29 results
1 - Introduction
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp 1-12
-
- Chapter
- Export citation
References
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp 335-382
-
- Chapter
- Export citation
6 - RSA, DH and DSA in the Wild
- from Part I - Cryptanalysis
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp 140-181
-
- Chapter
- Export citation
7 - A Survey of Chosen-Prefix Collision Attacks
- from Part I - Cryptanalysis
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp 182-220
-
- Chapter
- Export citation
Part I - Cryptanalysis
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp 13-14
-
- Chapter
- Export citation
Index
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp 383-388
-
- Chapter
- Export citation
Contents
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp vii-ix
-
- Chapter
- Export citation
Part II - Implementations
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp 221-222
-
- Chapter
- Export citation
Preface
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp xi-xii
-
- Chapter
- Export citation
9 - Arithmetic Software Libraries
- from Part II - Implementations
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp 251-292
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp i-vi
-
- Chapter
- Export citation
11 - History of Cryptographic Key Sizes
- from Part II - Implementations
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp 314-334
-
- Chapter
- Export citation
2 - Lattice Attacks on NTRU and LWE: A History of Refinements
- from Part I - Cryptanalysis
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp 15-40
-
- Chapter
- Export citation
10 - XTR and Tori
- from Part II - Implementations
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp 293-313
-
- Chapter
- Export citation
3 - History of Integer Factorisation
- from Part I - Cryptanalysis
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp 41-77
-
- Chapter
- Export citation
8 - Efficient Modular Arithmetic
- from Part II - Implementations
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp 223-250
-
- Chapter
- Export citation
5 - Computing Discrete Logarithms
- from Part I - Cryptanalysis
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp 106-139
-
- Chapter
- Export citation
List of Contributors
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp x-x
-
- Chapter
- Export citation
4 - Lattice-Based Integer Factorisation: An Introduction to Coppersmith’s Method
- from Part I - Cryptanalysis
-
- Book:
- Computational Cryptography
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021, pp 78-105
-
- Chapter
- Export citation
Computational Cryptography
- Algorithmic Aspects of Cryptology
-
- Published online:
- 11 November 2021
- Print publication:
- 02 December 2021