Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2021, Director: Artur Travesa i Grau[en] The aim of this project is to give an overview of the field of mathematical cryptography through the lenses of asymmetric protocols based on the Discrete Logarithm Problem over imaginary quadratic fields. The mathematical foundation is illustrated with the study of quadratic orders and their class groups, which are the relevant algebraic infrastructure for a Diffie-Hellman-type protocol known as Buchmann-Willams cryptosystem. The relationship between quadratic orders and binary quadratic forms is exploited to develop and explain the computational aspect of cryptography, providing convenient ways of machi...
Discrete logarithm-based cryptography has sustained many studies in the last decade. Lenstra and Ver...
This thesis studies the implications of using public key cryptographic primitives that are based in,...
La cryptographie à base de réseaux euclidiens vise à faire reposer la sécurité des primitives crypto...
Imaginary quadratic fields were first suggested as a setting for public-key cryptography by Buchmann...
International audienceWe describe implementations for solving the discrete logarithm problem in the ...
Public key cryptography aims at providing efficient, versatile, and secure solutions to protect comp...
We describe here a key-exchange protocol over real quadratic fields. This is accompanied by all the ...
The purpose of this thesis is to study the complexity of the discrete logarithm problem (DLP) and re...
We present a key exchange scheme similar to that of Diffie and Hellman using the infrastructure of q...
Les cryptosystèmes dits à clé publique sont construits à l'aide de fonctions à sens unique qui assur...
peer reviewedWe describe a public key cryptosystem which works in quadratic function fields of chara...
We present a new cryptosystem based on ideal arithmetic in quadratic orders. The method of our trapd...
This thesis gives an overview of Multivariate Quadratic polynomial equations and their use in public...
The aim of the paper is the study of Permutation Polynomials over finite fields and their applicatio...
We describe the first polynomial time chosen-plaintext to-tal break of the NICE family of cryptosyst...
Discrete logarithm-based cryptography has sustained many studies in the last decade. Lenstra and Ver...
This thesis studies the implications of using public key cryptographic primitives that are based in,...
La cryptographie à base de réseaux euclidiens vise à faire reposer la sécurité des primitives crypto...
Imaginary quadratic fields were first suggested as a setting for public-key cryptography by Buchmann...
International audienceWe describe implementations for solving the discrete logarithm problem in the ...
Public key cryptography aims at providing efficient, versatile, and secure solutions to protect comp...
We describe here a key-exchange protocol over real quadratic fields. This is accompanied by all the ...
The purpose of this thesis is to study the complexity of the discrete logarithm problem (DLP) and re...
We present a key exchange scheme similar to that of Diffie and Hellman using the infrastructure of q...
Les cryptosystèmes dits à clé publique sont construits à l'aide de fonctions à sens unique qui assur...
peer reviewedWe describe a public key cryptosystem which works in quadratic function fields of chara...
We present a new cryptosystem based on ideal arithmetic in quadratic orders. The method of our trapd...
This thesis gives an overview of Multivariate Quadratic polynomial equations and their use in public...
The aim of the paper is the study of Permutation Polynomials over finite fields and their applicatio...
We describe the first polynomial time chosen-plaintext to-tal break of the NICE family of cryptosyst...
Discrete logarithm-based cryptography has sustained many studies in the last decade. Lenstra and Ver...
This thesis studies the implications of using public key cryptographic primitives that are based in,...
La cryptographie à base de réseaux euclidiens vise à faire reposer la sécurité des primitives crypto...