Date: 2006-01-02 00:24:48Algebraic number theory Integer factorization algorithms Finite fields Computational hardness assumptions Logarithms Discrete logarithm Quadratic sieve XTR Integer factorization Abstract algebra Mathematics Algebra | | Main text appears in T. Okamoto (Ed.): Advances in Cryptology – ASIACRYPT 2000, Springer-Verlag LNCS 1976, pp, ISBNAddendum does not appear in proceedings. Security of Cryptosystems Based on ClAdd to Reading ListSource URL: www.bmoeller.deDownload Document from Source Website File Size: 284,80 KBShare Document on Facebook
|