skip to main content
Skip header Section
A course in computational algebraic number theoryFebruary 1995
  • Author:
  • Henri Cohen
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-0-387-55640-6
Published:01 February 1995
Pages:
534
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Chen M, Imran M, Ivanyos G, Kutas P, Leroux A and Petit C Hidden Stabilizers, the Isogeny to Endomorphism Ring Problem and the Cryptanalysis of pSIDH Advances in Cryptology – ASIACRYPT 2023, (99-130)
  2. Pellet-Mary A and Stehlé D On the Hardness of the NTRU Problem Advances in Cryptology – ASIACRYPT 2021, (3-35)
  3. ACM
    Johansson F Calcium Proceedings of the 2021 on International Symposium on Symbolic and Algebraic Computation, (225-232)
  4. Elsenhans A and Jahnel J Computations with Algebraic Surfaces Mathematical Software – ICMS 2020, (87-93)
  5. ACM
    Li J and Nguyen P Computing a Lattice Basis Revisited Proceedings of the 2019 on International Symposium on Symbolic and Algebraic Computation, (275-282)
  6. ACM
    Liu R and Pan Y Computing Hermite Normal Form Faster via Solving System of Linear Equations Proceedings of the 2019 on International Symposium on Symbolic and Algebraic Computation, (283-290)
  7. Li Z, Li M, Shi C, Fan L, Liu Y, Song W, Tang W and Zou X (2019). Impact of ambiguity resolution with sequential constraints on real-time precise GPS satellite orbit determination, GPS Solutions, 23:3, (1-14), Online publication date: 1-Jul-2019.
  8. Hoagland C, Humphries S, Nicholson N and Poulsen S (2019). Difference Sets Disjoint from a Subgroup, Graphs and Combinatorics, 35:3, (579-597), Online publication date: 1-May-2019.
  9. An X, Meng X, Chen H, Jiang W, Xi R, Chen Q and Zhou X (2019). Improving integrated precise orbit determination of GPS, GLONASS, BDS and Galileo through integer ambiguity resolution, GPS Solutions, 23:2, (1-15), Online publication date: 1-Apr-2019.
  10. Barthe G, Fagerholm E, Fiore D, Mitchell J, Scedrov A and Schmidt B (2019). Automated Analysis of Cryptographic Assumptions in Generic Group Models, Journal of Cryptology, 32:2, (324-360), Online publication date: 1-Apr-2019.
  11. Brakensiek J and Guruswami V An algorithmic blend of LPs and ring equations for promise CSPs Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, (436-455)
  12. ACM
    del Pino R, Lyubashevsky V and Seiler G Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (574-591)
  13. ACM
    Nagashima H and Shirayanagi K (2018). Effect of the interval-symbol method with correct zero rewriting on the δ-LLL algorithm, ACM Communications in Computer Algebra, 52:2, (24-31), Online publication date: 1-Oct-2018.
  14. Augot D, Loidreau P and Robert G (2018). Generalized Gabidulin codes over fields of any characteristic, Designs, Codes and Cryptography, 86:8, (1807-1848), Online publication date: 1-Aug-2018.
  15. ACM
    Gharibian S and Sikora J (2018). Ground State Connectivity of Local Hamiltonians, ACM Transactions on Computation Theory, 10:2, (1-28), Online publication date: 23-May-2018.
  16. Mérai L (2018). On the elliptic curve endomorphism generator, Designs, Codes and Cryptography, 86:5, (1113-1129), Online publication date: 1-May-2018.
  17. ACM
    Velez J, Hernandez J and Cadavid C (2017). Limits of quotients of polynomial functions in three variables, ACM Communications in Computer Algebra, 51:2, (42-56), Online publication date: 10-Oct-2017.
  18. Pei S and Chang K (2017). Two-Dimensional Period Estimation by Ramanujan's Sum, IEEE Transactions on Signal Processing, 65:19, (5108-5120), Online publication date: 1-Oct-2017.
  19. Paolini G (2017). An Algorithm for Canonical Forms of Finite Subsets of $$\mathbb {Z}^d$$Zd up to Affinities, Discrete & Computational Geometry, 58:2, (293-312), Online publication date: 1-Sep-2017.
  20. Nayyeri M, Maskooki A and Monsefi R (2017). A New Sparse Learning Machine, Neural Processing Letters, 46:1, (15-28), Online publication date: 1-Aug-2017.
  21. ACM
    Sircana C Factorization of Polynomials over Z/(pn) Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, (405-412)
  22. ACM
    de Boer K and Pagano C Calculating the Power Residue Symbol and Ibeta Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, (117-124)
  23. ACM
    Fieker C, Hart W, Hofmann T and Johansson F Nemo/Hecke Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, (157-164)
  24. Fan X, Otemissov A, Sica F and Sidorenko A (2017). Multiple point compression on elliptic curves, Designs, Codes and Cryptography, 83:3, (565-588), Online publication date: 1-Jun-2017.
  25. Chen T and Mehta D (2017). Parallel degree computation for binomial systems, Journal of Symbolic Computation, 79:P3, (535-558), Online publication date: 1-Mar-2017.
