LOW FLAT RATE $9.90 AUST-WIDE DELIVERY

Close Notification

Your cart does not contain any items

Number-Theoretic Methods in Cryptology

4th International Conference, NuTMiC 2024, Szczecin, Poland, June 24–26, 2024, Revised Selected...

Andrzej Dąbrowski Josef Pieprzyk Jacek Pomykała

$162.95   $130.01

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Springer International Publishing AG
19 February 2025
This book constitutes the refereed post-conference proceedings of the 4th International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024, held in Szczecin, Poland, during June 24–26, 2024. The 9 full papers and 2 invited papers presented in this book were carefully reviewed and selected from 12 submissions. They were organized in topical sections as follows: invited talks; elliptic curves in cryptography; number theory; algebraic structures and public-key cryptography.
Edited by:   , ,
Imprint:   Springer International Publishing AG
Country of Publication:   Switzerland
Volume:   14966
Dimensions:   Height: 235mm,  Width: 155mm, 
ISBN:   9783031823794
ISBN 10:   3031823796
Series:   Lecture Notes in Computer Science
Pages:   331
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Paperback
Publisher's Status:   Active
.- Invited Talks. .- On the efficient representation of isogenies. .- Elliptic-curves factoring, witnesses and oracles. .- Elliptic Curves in Cryptography. .- On chains of pairing-friendly elliptic curves. .- Faster algorithms for isogeny computations over extensions of finite fields. .- Integral solutions of some systems of polynomial equations and constructing families of pairing-friendly elliptic curves with small ρ-value. .- Number Theory. .- Algebraic Equipage for Learning with Errors in Cyclic Division Algebras. .- From Worst to Average Case to Incremental Search Bounds of the Strong Lucas Test. .- Algebraic Structures and Public-Key Cryptography. .- A New Public Key Cryptosystem Based on the Cubic Pell Curve. .- The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem. .- Compartment-based and Hierarchical Threshold Delegated Verifiable Accountable Subgroup Multi-signatures. .- Towards message recovery in NTRU Encryption with auxiliary data.

See Also