Cryptology ePrint Archive: Report 2004/072
Available versions in chronological order
20040303:142752 (posted 03-Mar-2004 14:27:52 UTC)
Asymmetric Cryptography: Hidden Field Equations
Christopher Wolf and Bart Preneel
Publication Info: ECCOMAS 2004, Finland
20040303:173641 (posted 03-Mar-2004 17:36:41 UTC)
Asymmetric Cryptography: Hidden Field Equations
Christopher Wolf and Bart Preneel
Publication Info: ECCOMAS 2004, Finland
20040303:173856 (posted 03-Mar-2004 17:38:56 UTC)
Asymmetric Cryptography: Hidden Field Equations
Christopher Wolf and Bart Preneel
Publication Info: ECCOMAS 2004, Finland
20040303:173914 (posted 03-Mar-2004 17:39:14 UTC)
Asymmetric Cryptography: Hidden Field Equations
Christopher Wolf and Bart Preneel
Publication Info: ECCOMAS 2004, Finland
20040303:174004 (posted 03-Mar-2004 17:40:04 UTC)
Asymmetric Cryptography: Hidden Field Equations
Christopher Wolf and Bart Preneel
Publication Info: ECCOMAS 2004, Finland
20040303:174026 (posted 03-Mar-2004 17:40:26 UTC)
Asymmetric Cryptography: Hidden Field Equations
Christopher Wolf and Bart Preneel
Publication Info: ECCOMAS 2004, Finland
20040325:164021 (posted 25-Mar-2004 16:40:21 UTC)
Asymmetric Cryptography: Hidden Field Equations
Christopher Wolf and Bart Preneel
Publication Info: ECCOMAS 2004, Finland
20040528:082846 (posted 28-May-2004 08:28:46 UTC)
Asymmetric Cryptography: Hidden Field Equations
Christopher Wolf and Bart Preneel
Publication Info: ECCOMAS 2004, Finland
20040628:132534 (posted 28-Jun-2004 13:25:34 UTC)
Asymmetric Cryptography: Hidden Field Equations
Christopher Wolf and Bart Preneel
Publication Info: ECCOMAS 2004, Finland
20050806:144437 (posted 06-Aug-2005 14:44:37 UTC)
Asymmetric Cryptography: Hidden Field Equations
Christopher Wolf and Bart Preneel
Publication Info: Preliminary version published at ECCOMAS 2004--- European Congress on Computational Methods in Applied Sciences and Engineering; P. Neittaanm{\"a}ki, T. Rossi, S. Korotov, E. O\~nate, J. P\'eriaux, and D. Kn\"orzer (eds.); Jyv{\"a}skyl{\"a}, 24--28 July 2004, 2004.
[
Cryptology ePrint archive
]