  26. Elsenhans A (2017). Improved methods for the construction of relative invariants for permutation groups, Journal of Symbolic Computation, 79:P2, (211-231), Online publication date: 1-Mar-2017.
  27. ACM
    Law M and Monagan M (2017). Computing characteristic polynomials of matrices of structured polynomials, ACM Communications in Computer Algebra, 50:4, (182-184), Online publication date: 22-Feb-2017.
  28. Bonchi F, Sobociński P and Zanasi F (2017). The Calculus of Signal Flow Diagrams I, Information and Computation, 252:C, (2-29), Online publication date: 1-Feb-2017.
  29. Harn L, Hsu C, Zhang M, He T and Zhang M (2016). Realizing secret sharing with general access structure, Information Sciences: an International Journal, 367:C, (209-220), Online publication date: 1-Nov-2016.
  30. Akhlaq A, McKilliam R, Subramanian R and Pollok A (2016). Selecting Wavelengths for Least Squares Range Estimation, IEEE Transactions on Signal Processing, 64:20, (5205-5216), Online publication date: 15-Oct-2016.
  31. ACM
    Chonev V, Ouaknine J and Worrell J (2016). On the Complexity of the Orbit Problem, Journal of the ACM, 63:3, (1-18), Online publication date: 1-Sep-2016.
  32. ACM
    Chonev V, Ouaknine J and Worrell J On Recurrent Reachability for Continuous Linear Dynamical Systems Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer Science, (515-524)
  33. ACM
    Ouaknine J, Pouly A, Sousa-Pinto J and Worrell J Solvability of Matrix-Exponential Equations Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer Science, (798-806)
  34. de Beaudrap N and Gharibian S A linear time algorithm for quantum 2-SAT Proceedings of the 31st Conference on Computational Complexity, (1-21)
  35. Tagliasacchi M, Visentini-Scarzanella M, Dragotti P and Tubaro S (2016). Identification of Transform Coding Chains, IEEE Transactions on Image Processing, 25:3, (1109-1123), Online publication date: 1-Mar-2016.
  36. Biasse J and Song F Efficient quantum algorithms for computing class groups and solving the principal ideal problem in arbitrary degree number fields Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (893-902)
  37. Barki H, Fang L, Michelucci D and Foufou S (2016). Re-parameterization reduces irreducible geometric constraint systems, Computer-Aided Design, 70:C, (182-192), Online publication date: 1-Jan-2016.
  38. ACM
    Dwivedi S Computing Modular Exponentiation for Fixed-Exponent Proceedings of the 8th Annual ACM India Conference, (89-94)
  39. Elashry I, Mu Y and Susilo W (2015). A resilient identity-based authenticated key exchange protocol, Security and Communication Networks, 8:13, (2279-2290), Online publication date: 10-Sep-2015.
  40. Lechner A, Ouaknine J and Worrell J On the Complexity of Linear Arithmetic with Divisibility Proceedings of the 2015 30th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (667-676)
  41. ACM
    Kauers M and Koutschan C Integral D-Finite Functions Proceedings of the 2015 ACM on International Symposium on Symbolic and Algebraic Computation, (251-258)
  42. Bermejo I and García-Marco I (2015). Complete intersections in simplicial toric varieties, Journal of Symbolic Computation, 68:P1, (265-286), Online publication date: 1-May-2015.
  43. Li W, Yuan C and Gao X (2015). Sparse difference resultant, Journal of Symbolic Computation, 68:P1, (169-203), Online publication date: 1-May-2015.
  44. Gupta K and Ray I (2015). Finding Biaffine and Quadratic Equations for S-Boxes Based on Power Mappings, IEEE Transactions on Information Theory, 61:4, (2200-2209), Online publication date: 1-Apr-2015.
  45. Ouaknine J, Pinto J and Worrell J On termination of integer linear loops Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (957-969)
  46. Chonev V, Ouaknine J and Worrell J The polyhedron-hitting problem Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (940-956)
  47. Marušic I and Worrell J (2015). Complexity of equivalence and learning for multiplicity tree automata, The Journal of Machine Learning Research, 16:1, (2465-2500), Online publication date: 1-Jan-2015.
  48. Xiao L, Liu S and Yang D (2015). A low-complexity block diagonalization algorithm for MU-MIMO two-way relay systems with complex lattice reduction, International Journal of Distributed Sensor Networks, 2015, (120-120), Online publication date: 1-Jan-2015.
  49. Coxon N (2014). List decoding of number field codes, Designs, Codes and Cryptography, 72:3, (687-711), Online publication date: 1-Sep-2014.
  50. ACM
    Saruchi , Morel I, Stehlé D and Villard G LLL reducing with the most significant bits Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, (367-374)
  51. ACM
    Eisenträger K, Hallgren S, Kitaev A and Song F A quantum algorithm for computing the unit group of an arbitrary degree number field Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (293-302)
  52. Gethner E, Kirkpatrick D and Pippenger N (2014). Computational Aspects of M.C. Escher's Ribbon Patterns, Theory of Computing Systems, 54:4, (640-658), Online publication date: 1-May-2014.
