Back to Results
First PageMeta Content
Finite fields / Computational hardness assumptions / Algebraic number theory / Cryptographic protocols / Field theory / Diffie–Hellman problem / Quadratic field / Discrete logarithm / XTR / Abstract algebra / Mathematics / Algebra


Number field cryptography Johannes Buchmann
Add to Reading List

Document Date: 2004-02-18 05:25:39


Open Document

File Size: 181,83 KB

Share Result on Facebook

City

Kyiv / /

Company

Cl / Siemens / /

Country

Ukraine / /

IndustryTerm

logarithm algorithm / subexponential algorithm / signature protocol / presented probabilistic algorithms / quadratic field crypto-systems / decryption algorithm / imaginary quadratic class groups / cryptographic algorithm / crypto-systems / power product / polynomial time quantum algorithm / cryptographic protocols / index calculus algorithm / cryptographic applications / quotient / reduction algorithms / cryptographic algorithms / regulator algorithm / class number algorithm / imaginary quadratic cryptography algorithms / computing / public key crypto-systems / e-th / class / /

Organization

National Academy of Sciences / /

Person

Eric Bach / Johannes Buchmann Tsuyoshi Takagi Ulrich / Safuat Hamdy / Peter Engel / Ingird Biehl / Sachar Paulus / Ingrid Biehl / Philip Rogaway / Michel Abdalla / Tsuyoshi Takagi / Mihir Bellare / Halyna M. Syta / Andreas Meyer / David Naccache / Johannes Buchmann / /

Position

reduced representative / representative / /

Product

Cl / Jacobson / /

ProgrammingLanguage

Java / J / /

PublishedMedium

Mathematics of Computation / Lecture Notes in Computer Science / /

Technology

reduction algorithms / imaginary quadratic cryptography algorithms / logarithm algorithm / NUDUPL algorithms / regulator algorithm / class number algorithm / secret key / Fiat-Shamir signature protocol / Diffie-Hellman key exchange algorithm / IQ-DL algorithm / encryption / Monte Carlo regulator algorithm / cryptography / DL-based cryptographic protocols / DiffieHellman key exchange protocol / Public key / Java / index calculus algorithm / 4.3 Cryptographic algorithms / Diffie Hellman key exchange protocol / polynomial time quantum algorithm / decryption algorithm / presented probabilistic algorithms / 3.3 Cryptographic algorithms / cryptographic algorithms / Real-quadratic ElGamal encryption / /

URL

http /

SocialTag