search for books and compare prices
Tables of Contents for Public-Key Cryptography and Computational Number Theory
Chapter/Section Title
Page #
Page Count
Preface
vii
Mathematics, cryptology, and technology
ix
A survey on IQ cryptography
1
16
Algebraic groups and discrete logarithm
17
12
Fermat numbers, Wieferich and Wilson primes: computations and generalizations
29
20
How to distinguish hyperelliptic curves in even charateristic
49
10
Limitations of constructive Weil descent
59
12
On the security of a public-key cryptosystem
71
6
Optimizations for NTRU
77
12
The efficiency and security of a real quadratic field based key exchange protocol
89
24
Extending the binary gcd algorithms
113
24
Stochastic kleptography detection
137
14
An overview of the XTR public key system
151
30
A survey of IND-CCA secure public-key encryption schemes relative to factoring
181
16
Efficient point multiplication for elliptic curves over special optimal extension fields
197
12
Error-correcting codes and cryptography
209
12
Secret public key schemes
221
18
Index form surfaces and construction of elliptic curves over large finite fields
239
10
On the size of solutions of the inequality φ(ax + b) < φ(ax)
249
8
Security of DL-encryption and signatures against generic attacks--a survey
257
26
Square-root algorithms for the discrete logarithm problem (a survey)
283
20
Height functions on elliptic curves
303
20
List of participants
323
6
List of contributors
329