  53. Bi J, Coron J, Faugère J, Nguyen P, Renault G and Zeitoun R Rounding and Chaining LLL Proceedings of the 17th International Conference on Public-Key Cryptography --- PKC 2014 - Volume 8383, (185-202)
  54. Hsu C and Lin Y (2014). Improved migration for mobile computing in distributed networks, Computer Standards & Interfaces, 36:3, (577-584), Online publication date: 1-Mar-2014.
  55. Haviv I and Regev O On the lattice isomorphism problem Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms, (391-404)
  56. Ouaknine J and Worrell J Positivity problems for low-order linear recurrence sequences Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms, (366-379)
  57. Lee C, Lai Y and Hsiao C (2013). Cryptanalysis of a simple key assignment for access control based on polynomial, Journal of Information Security and Applications, 18:4, (215-218), Online publication date: 1-Dec-2013.
  58. ACM
    Lyubashevsky V, Peikert C and Regev O (2013). On Ideal Lattices and Learning with Errors over Rings, Journal of the ACM, 60:6, (1-35), Online publication date: 1-Nov-2013.
  59. Hubert E and Labahn G (2013). Scaling Invariants and Symmetry Reduction of Dynamical Systems, Foundations of Computational Mathematics, 13:4, (479-516), Online publication date: 1-Aug-2013.
  60. ACM
    Chonev V, Ouaknine J and Worrell J The orbit problem in higher dimensions Proceedings of the forty-fifth annual ACM symposium on Theory of Computing, (941-950)
  61. Cheng Q and Zhuang J (2013). On certain computations of Pisot numbers, Information Processing Letters, 113:8, (271-275), Online publication date: 1-Apr-2013.
  62. Morán Ramírez D and Dey S A polynomial-time algorithm to check closedness of simple second order mixed-integer sets Proceedings of the 16th international conference on Integer Programming and Combinatorial Optimization, (266-277)
  63. Longa P and Sica F Four-Dimensional gallant-lambert-vanstone scalar multiplication Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security, (718-739)
  64. Ouaknine J and Worrell J Decision problems for linear recurrence sequences Proceedings of the 6th international conference on Reachability Problems, (21-28)
  65. ACM
    Hubert E and Labahn G Rational invariants of scalings from Hermite normal forms Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation, (219-226)
  66. ACM
    Biasse J and Fieker C A polynomial time algorithm for computing the HNF of a module over the integers of a number field Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation, (75-82)
  67. Nitaj A A new attack on RSA and CRT-RSA Proceedings of the 5th international conference on Cryptology in Africa, (221-233)
  68. ACM
    Arvind V and Kurur P (2012). Testing nilpotence of galois groups in polynomial time, ACM Transactions on Algorithms, 8:3, (1-22), Online publication date: 1-Jul-2012.
  69. Feng T and Xiang Q (2012). Strongly regular graphs from unions of cyclotomic classes, Journal of Combinatorial Theory Series B, 102:4, (982-995), Online publication date: 1-Jul-2012.
  70. Wang P and Zhang F (2012). Computing elliptic curve discrete logarithms with the negation map, Information Sciences: an International Journal, 195, (277-286), Online publication date: 1-Jul-2012.
  71. Jovanović D and de Moura L Solving non-linear arithmetic Proceedings of the 6th international joint conference on Automated Reasoning, (339-354)
  72. Gethner E, Kirkpatrick D and Pippenger N M.C. escher wrap artist Proceedings of the 6th international conference on Fun with Algorithms, (198-209)
  73. Lobachev O Parallel computation skeletons with premature termination property Proceedings of the 11th international conference on Functional and Logic Programming, (197-212)
  74. ACM
    Kuncak V, Mayer M, Piskac R and Suter P (2012). Software synthesis procedures, Communications of the ACM, 55:2, (103-111), Online publication date: 1-Feb-2012.
  75. Berzati A, Canovas-Dumas C and Goubin L Secret key leakage from public key perturbation of DLP-Based cryptosystems Cryptography and Security, (233-247)
  76. ACM
    Gupta S and Storjohann A Computing hermite forms of polynomial matrices Proceedings of the 36th international symposium on Symbolic and algebraic computation, (155-162)
  77. Hayasaka K and Takagi T An experiment of number field sieve over GF(p) of low hamming weight characteristic Proceedings of the Third international conference on Coding and cryptology, (191-200)
  78. Rose M, Plantard T and Susilo W Improving BDD cryptosystems in general lattices Proceedings of the 7th international conference on Information security practice and experience, (152-167)
  79. ACM
    Manulis M and Poettering B Practical affiliation-hiding authentication from improved polynomial interpolation Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, (286-295)
  80. ACM
    Wang X, Liu M, Tian C and Bi J Improved Nguyen-Vidick heuristic sieve algorithm for shortest vector problem Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, (1-9)
  81. ACM
    Cook W and Steffy D (2011). Solving Very Sparse Rational Systems of Equations, ACM Transactions on Mathematical Software, 37:4, (1-21), Online publication date: 1-Feb-2011.
