search for books and compare prices
Tables of Contents for Public-Key Cryptography and Computational Number Theory
Chapter/Section Title
Page #
Page Count
Preface
vii
Mathematics, cryptology, and technology
Andrew Odlyzko
ix
A survey on IQ cryptography
Johannes Buchmann and Safuat Hamdy
1
16
Algebraic groups and discrete logarithm
Jean-Marc Couveignes
17
12
Fermat numbers, Wieferich and Wilson primes: computations and generalizations
Karl Dilcher
29
20
How to distinguish hyperelliptic curves in even charateristic
Andreas Enge
49
10
Limitations of constructive Weil descent
Steven D. Galbraith
59
12
On the security of a public-key cryptosystem
Otokar Grosek Spyros S. Magliveras and Wandi Wei
71
6
Optimizations for NTRU
Jeffrey Hoffstein and Joseph Silverman
77
12
The efficiency and security of a real quadratic field based key exchange protocol
Michael J. Jacobson Renate Scheidler and Hugh C. Williams
89
24
Extending the binary gcd algorithms
Przemystaw Kubiak
113
24
Stochastic kleptography detection
Daniel Kucner and Mirostaw Kutytowski
137
14
An overview of the XTR public key system
Arjen K. Lenstra and Eric R. Verheul
151
30
A survey of IND-CCA secure public-key encryption schemes relative to factoring
Siguna Muller
181
16
Efficient point multiplication for elliptic curves over special optimal extension fields
Volker Muller
197
12
Error-correcting codes and cryptography
Harald Niederreiter
209
12
Secret public key schemes
Jacques Patarin
221
18
Index form surfaces and construction of elliptic curves over large finite fields
Attila Petho
239
10
On the size of solutions of the inequality φ(ax + b) < φ(ax)
Herman te Riele
249
8
Security of DL-encryption and signatures against generic attacks--a survey
Claus Peter Schnorr
257
26
Square-root algorithms for the discrete logarithm problem (a survey)
Edlyn Teske
283
20
Height functions on elliptic curves
Horst G. Zimmer
303
20
List of participants
323
6
List of contributors
329
<