THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography …
ЕР Данилкова - ШКОЛА МОЛОДЫХ УЧЕНЫХ, 2021 - elibrary.ru
В статье рассмотрены некоторые элементы теории чисел и показано, как они используются в современной криптографии. В качестве примеров выбраны наиболее …
M Scott, N Costigan, W Abdulwahab - International Workshop on …, 2006 - Springer
Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applications, particularly in the context of implementations of Identity-Based …
A popular approach to tweakable blockcipher design is via masking, where a certain primitive (a blockcipher or a permutation) is preceded and followed by an easy-to-compute …
AK Lenstra - International Conference on the Theory and …, 2001 - Springer
Abstract The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Given a desired level of security for the AES, this paper discusses …
J Cannon, W Bosma, C Fieker, A Steel - Edition, 2006 - academia.edu
HANDBOOK OF MAGMA FUNCTIONS Page 1 HANDBOOK OF MAGMA FUNCTIONS Volume 10 Incidence Structures, Codes and Cryptography John Cannon Wieb Bosma Editors Version …
A Biryukov, C De Cannière - Encyclopedia of cryptography and security, 2011 - orbilu.uni.lu
The Data Encryption Standard (DES)[31] has been around for more than 25 years. During this time the standard was revised three times: as FIPS-46-1 in 1988, as FIPS-46-2 in 1993 …
We compare both the security and performance issues related to the choice of MNT curves against supersingular curves in characteristic three, for pairing based systems. We pay …
E Thomé - Journal of symbolic computation, 2002 - Elsevier
This paper describes a new algorithm for computing linear generators (vector generating polynomials) for matrix sequences, running in subquadratic time. This algorithm applies in …