  82. Hu Z, Xu M and Zhou Z A generalization of Verheul's theorem for some ordinary curves Proceedings of the 6th international conference on Information security and cryptology, (105-114)
  83. Yu J, Yap C, Du Z, Pion S and Brönnimann H The design of core 2 Proceedings of the Third international congress conference on Mathematical software, (121-141)
  84. Plantard T and Susilo W Recursive lattice reduction Proceedings of the 7th international conference on Security and cryptography for networks, (329-344)
  85. ACM
    Avendaño M, Ibrahim A, Rojas J and Rusek K Randomized NP-completeness for p-adic rational roots of sparse polynomials in one variable Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation, (331-338)
  86. Lyubashevsky V, Peikert C and Regev O On ideal lattices and learning with errors over rings Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques, (1-23)
  87. Maitra S, Sarkar S and Sen Gupta S Factoring RSA modulus using prime reconstruction from random known bits Proceedings of the Third international conference on Cryptology in Africa, (82-99)
  88. Joye M, Naccache D and Porte S The polynomial composition problem in (Z/nZ)[X] Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application, (1-12)
  89. Wagstaff S Computational number theory Algorithms and theory of computation handbook, (16-16)
  90. Eisenträger K and Hallgren S Algorithms for ray class groups and Hilbert class fields Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (471-483)
  91. Bhattacharyya A and Xie N Lower bounds for testing triangle-freeness in Boolean functions Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (87-98)
  92. Sakemi Y, Takeuchi S, Nogami Y and Morikawa Y Accelerating twisted ate pairing with frobenius map, small scalar multiplication, and multi-pairing Proceedings of the 12th international conference on Information security and cryptology, (47-64)
  93. Castagnos G, Joux A, Laguillaumie F and Nguyen P Factoring pq2 with Quadratic Forms Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, (469-486)
  94. Backes W and Wetzel S Parallel Lattice Basis Reduction Using a Multi-threaded Schnorr-Euchner LLL Algorithm Proceedings of the 15th International Euro-Par Conference on Parallel Processing, (960-973)
  95. ACM
    Yap C Exact numerical computation in algebra and geometry Proceedings of the 2009 international symposium on Symbolic and algebraic computation, (387-388)
  96. ACM
    Morel I, Stehlé D and Villard G H-LLL Proceedings of the 2009 international symposium on Symbolic and algebraic computation, (271-278)
  97. ACM
    Brownawell W and Yap C Lower bounds for zero-dimensional projections Proceedings of the 2009 international symposium on Symbolic and algebraic computation, (79-86)
  98. Gan Y, Ling C and Mow W (2009). Complex lattice reduction algorithm for low-complexity full-diversity MIMO detection, IEEE Transactions on Signal Processing, 57:7, (2701-2710), Online publication date: 1-Jul-2009.
  99. Lory P Reducing the Complexity in the Distributed Computation of Private RSA Keys Proceedings of the 14th Australasian Conference on Information Security and Privacy, (250-263)
  100. Joye M and Tunstall M Exponent Recoding and Regular Exponentiation Algorithms Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology, (334-349)
  101. Jhanwar M and Barua R A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme Information Security and Cryptology, (314-331)
  102. Berzati A, Canovas C, Dumas J and Goubin L Fault Attacks on RSA Public Keys Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology, (414-428)
  103. Junod P, Karlov A and Lenstra A Improving the Boneh-Franklin Traitor Tracing Scheme Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09, (88-104)
  104. ACM
    Morel I, Stehlé D and Villard G (2009). From an LLL-reduced basis to another, ACM Communications in Computer Algebra, 42:3, (142-143), Online publication date: 6-Feb-2009.
  105. Pujol X and Stehlé D Rigorous and Efficient Short Lattice Vectors Enumeration Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, (390-405)
  106. Grześkowiak M On Generating Elements of Orders Dividing p2k±pk + 1 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security, (1-19)
  107. Grześkowiak M Generating a Large Prime Factor of p4 ± p2 + 1 in Polynomial Time Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems, (1140-1149)
  108. Kauers M and Zimmermann B (2008). Computing the algebraic relations of C-finite sequences and multisequences, Journal of Symbolic Computation, 43:11, (787-803), Online publication date: 1-Nov-2008.
  109. Kredel H Unique factorization domains in the java computer algebra system Proceedings of the 7th international conference on Automated deduction in geometry, (86-115)
  110. Bröker R, Charles D and Lauter K Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography Proceedings of the 2nd international conference on Pairing-Based Cryptography, (100-112)
  111. ACM
    Poteaux A and Rybowicz M Good reduction of puiseux series and complexity of the Newton-Puiseux algorithm over finite fields Proceedings of the twenty-first international symposium on Symbolic and algebraic computation, (239-246)
  112. Negre C and Plantard T Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation Proceedings of the 13th Australasian conference on Information Security and Privacy, (463-477)
  113. Zhu J, Li X, Ye Y and Wang G (2008). Analysis on the strip-based projection model for discrete tomography, Discrete Applied Mathematics, 156:12, (2359-2367), Online publication date: 20-Jun-2008.
