


default search action
1st NuTMiC 2017: Warsaw, Poland
- Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykala:
Number-Theoretic Methods in Cryptology - First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10737, Springer 2018, ISBN 978-3-319-76619-5
Invited Talk
- Antoine Joux, Vanessa Vitse:
A Crossbred Algorithm for Solving Boolean Polynomial Systems. 3-21
Elliptic Curves in Cryptography
- Przemyslaw Dabrowski, Rafal Gliwa, Janusz Szmidt, Robert Wicik:
Generation and Implementation of Cryptographically Strong Elliptic Curves. 25-36 - Michal Wronski
, Tomasz Kijko
:
On the Possibility of Transformation of Multidimensional ECDLP into 1-Dimensional ECDLP. 37-47 - Maciej Grzeskowiak
:
Explicit Bound for the Prime Ideal Theorem in Residue Classes. 48-68
Public-Key Cryptography
- Alan Szepieniec, Bart Preneel
:
Short Solutions to Nonlinear Systems of Equations. 71-90 - Nadir Murru, Francesco M. Saettone:
A Novel RSA-Like Cryptosystem Based on a Generalization of the Rédei Rational Functions. 91-103 - Jacques Patarin, Valérie Nachef
:
Commutativity, Associativity, and Public Key Cryptography. 104-117
Lattices in Cryptography
- Filipp Valovich, Francesco Aldà:
Computational Differential Privacy from Lattice-Based Cryptography. 121-141 - Junpei Yamaguchi, Masaya Yasuda:
Explicit Formula for Gram-Schmidt Vectors in LLL with Deep Insertions and Its Applications. 142-160
Number Theory
- Robert Drylo, Jacek Pomykala:
Factoring n and the Number of Points of Kummer Hypersurfaces mod n. 163-177 - Rafal Bystrzycki:
Detection of Primes in the Set of Residues of Divisors of a Given Number. 178-194
Pseudorandomness
- László Mérai
, Joël Rivat, András Sárközy:
The Measures of Pseudorandomness and the NIST Tests. 197-216 - Katalin Gyarmati:
On the Cross-Combined Measure of Families of Binary Lattices and Sequences. 217-238
Algebraic Structures and Analysis
- Janusz Szmidt
:
The Cube Attack on Courtois Toy Cipher. 241-253 - Sibel Kurt, Oguz Yayla
:
Near Butson-Hadamard Matrices and Nonlinear Boolean Functions. 254-266 - Appala Naidu Tentu, Abdul Basit
, K. Bhavani, V. Ch. Venkaiah:
Multi-secret Sharing Scheme for Level-Ordered Access Structures. 267-278

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.