issues
search
ssst0n3
/
crypto-book-note
0
stars
0
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
Blue Galaxy Energy: a new White-box Cryptanalysis Open Source Tool
#28
ssst0n3
opened
10 months ago
0
read Paper 'The curious case of the half-half Bitcoin ECDSA nonces'
#27
ssst0n3
opened
1 year ago
0
Quaternion algebras
#26
ssst0n3
opened
1 year ago
0
A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem
#25
ssst0n3
opened
1 year ago
0
what's Goldreich-Levin hard-core bits
#24
ssst0n3
opened
1 year ago
0
勘误:Boneh-1996: MSB 定义错误
#23
ssst0n3
closed
1 year ago
0
Steven Galbraith: Mathematics of Public Key Cryptography: 21. The Diffie-Hellman Problem
#22
ssst0n3
opened
1 year ago
0
Dan Boneh
#21
ssst0n3
opened
1 year ago
0
what's babai
#19
ssst0n3
opened
1 year ago
0
Boneh Publications: Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes
#18
ssst0n3
opened
1 year ago
12
The Hidden Number Problem – kel.bz
#17
ssst0n3
opened
1 year ago
0
Matthew Musson: Attacking the Elliptic Curve Discrete Logarithm Problem
#16
ssst0n3
opened
1 year ago
0
N. P. Smart: The Discrete Logarithm Problem on Elliptic Curves of Trace One
#15
ssst0n3
opened
1 year ago
0
read 'Why Smart's attack doesn't work on this ECDLP?'
#14
ssst0n3
opened
1 year ago
0
read 'Why does Smart's attack only work on anomalous curves?'
#13
ssst0n3
opened
1 year ago
0
Peter Novotney: Weak Curves In Elliptic Curve Cryptography
#12
ssst0n3
closed
1 year ago
15
groebner basis
#11
ssst0n3
opened
1 year ago
0
Tanja Lange: Finite Fields: 1.9 Conjugates, trace and norm
#10
ssst0n3
opened
1 year ago
2
Tanja Lange: Finite Fields: 1.2 First definitions
#9
ssst0n3
closed
1 year ago
6
what's Prime subfield
#8
ssst0n3
closed
1 year ago
0
Mustansiriyah University: Finite Fields and Coding Theory: chapter2: 3. TRACES, NORMS, AND BASES
#7
ssst0n3
closed
1 year ago
1
what's trace operator/function
#5
ssst0n3
opened
1 year ago
0
A point compression method for elliptic curves defined over GF(2^n): 2.1 The trace operator in GF(2^n)
#6
ssst0n3
opened
1 year ago
0
Steven Galbraith: Mathematics of Public Key Cryptography: 9. Elliptic Curves: 9.1 Group law
#1
ssst0n3
opened
1 year ago
2
Steven Galbraith: Mathematics of Public Key Cryptography: 9. Elliptic Curves
#2
ssst0n3
opened
1 year ago
0
Steven Galbraith: Mathematics of Public Key Cryptography
#3
ssst0n3
opened
1 year ago
0
Steven Galbraith: Mathematics of Public Key Cryptography: 25. Isogenies of Elliptic Curves
#4
ssst0n3
opened
1 year ago
0