Sciweavers

1769 search results - page 109 / 354
» Cryptography
Sort
View
IMA
2009
Springer
131views Cryptology» more  IMA 2009»
15 years 10 months ago
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems
Gaudry and Schost gave a low-memory algorithm for solving the 2-dimensional discrete logarithm problem. We present an improvement to their algorithm and extend this improvement to ...
Steven D. Galbraith, Raminder S. Ruprai
IMA
2009
Springer
134views Cryptology» more  IMA 2009»
15 years 10 months ago
The Rayleigh Quotient of Bent Functions
The Rayleigh quotient of a bent function is an invariant under the action of the orthogonal group, and it measures the distance of the function to its dual. An efficient algorithm ...
Lars Eirik Danielsen, Matthew G. Parker, Patrick S...
IMA
2009
Springer
145views Cryptology» more  IMA 2009»
15 years 10 months ago
On Designs and Multiplier Groups Constructed from Almost Perfect Nonlinear Functions
Let f : F n 2 → F n 2 be an almost perfect nonlinear function (APN). The set Df := {(a, b) : f(x + a) − f(x) = b has two solutions} can be used to distinguish APN functions up ...
Yves Edel, Alexander Pott
PAIRING
2009
Springer
111views Cryptology» more  PAIRING 2009»
15 years 10 months ago
Faster Pairings on Special Weierstrass Curves
This paper presents efficient formulas for computing cryptographic pairings on the curve y2 = cx3 + 1 over fields of large characteristic. We provide examples of pairing-friendly...
Craig Costello, Hüseyin Hisil, Colin Boyd, Ju...
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
15 years 9 months ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer