Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/647095.716733guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields

Published: 14 November 1999 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2012)Secure accumulators from euclidean rings without trusted setupProceedings of the 10th international conference on Applied Cryptography and Network Security10.1007/978-3-642-31284-7_14(224-240)Online publication date: 26-Jun-2012
  • (2003)Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal ordersProceedings of the 8th Australasian conference on Information security and privacy10.5555/1760479.1760534(488-497)Online publication date: 9-Jul-2003
  • (2003)Towards Practical Non-Interactive Public-Key Cryptosystems Using Non-Maximal Imaginary Quadratic OrdersDesigns, Codes and Cryptography10.1023/A:102574612777130:3(281-299)Online publication date: 1-Nov-2003
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ASIACRYPT '99: Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
November 1999
411 pages
ISBN:3540666664

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 14 November 1999

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2012)Secure accumulators from euclidean rings without trusted setupProceedings of the 10th international conference on Applied Cryptography and Network Security10.1007/978-3-642-31284-7_14(224-240)Online publication date: 26-Jun-2012
  • (2003)Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal ordersProceedings of the 8th Australasian conference on Information security and privacy10.5555/1760479.1760534(488-497)Online publication date: 9-Jul-2003
  • (2003)Towards Practical Non-Interactive Public-Key Cryptosystems Using Non-Maximal Imaginary Quadratic OrdersDesigns, Codes and Cryptography10.1023/A:102574612777130:3(281-299)Online publication date: 1-Nov-2003
  • (2000)A NICE cryptanalysisProceedings of the 19th international conference on Theory and application of cryptographic techniques10.5555/1756169.1756205(382-391)Online publication date: 14-May-2000

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media