Liebe Besucherinnen und Besucher,
heute ab 15 Uhr feiern wir unser Sommerfest und sind daher nicht erreichbar. Ab morgen sind wir wieder wie gewohnt für Sie da. Wir bitten um Ihr Verständnis – Ihr Team von Sack Fachmedien
Dabrowski / Dabrowski / Pieprzyk Number-Theoretic Methods in Cryptology
Erscheinungsjahr 2025
ISBN: 978-3-031-82380-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
4th International Conference, NuTMiC 2024, Szczecin, Poland, June 24–26, 2024, Revised Selected Papers
E-Book, Englisch, 331 Seiten
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-031-82380-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book constitutes the refereed post-conference proceedings of the 4th International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024, held in Szczecin, Poland, during June 24–26, 2024.
The 9 full papers and 2 invited papers presented in this book were carefully reviewed and selected from 12 submissions. They were organized in topical sections as follows: invited talks; elliptic curves in cryptography; number theory; algebraic structures and public-key cryptography.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
.- Invited Talks.
.- On the efficient representation of isogenies.
.- Elliptic-curves factoring, witnesses and oracles.
.- Elliptic Curves in Cryptography.
.- On chains of pairing-friendly elliptic curves.
.- Faster algorithms for isogeny computations over extensions of finite fields.
.- Integral solutions of some systems of polynomial equations and constructing families of pairing-friendly elliptic curves with small ?-value.
.- Number Theory.
.- Algebraic Equipage for Learning with Errors in Cyclic Division Algebras.
.- From Worst to Average Case to Incremental Search Bounds of the Strong Lucas Test.
.- Algebraic Structures and Public-Key Cryptography.
.- A New Public Key Cryptosystem Based on the Cubic Pell Curve.
.- The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem.
.- Compartment-based and Hierarchical Threshold Delegated Verifiable Accountable Subgroup Multi-signatures.
.- Towards message recovery in NTRU Encryption with auxiliary data.