Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 79.

Add to Quick Collection   All 79 Results

Sort:
 Add All Items to Quick Collection
Date: 2013
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/221647
Description: 4 page(s)
Reviewed: Reviewed
Date: 2013
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/224276
Description: We present a collection of several natural questions about elliptic curves, mostly over finite fields, that have led to some interesting number theoretic questions and whose solutions require rather i ... More
Date: 2013
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/221564
Description: At Crypto 2010, Brier et al. proposed the first construction of a hash function into ordinary elliptic curves that was indifferentiable from a random oracle, based on Icart's deterministic encoding fr ... More
Reviewed: Reviewed
Date: 2013
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/231936
Description: We obtain a more precise version of an asymptotic formula of A. Dubickas for the number of monic Eisenstein polynomials of fixed degree d and of height at most H, as H → ∞. In particular, we give an e ... More
Reviewed: Reviewed
Date: 2013
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/221905
Description: We study the security of the linear generator over a finite field. It is shown that the seed of a linear generator can be deduced from partial information of a short sequence of consecutive outputs of ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/202843
Description: We consider the problem of recovering a hidden element s of a finite field Fq of q elements from queries to an oracle that for a given x ∈ Fq returns (x+s)e for a given divisor e | q - 1. We use some ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/172505
Description: We give an upper bound on the number of finite fields over which elliptic curves of cryptographic interest with a given embedding degree and small complex multiplication discriminant may exist, and pr ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/177143
Description: We obtain a new estimate on the discrepancy of the power generator over a part of the period that improves several previous results. We also introduce a multidimensional analogue and show that the cor ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/174485
Description: 6 page(s)
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/183072
Description: 14 page(s)
Reviewed: Reviewed
Date: 2011
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/134918
Description: We modify the approach of H. Niederreiter and I. E. Shparlinski and improve one of their results on the distribution of inversive congruential pseudorandom numbers over a finite field for almost all i ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2011
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/146993
Description: We obtain some theoretical and experimental results concerning various properties (the number of fixed points, image distribution, cycle lengths) of the dynamical system naturally associated with Ferm ... More
Reviewed: Reviewed
Date: 2011
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/146987
Description: 16 page(s)
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/119857
Description: 8 page(s)
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/126837
Description: In this paper we investigate the asymptotic effectiveness of the Gaudry–Hess–Smart Weil descent attack and its generalization to the discrete logarithm problem for elliptic curves over characteristic- ... More
Full Text: Full Text
Reviewed: Reviewed