Practical Cryptography in High Dimensional Tori
- 1 January 2005
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
- p. 234-250
- https://doi.org/10.1007/11426639_14
Abstract
No abstract availableKeywords
This publication has 21 references indexed in Scilit:
- Aspects of Hyperelliptic Curves over Large Prime Fields in Software ImplementationsLecture Notes in Computer Science, 2004
- Asymptotically Optimal Communication for Torus-Based CryptographyLecture Notes in Computer Science, 2004
- A Comparison of CEILIDH and XTRLecture Notes in Computer Science, 2004
- A Length-Flexible Threshold Cryptosystem with ApplicationsLecture Notes in Computer Science, 2003
- Looking beyond XTRLecture Notes in Computer Science, 2002
- Self-tallying Elections and Perfect Ballot SecrecyLecture Notes in Computer Science, 2002
- Comparison of three modular reduction functionsPublished by Springer Nature ,2001
- Doing More with Fewer BitsLecture Notes in Computer Science, 1999
- A fast algorithm for computing multiplicative inverses in GF(2m) using normal basesInformation and Computation, 1988
- Probabilistic encryptionJournal of Computer and System Sciences, 1984