Evaluation of Security Level of Cryptography: MY-ELLTY Signature Scheme
暂无分享,去创建一个
Yongge Wang | Alfred Menezes | Minghua Qu | Douglas R Stinson | Doug Stinson | A. Menezes | Minghua Qu | D. Stinson | Yongge Wang
[1] Nigel P. Smart,et al. Constructive and destructive facets of Weil descent on elliptic curves , 2002, Journal of Cryptology.
[2] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[3] Nigel P. Smart,et al. Lattice Attacks on Digital Signature Schemes , 2001, Des. Codes Cryptogr..
[4] Alfred Menezes,et al. Analysis of the Weil Descent Attack of Gaudry, Hess and Smart , 2001, CT-RSA.
[5] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[6] G. Frey. Applications of Arithmetical Geometry to Cryptographic Constructions , 2001 .
[7] Andreas Stein,et al. Analysis of the Xedni Calculus Attack , 2000, Des. Codes Cryptogr..
[8] Joseph H. Silverman,et al. The Xedni Calculus and the Elliptic Curve Discrete Logarithm Problem , 2000, Des. Codes Cryptogr..
[9] Ernest F. Brickell,et al. Design Validations for Discrete Logarithm Based Signature Schemes , 2000, Public Key Cryptography.
[10] Steven D. Galbraith,et al. A Cryptographic Application of Weil Descent , 1999, IMACC.
[11] Ronald Cramer,et al. Signature schemes based on the strong RSA assumption , 1999, CCS '99.
[12] Dan Boneh,et al. Factoring N = prq for Large r , 1999, CRYPTO.
[13] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[14] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[15] Nigel P. Smart,et al. The Discrete Logarithm Problem on Elliptic Curves of Trace One , 1999, Journal of Cryptology.
[16] Shai Halevi,et al. Secure Hash-and-Sign Signatures Without the Random Oracle , 1999, EUROCRYPT.
[17] Andreas Stein,et al. Computing discrete logarithms in real quadratic congruence function fields of large genus , 1999, Math. Comput..
[18] Alfred Menezes,et al. Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol , 1999, Public Key Cryptography.
[19] D. Boneh,et al. Factoring N = pr q for large r , 1999 .
[20] Joe Suzuki,et al. Elliptic Curve Discrete Logarithms and the Index Calculus , 1998, ASIACRYPT.
[21] Michael J. Wiener,et al. Faster Attacks on Elliptic Curve Cryptosystems , 1998, Selected Areas in Cryptography.
[22] Robert J. Zuccherato,et al. The Equivalence Between Elliptic Curve and Quadratic Function Field Discrete Logarithms in Characteristic 2 , 1998, ANTS.
[23] Edlyn Teske,et al. Speeding Up Pollard's Rho Method for Computing Discrete Logarithms , 1998, ANTS.
[24] Takakazu Satoh,et al. Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves , 1998 .
[25] Dan Boneh,et al. Breaking RSA May Not Be Equivalent to Factoring , 1998, EUROCRYPT.
[26] Bruce Schneier,et al. Cryptanalytic Attacks on Pseudorandom Number Generators , 1998, FSE.
[27] R. Balasubramanian,et al. The Improbability That an Elliptic Curve Has Subexponential Discrete Log Problem under the Menezes—Okamoto—Vanstone Algorithm , 1998, Journal of Cryptology.
[28] R. Gallant,et al. Improving the Parallelized Pollard Lambda Search on Binary Anomalous Curves , 1998 .
[29] Igor A. Semaev,et al. Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p , 1998, Math. Comput..
[30] Tatsuaki Okamoto,et al. Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations , 1997, CRYPTO.
[31] Birgit Pfitzmann,et al. Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees , 1997, EUROCRYPT.
[32] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[33] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[34] A. Stein. Equivalences between elliptic curves and real quadratic congruence function fields , 1997 .
[35] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[36] Serge Vaudenay,et al. Hidden Collisions on DSS , 1996, CRYPTO.
[37] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[38] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[39] E. Okamoto,et al. Faster factoring of integers of a special form , 1996 .
[40] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[41] Leonard M. Adleman,et al. A subexponential algorithm for discrete logarithms over the rational subgroup of the jacobians of large genus hyperelliptic curves over finite fields , 1994, ANTS.
[42] Leonard M. Adleman,et al. Open problems in number theoretic complexity, II , 1994, ANTS.
[43] G. Frey,et al. A remark concerning m -divisibility and the discrete logarithm in the divisor class group of curves , 1994 .
[44] Atsushi Fujioka,et al. ESIGN: An Efficient Digital Signature Implementation for Smard Cards , 1991, EUROCRYPT.
[45] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.
[46] Tatsuaki Okamoto. A fast signature scheme based on congruential polynomial operations , 1990, IEEE Trans. Inf. Theory.
[47] E. Brickell,et al. Cryptanalysis: a survey of recent results , 1988, Proc. IEEE.
[48] Gary L. Miller,et al. Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields , 1986, CRYPTO.
[49] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[50] Ernest F. Brickell,et al. An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi , 1985, CRYPTO.
[51] Tatsuski Okamoto,et al. A Fast Signature Scheme Based on Quadratic Inequalities , 1985, 1985 IEEE Symposium on Security and Privacy.
[52] Adi Shamir,et al. An efficient signature scheme based on quadratic equations , 1984, STOC '84.
[53] Stephen C. Pohlig,et al. An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance , 2022, IEEE Trans. Inf. Theory.
[54] J. Pollard,et al. Monte Carlo methods for index computation () , 1978 .