The state of elliptic curve cryptography

N Koblitz, A Menezes, S Vanstone - Designs, codes and cryptography, 2000 - Springer
Since the introduction of public-key cryptography by Diffie and Hellman in 1976, the
potential for the use of the discrete logarithm problem in public-key cryptosystems has been …

Quantum algorithms for algebraic problems

AM Childs, W Van Dam - Reviews of Modern Physics, 2010 - APS
Quantum computers can execute algorithms that dramatically outperform classical
computation. As the best-known example, Shor discovered an efficient quantum algorithm …

A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment

S Akhbarifar, HHS Javadi, AM Rahmani… - Personal and Ubiquitous …, 2023 - Springer
Abstract Internet of Things (IoT) and smart medical devices have improved the healthcare
systems by enabling remote monitoring and screening of the patients' health conditions …

[图书][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

[图书][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

[图书][B] An Introduction to Cryptography

J Hoffstein, J Pipher, JH Silverman, J Hoffstein… - 2014 - Springer
An Introduction to Cryptography | SpringerLink Skip to main content Advertisement SpringerLink
Account Menu Find a journal Publish with us Track your research Search Cart Book cover An …

[图书][B] Elliptic curves: number theory and cryptography

LC Washington - 2008 - taylorfrancis.com
Like its bestselling predecessor, Elliptic Curves: Number Theory and Cryptography, Second
Edition develops the theory of elliptic curves to provide a basis for both number theoretic and …

Efficient algorithms for solving overdefined systems of multivariate polynomial equations

N Courtois, A Klimov, J Patarin, A Shamir - International Conference on …, 2000 - Springer
The security of many recently proposed cryptosystems is based on the difficulty of solving
large systems of quadratic multivariate polynomial equations. This problem is NP-hard over …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

[图书][B] Introduction to cryptography

J Buchmann - 2004 - Springer
Cryptography is a key technology in electronic key systems. It is used to keep data secret,
digitally sign documents, access control, and so forth. Users therefore should not only know …