misoczki, Paulo S. L. M. Barreto