  114. Kedlaya K and Sutherland A Computing L-series of hyperelliptic curves Proceedings of the 8th international conference on Algorithmic number theory, (312-326)
  115. Belding J, Bröker R, Enge A and Lauter K Computing Hilbert class polynomials Proceedings of the 8th international conference on Algorithmic number theory, (282-295)
  116. Thongjunthug T Computing a lower bound for the canonical height on elliptic curves over totally real number fields Proceedings of the 8th international conference on Algorithmic number theory, (139-152)
  117. ACM
    Gama N and Nguyen P Finding short lattice vectors within mordell's inequality Proceedings of the fortieth annual ACM symposium on Theory of computing, (207-216)
  118. Akhavi A and Stehlé D Speeding-up lattice reduction with random projections Proceedings of the 8th Latin American conference on Theoretical informatics, (293-305)
  119. Plantard T, Susilo W and Win K A digital signature scheme based on CV P∞ Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography, (288-307)
  120. Huang X, Liang C and Ma J (2008). System architecture and implementation of MIMO sphere decoders on FPGA, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 16:2, (188-197), Online publication date: 1-Feb-2008.
  121. Micciancio D Efficient reductions among lattice problems Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (84-93)
  122. Di Crescenzo G and Saraswat V Public key encryption with searchable keywords based on Jacobi symbols Proceedings of the cryptology 8th international conference on Progress in cryptology, (282-296)
  123. Kanayama N and Uchiyama S (2007). The Vanstone-Zuccherato Schemes Revisited, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A:12, (2903-2907), Online publication date: 1-Dec-2007.
  124. Backes W and Wetzel S An efficient LLL gram using buffered transformations Proceedings of the 10th international conference on Computer Algebra in Scientific Computing, (31-44)
  125. Meurice De Dormale G, Bulens P and Quisquater J Collision Search for Elliptic Curve Discrete Logarithm over GF(2m) with FPGA Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, (378-393)
  126. Joye M Highly Regular Right-to-Left Algorithms for Scalar Multiplication Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, (135-147)
  127. ACM
    Jafarisiavoshani M, Fragouli C, Diggavi S and Gkantsidis C Bottleneck discovery and overlay management in network coded peer-to-peer systems Proceedings of the 2007 SIGCOMM workshop on Internet network management, (293-298)
  128. Fan X and Gong G Efficient explicit formulae for genus 2 hyperelliptic curves over prime fields and their implementations Proceedings of the 14th international conference on Selected areas in cryptography, (155-172)
  129. ACM
    Villard G Certification of the QR factor R and of lattice basis reducedness Proceedings of the 2007 international symposium on Symbolic and algebraic computation, (361-368)
  130. ACM
    Peikert C and Rosen A Lattices that admit logarithmic worst-case to average-case connection factors Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (478-487)
  131. ACM
    Haviv I and Regev O Tensor-based hardness of the shortest vector problem to within almost polynomial factors Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (469-477)
  132. Shirase M, Han D, Hibino Y, Kim H and Takagi T Compressed XTR Proceedings of the 5th international conference on Applied Cryptography and Network Security, (420-431)
  133. Casagrande A, Corvaja P, Piazza C and Mishra B Composing semi-algebraic O-minimal automata Proceedings of the 10th international conference on Hybrid systems: computation and control, (668-671)
  134. ACM
    Hallgren S (2007). Polynomial-time quantum algorithms for Pell's equation and the principal ideal problem, Journal of the ACM, 54:1, (1-19), Online publication date: 1-Mar-2007.
  135. Khabbazian M, Gulliver T and Bhargava V (2007). Double Point Compression with Applications to Speeding Up Random Point Multiplication, IEEE Transactions on Computers, 56:3, (305-313), Online publication date: 1-Mar-2007.
  136. Childs A and van Dam W Quantum algorithm for a generalized hidden shift problem Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, (1225-1232)
  137. Tetsushi M Development of NZMATH Proceedings of the Second international conference on Mathematical Software, (158-169)
  138. Gama N, Howgrave-Graham N, Koy H and Nguyen P Rankin's constant and blockwise lattice reduction Proceedings of the 26th annual international conference on Advances in Cryptology, (112-130)
  139. Joux A, Lercier R, Smart N and Vercauteren F The number field sieve in the medium prime case Proceedings of the 26th annual international conference on Advances in Cryptology, (326-344)
  140. Avanzi R Delaying and merging operations in scalar multiplication Proceedings of the 13th international conference on Selected areas in cryptography, (203-219)
  141. Eigenwillig A, Kettner L, Schömer E and Wolpert N (2006). Exact, efficient, and complete arrangement computation for cubic curves, Computational Geometry: Theory and Applications, 35:1-2, (36-73), Online publication date: 1-Aug-2006.
