73 results on '"Lauter, Kristin"'
Search Results
2. Provably Weak Instances of Ring-LWE
3. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
4. High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition
5. Fast Cryptography in Genus 2
6. ML Confidential: Machine Learning on Encrypted Data
7. Affine Pairings on ARM
8. Group Law Computations on Jacobians of Hyperelliptic Curves
9. Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings
10. An Analysis of Affine Coordinates for Pairing Computation
11. Cryptographic Cloud Storage
12. The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
13. Full Cryptanalysis of LPS and Morgenstern Hash Functions
14. Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group
15. Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography
16. Computing Hilbert Class Polynomials
17. Stronger Security of Authenticated Key Exchange
18. Security Analysis of KEA Authenticated Key Exchange Protocol
19. Improved Weil and Tate Pairings for Elliptic and Hyperelliptic Curves
20. Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation
21. Zeta Functions of Curves over Finite Fields with Many Rational Points
22. Ray class field constructions of curves over finite fields with many rational points
23. Homomorphic Computation of Edit Distance
24. Fast Cryptography in Genus 2
25. High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition
26. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
27. Affine Pairings on ARM
28. Group Law Computations on Jacobians of Hyperelliptic Curves
29. Cryptographic Cloud Storage
30. The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
31. Security Analysis of KEA Authenticated Key Exchange Protocol
32. Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation
33. Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography
34. Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group
35. Stronger Security of Authenticated Key Exchange
36. Implementing Lightweight Block Ciphers on x86 Architectures
37. Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA
38. Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5
39. A New Index Calculus Algorithm with Complexity in Small Characteristic
40. White-Box Security Notions for Symmetric Encryption Schemes
41. Two Attacks on a White-Box AES Implementation
42. Horizontal Collision Correlation Attack on Elliptic Curves
43. Extended Generalized Feistel Networks Using Matrix Representation
44. The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE
45. Fast Exhaustive Search for Quadratic Systems in on FPGAs
46. Faster Hash-Based Signatures with Bounded Leakage
47. How to Recover Any Byte of Plaintext on RC4
48. Solving a -bit DLP on a Desktop Computer
49. A Group Action on and the Generalized DLP with Auxiliary Inputs
50. AEGIS: A Fast Authenticated Encryption Algorithm
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.