Filtrer vos résultats
- 15
- 11
- 12
- 7
- 3
- 2
- 1
- 1
- 1
- 21
- 15
- 3
- 2
- 2
- 4
- 4
- 1
- 2
- 1
- 4
- 2
- 1
- 26
- 18
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 26
- 5
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
26 résultats
|
|
triés par
|
Pairing-based methods for Jacobians of genus 2 curves with maximal endomorphism ringJournal of Number Theory, 2013, 133 (11), pp.3755-3770
Article dans une revue
hal-01323887v1
|
|||
Women in Numbers Europe IIIWomen in Numbers Europe III, Association for Women in Mathematics Series, Springer International Publishing, 2021
Proceedings/Recueil des communications
hal-04364042v1
|
|||
|
Pairing-based algorithms for Jacobians of genus 2 curves with maximal endomorphism ringJournal of Number Theory, 2013, 133, pp.3755-3770. ⟨10.1016/j.jnt.2013.04.023⟩
Article dans une revue
hal-00675045v5
|
||
|
Constructions of New q-CryptomorphismsDesigns, Codes and Cryptography, 2023, 91 (2), pp.451-473. ⟨10.1007/s10623-022-01087-3⟩
Article dans une revue
hal-04363827v1
|
||
|
Isogeny graphs with maximal real multiplicationJournal of Number Theory, 2020, 207, pp.385-422. ⟨10.1016/j.jnt.2019.06.019⟩
Article dans une revue
hal-00967742v5
|
||
PairingsNadia El Mrabet; Marc Joye. Guide to pairing based cryptography, CRC Press, 2016, Chapman & Hall/CRC Cryptography and Network Security
Chapitre d'ouvrage
hal-01323882v1
|
|||
|
Weighted Subspace Designs from q-PolymatroidsJournal of Combinatorial Theory, Series A, 2024, 201, pp.105799. ⟨10.1016/j.jcta.2023.105799⟩
Article dans une revue
hal-04473966v1
|
||
|
Determining the primes of bad reduction of CM curves of genus 32023
Pré-publication, Document de travail
hal-04154083v1
|
||
|
Modular invariants for genus 3 hyperelliptic curvesResearch in Number Theory, 2019, 5 (1), pp.article n°9. ⟨10.1007/s40993-018-0146-6⟩
Article dans une revue
hal-01845011v2
|
||
|
Pairing Computation for Elliptic Curves with Embedding Degree 15RR-09012, 2009, pp.14
Rapport
lirmm-00380549v1
|
||
Pairing the volcanoMathematics of Computation, 2013, 82 (281), pp.581-603
Article dans une revue
hal-01323886v1
|
|||
|
Isogenous hyperelliptic and non-hyperelliptic Jacobians with maximal complex multiplicationMathematics of Computation, 2023, 92, pp.349-383
Article dans une revue
hal-03251240v1
|
||
|
A SAT-Based Approach for Index Calculus on Binary Elliptic CurvesProgress in Cryptology - AFRICACRYPT 2020, Jul 2020, Cairo, Egypt. pp.214-235, ⟨10.1007/978-3-030-51938-4⟩
Communication dans un congrès
hal-03230853v1
|
||
|
Parity (XOR) Reasoning for the Index Calculus AttackPrinciples and Practice of Constraint Programming 2020, Sep 2020, Louvain-la-Neuve, Belgium. pp.774-790, ⟨10.1007/978-3-030-58475-7_45⟩
Communication dans un congrès
hal-03230825v1
|
||
Parallel Isogeny Path Finding with Limited MemoryProgress in Cryptology – INDOCRYPT 2022 23rd International Conference on Cryptology in India, Dec 2022, Kolkata, India. pp.294-316, ⟨10.1007/978-3-031-22912-1_13⟩
Communication dans un congrès
hal-04002326v1
|
|||
|
Logical cryptanalysis with WDSatProceedings of SAT 2021, Jul 2021, Barcelona, Spain. ⟨10.1007/978-3-030-80223-3\_37⟩
Communication dans un congrès
hal-03230392v1
|
||
|
Constructing genus 3 hyperelliptic Jacobians with CMLMS Journal of Computation and Mathematics, 2016, 19 (Special Issue A: Algorithmic Number Theory Symposium XII), pp.283 - 300. ⟨10.1112/S1461157016000322⟩
Article dans une revue
hal-01323883v1
|
||
Efficient multiplication in finite field extensions of degree 5AFRICACRYPT 2011 - 4th International Conference on Cryptology, Jul 2011, Dakar, Senegal. pp.188-205, ⟨10.1007/978-3-642-21969-6_12⟩
Communication dans un congrès
istex
inria-00609920v1
|
|||
The Complex Multiplication Method in Genus 3New Frontiers in Number Theory and Applications, Springer, In press
Chapitre d'ouvrage
hal-04363854v1
|
|||
|
Genus 3 hyperelliptic curves with CM via Shimura reciprocityANTS IV Proceedings of the Fourteenth Algorithmic Number Theory Symposium, Jun 2020, online, New Zealand. pp.161-178, ⟨10.2140/obs.2020.4.161⟩
Communication dans un congrès
hal-03698651v1
|
||
|
Pairing the Volcano2011
Rapport
hal-00448031v2
|
||
Weak instances on composite order protocols[Research Report] INRIA. 2014, pp.1--13
Rapport
hal-01323885v1
|
|||
|
Time-Memory Analysis of Parallel Collision Search AlgorithmsIACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (2), pp.254--274. ⟨10.46586/tches.v2021.i2.254-274⟩
Article dans une revue
hal-03698666v1
|
||
|
Weighted Subspace Designs from $q$-PolymatroidsJournal of Combinatorial Theory, Series A, 2024, 201
Article dans une revue
hal-03251251v1
|
||
|
Four-Dimensional GLV via the Weil RestrictionAdvances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Satya Lokam, Dec 2013, Bengalore, India. pp.79-96, ⟨10.1007/978-3-642-42033-7_5⟩
Communication dans un congrès
hal-00864966v2
|
||
Index calculus attacks on hyperelliptic Jacobians with efficient endomorphismsMathematical Cryptology, 2021, 1 (2), pp.102-114
Article dans une revue
hal-04343325v1
|