  142. Malle G The totally real primitive number fields of discriminant at most 109 Proceedings of the 7th international conference on Algorithmic Number Theory, (114-123)
  143. Jacobson M, Ramachandran S and Williams H Numerical results on class groups of imaginary quadratic fields Proceedings of the 7th international conference on Algorithmic Number Theory, (87-101)
  144. Bley W and Boltje R Computation of locally free class groups Proceedings of the 7th international conference on Algorithmic Number Theory, (72-86)
  145. Shallue A and van de Woestijne C Construction of rational points on elliptic curves over finite fields Proceedings of the 7th international conference on Algorithmic Number Theory, (510-524)
  146. Voight J Computing CM points on shimura curves arising from cocompact arithmetic triangle groups Proceedings of the 7th international conference on Algorithmic Number Theory, (406-420)
  147. Cremona J and Siksek S Computing a lower bound for the canonical height on elliptic curves over ℚ Proceedings of the 7th international conference on Algorithmic Number Theory, (275-286)
  148. Kim Y, Kim C and Youn T On the security of multilevel cryptosystems over class semigroups of imaginary quadratic non-maximal orders Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice, (92-100)
  149. Gama N, Howgrave-Graham N and Nguyen P Symplectic lattice reduction and NTRU Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques, (233-253)
  150. Kong F, Cai Z, Yu J and Li D (2006). Improved generalized Atkin algorithm for computing square roots in finite fields, Information Processing Letters, 98:1, (1-5), Online publication date: 15-Apr-2006.
  151. ACM
    Castelluccia C, Mykletun E and Tsudik G Improving secure server performance by re-balancing SSL/TLS handshakes Proceedings of the 2006 ACM Symposium on Information, computer and communications security, (26-34)
  152. Weng A (2006). A Low-Memory Algorithm for Point Counting on Picard Curves, Designs, Codes and Cryptography, 38:3, (383-393), Online publication date: 1-Mar-2006.
  153. Briggs K (2006). Implementing exact real arithmetic in python, C++ and C, Theoretical Computer Science, 351:1, (74-81), Online publication date: 14-Feb-2006.
  154. Nuyens D and Cools R (2006). Fast component-by-component construction of rank-1 lattice rules with a non-prime number of points, Journal of Complexity, 22:1, (4-28), Online publication date: 1-Feb-2006.
  155. Bentahar K The equivalence between the DHP and DLP for elliptic curves used in practical applications, revisited Proceedings of the 10th international conference on Cryptography and Coding, (376-391)
  156. Koblitz N and Menezes A Pairing-Based cryptography at high security levels Proceedings of the 10th international conference on Cryptography and Coding, (13-36)
  157. Kong F and Li D A note on signed binary window algorithm for elliptic curve cryptosystems Proceedings of the 4th international conference on Cryptology and Network Security, (223-235)
  158. Negre C Scalar multiplication on elliptic curves defined over fields of small odd characteristic Proceedings of the 6th international conference on Cryptology in India, (389-402)
  159. Monnerat J, Oswald Y and Vaudenay S Optimization of the MOVA undeniable signature scheme Proceedings of the 1st international conference on Progress in Cryptology in Malaysia, (196-209)
  160. Chang N, Kim C, Park Y and Lim J A non-redundant and efficient architecture for karatsuba-ofman algorithm Proceedings of the 8th international conference on Information Security, (288-299)
  161. Borges-Quintana M, Borges-Trenard M and Martínez-Moro E On the use of gröbner bases for computing the structure of finite abelian groups Proceedings of the 8th international conference on Computer Algebra in Scientific Computing, (52-64)
  162. Coron J, Lefranc D and Poupard G A new baby-step giant-step algorithm and some applications to cryptanalysis Proceedings of the 7th international conference on Cryptographic hardware and embedded systems, (47-60)
  163. ACM
    van de Woestijne C Deterministic equation solving over finite fields Proceedings of the 2005 international symposium on Symbolic and algebraic computation, (348-353)
  164. Haneda M, Kawazoe M and Takahashi T Suitable curves for genus-4 HCC over prime fields Proceedings of the 32nd international conference on Automata, Languages and Programming, (539-550)
  165. Wollinger T, Pelzl J and Paar C (2005). Cantor versus Harley, IEEE Transactions on Computers, 54:7, (861-872), Online publication date: 1-Jul-2005.
  166. ACM
    Hallgren S Fast quantum algorithms for computing the unit group and class group of a number field Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, (468-474)
  167. Fouque P, Granboulan L and Stern J Differential cryptanalysis for multivariate schemes Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques, (341-353)
  168. Nguên P and Stehlé D Floating-Point LLL revisited Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques, (215-233)
  169. Kim H, Park B, Ha J, Lee B and Park D New key management systems for multilevel security Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II, (245-253)
  170. Wang S and Laih C (2005). Cryptanalyses of two key assignment schemes based on polynomial interpolations, Computers and Security, 24:2, (134-138), Online publication date: 1-Mar-2005.
  171. Konstantinou E, Kontogeorgis A, Stamatiou Y and Zaroliagis C Generating prime order elliptic curves Proceedings of the 7th international conference on Information Security and Cryptology, (261-278)
  172. ACM
    Doërr G, Dugelay J and Grangé L Exploiting self-similarities to defeat digital watermarking systems Proceedings of the 2004 workshop on Multimedia and security, (133-142)
  173. ACM
    Wollinger T, Pelzl J, Wittelsberger V, Paar C, Saldamli G and Koç Ç (2004). Elliptic and hyperelliptic curves on embedded μP, ACM Transactions on Embedded Computing Systems, 3:3, (509-533), Online publication date: 1-Aug-2004.
  174. van der Heiden G (2004). Factoring polynomials over finite fields with drinfeld modules, Mathematics of Computation, 73:245, (317-322), Online publication date: 1-Jan-2004.
  175. Hühnlein D, Jacobson M and Weber D (2003). Towards Practical Non-Interactive Public-Key Cryptosystems Using Non-Maximal Imaginary Quadratic Orders, Designs, Codes and Cryptography, 30:3, (281-299), Online publication date: 1-Nov-2003.
  176. Kim H and Moon S Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal orders Proceedings of the 8th Australasian conference on Information security and privacy, (488-497)
  177. Eick B and Ostheimer G (2003). On the orbit-stabilizer problem for integral matrix actions of polycyclic groups, Mathematics of Computation, 72:243, (1511-1529), Online publication date: 1-Jul-2003.
  178. Heß F, Pauli S and Pohst M (2003). Computing the multiplicative group of residue class rings, Mathematics of Computation, 72:243, (1531-1548), Online publication date: 1-Jul-2003.
  179. Cremona J and Rusin D (2003). Efficient solution of rational conics, Mathematics of Computation, 72:243, (1417-1441), Online publication date: 1-Jul-2003.
  180. Hsu C and Wu T (2003). Refereed paper, Computers and Security, 22:5, (453-456), Online publication date: 1-Jul-2003.
  181. Brier E and Joye M Fast point multiplication on elliptic curves through isogenies Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes, (43-50)
  182. Szydlo M Hypercubic lattice reduction and analysis of GGH and NTRU signatures Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques, (433-448)
  183. Ciet M, Lange T, Sica F and Quisquater J Improved algorithms for efficient arithmetic on elliptic curves using fast endomorphisms Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques, (388-400)
  184. Courtois N and Patarin J About the XL algorithm over GF(2) Proceedings of the 2003 RSA conference on The cryptographers' track, (141-157)
  185. Grabmeier J, Kaltofen E and Weispfenning V Cited References Computer algebra handbook, (493-622)
  186. Agou S, Deléglise M and Nicolas J (2003). Short Polynomial Representations for Square Roots Modulo p, Designs, Codes and Cryptography, 28:1, (33-44), Online publication date: 1-Jan-2003.
  187. ACM
    Backes W and Wetzel S (2002). Heuristics on lattice basis reduction in practice, ACM Journal of Experimental Algorithmics, 7, (1), Online publication date: 31-Dec-2003.
  188. Aardal K, Weismantel R and Wolsey L (2002). Non-standard approaches to integer programming, Discrete Applied Mathematics, 123:1-3, (5-74), Online publication date: 15-Nov-2002.
  189. Monico C (2002). Computing the Primary Decomposition of Zero-dimensional Ideals, Journal of Symbolic Computation, 34:5, (451-459), Online publication date: 1-Nov-2002.
  190. Zhang Z (2002). A one-parameter quadratic-base version of the Baillie-PSW probable prime test, Mathematics of Computation, 71:240, (1699-1734), Online publication date: 1-Oct-2002.
  191. Jacobson M and Williams H (2002). Modular Arithmetic on Elements of Small Norm in Quadratic Fields, Designs, Codes and Cryptography, 27:1-2, (93-110), Online publication date: 1-Oct-2002.
  192. Eick B (2002). Orbit-stabilizer Problems and Computing Normalizers for Polycyclic Groups, Journal of Symbolic Computation, 34:1, (1-19), Online publication date: 1-Jul-2002.
  193. ACM
    Hallgren S Polynomial-time quantum algorithms for Pell's equation and the principal ideal problem Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, (653-658)
  194. Fouque P, Stern J and Wackers G Cryptocomputing with rationals Proceedings of the 6th international conference on Financial cryptography, (136-146)
  195. Biehl I, Buchmann J, Hamdy S and Meyer A (2002). A Signature Scheme Based on the Intractability of Computing Roots, Designs, Codes and Cryptography, 25:3, (223-236), Online publication date: 1-Mar-2002.
  196. Caldwell C and Gallot Y (2002). On the primality of n! ± 1 and 2×3×5×...× p±1, Mathematics of Computation, 71:237, (441-448), Online publication date: 1-Jan-2002.
  197. Galbraith S, Paulus S and Smart N (2002). Arithmetic on superelliptic curves, Mathematics of Computation, 71:237, (393-405), Online publication date: 1-Jan-2002.
  198. Mao W (2001). Verifiable Partial Escrow of Integer Factors, Designs, Codes and Cryptography, 24:3, (327-342), Online publication date: 1-Dec-2001.
  199. Stephan F and Ventsov Y (2001). Learning algebraic structures from text, Theoretical Computer Science, 268:2, (221-273), Online publication date: 17-Oct-2001.
  200. Khandani A and Esmaeili M (2001). Successive Minimization of the State Complexity of the Self-dual Lattices Using Korkin-Zolotarev Reduced Basis, Designs, Codes and Cryptography, 24:2, (145-158), Online publication date: 1-Oct-2001.
  201. ACM
    Giavitto J and Michel O Declarative definition of group indexed data structures and approximation of their domains Proceedings of the 3rd ACM SIGPLAN international conference on Principles and practice of declarative programming, (150-161)
  202. ACM
    Watrous J Quantum algorithms for solvable groups Proceedings of the thirty-third annual ACM symposium on Theory of computing, (60-67)
  203. ACM
    Hanrot G and Morain F Solvability by radicals from an algorithmic point of view Proceedings of the 2001 international symposium on Symbolic and algebraic computation, (175-182)
  204. Scheidler R (2001). Cryptography in Quadratic Function Fields, Designs, Codes and Cryptography, 22:3, (239-264), Online publication date: 1-Apr-2001.
  205. Joye M and Yen S (2000). Optimal Left-to-Right Binary Signed-Digit Recoding, IEEE Transactions on Computers, 49:7, (740-748), Online publication date: 1-Jul-2000.
  206. Jaulmes É and Joux A A NICE cryptanalysis Proceedings of the 19th international conference on Theory and application of cryptographic techniques, (382-391)
  207. Poupard G and Stern J Fair encryption of RSA keys Proceedings of the 19th international conference on Theory and application of cryptographic techniques, (172-189)
  208. Girault M and Misarsky J Cryptanalysis of countermeasures proposed for repairing ISO 9796-1 Proceedings of the 19th international conference on Theory and application of cryptographic techniques, (81-90)
  209. Silverman J (2000). The Xedni Calculus and the Elliptic Curve Discrete LogarithmProblem, Designs, Codes and Cryptography, 20:1, (5-40), Online publication date: 1-Apr-2000.
  210. Lenstra A (2000). Integer Factoring, Designs, Codes and Cryptography, 19:2-3, (101-128), Online publication date: 1-Mar-2000.
  211. Jacobson M (2000). Computing Discrete Logarithms in Quadratic Orders, Journal of Cryptology, 13:4, (473-492), Online publication date: 1-Jan-2000.
  212. Pollard J (2000). Kangaroos, Monopoly and Discrete Logarithms, Journal of Cryptology, 13:4, (437-447), Online publication date: 1-Jan-2000.
  213. Silverman J Fast Multiplication in Finite Fields GF(2N) Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems, (122-134)
  214. ACM
    Kislenkov V, Mitrofanov V and Zima E How fast can we compute products? Proceedings of the 1999 international symposium on Symbolic and algebraic computation, (75-82)
  215. Smart N On the performance of hyperelliptic cryptosystems Proceedings of the 17th international conference on Theory and application of cryptographic techniques, (165-175)
  216. Camenisch J and Michels M Proving in zero-knowledge that a number is the product of two safe primes Proceedings of the 17th international conference on Theory and application of cryptographic techniques, (107-122)
  217. ACM
    Rojas J On the complexity of diophantine geometry in low dimensions (extended abstract) Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (527-536)
  218. ACM
    Shokrollahi M and Wasserman H Decoding algebraic-geometric codes beyond the error-correction bound Proceedings of the thirtieth annual ACM symposium on Theory of computing, (241-248)
  219. ACM
    Besch M and Pohl H A group theoretic approach to data and code partitioning Proceedings of the 1998 ACM symposium on Applied Computing, (575-583)
  220. ACM
    Giesbrecht M Efficient parallel solution of sparse systems of linear diophantine equations Proceedings of the second international symposium on Parallel symbolic computation, (1-10)
  221. ACM
    Gianni P and Trager B Integral closure of Noetherian rings Proceedings of the 1997 international symposium on Symbolic and algebraic computation, (212-216)
  222. ACM
    Theobald P, Wetzel S and Backes W Design concepts for matrices and lattices in LiDIA Proceedings of the 1997 ACM symposium on Applied computing, (532-536)
  223. ACM
    Joye M and Quisquater J On the importance of securing your bins Proceedings of the 4th ACM conference on Computer and communications security, (135-141)
  224. ACM
    Weber A (1996). Computing radical expressions for roots of unity, ACM SIGSAM Bulletin, 30:3, (11-20), Online publication date: 1-Sep-1996.
  225. Babai L, Beals R, Cai J, Ivanyos G and Luks E Multiplicative equations over commuting matrices Proceedings of the seventh annual ACM-SIAM symposium on Discrete algorithms, (498-507)
  226. Scheidler R, Stein A and Williams H (1996). Key-Exchange in Real Quadratic Congruence Function Fields, Designs, Codes and Cryptography, 7:1-2, (153-174), Online publication date: 1-Jan-1996.
  227. ACM
    van Hoeij M An algorithm for computing the Weierstrass normal form Proceedings of the 1995 international symposium on Symbolic and algebraic computation, (90-95)
  228. ACM
    Encarnación M On a modular algorithm for computing GCDs of polynomials over algebraic number fields Proceedings of the international symposium on Symbolic and algebraic computation, (58-65)
Contributors
  • Bordeaux Institute of Mathematics

Recommendations