LEADER 04065nam 22008175 450 001 9910983309303321 005 20251116222222.0 010 $a9783031823800 010 $a303182380X 024 7 $a10.1007/978-3-031-82380-0 035 $a(CKB)37627741700041 035 $a(MiAaPQ)EBC31911837 035 $a(Au-PeEL)EBL31911837 035 $a(DE-He213)978-3-031-82380-0 035 $a(OCoLC)1503844792 035 $a(EXLCZ)9937627741700041 100 $a20250218d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNumber-Theoretic Methods in Cryptology $e4th International Conference, NuTMiC 2024, Szczecin, Poland, June 24?26, 2024, Revised Selected Papers /$fedited by Andrzej D?browski, Josef Pieprzyk, Jacek Pomyka?a 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (762 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14966 311 08$a9783031823794 311 08$a3031823796 327 $a -- Invited Talks. -- On the efficient representation of isogenies. -- Elliptic-curves factoring, witnesses and oracles. -- Elliptic Curves in Cryptography. -- On chains of pairing-friendly elliptic curves. -- Faster algorithms for isogeny computations over extensions of finite fields. -- Integral solutions of some systems of polynomial equations and constructing families of pairing-friendly elliptic curves with small ?-value. -- Number Theory. -- Algebraic Equipage for Learning with Errors in Cyclic Division Algebras. -- From Worst to Average Case to Incremental Search Bounds of the Strong Lucas Test. -- Algebraic Structures and Public-Key Cryptography. -- A New Public Key Cryptosystem Based on the Cubic Pell Curve. -- The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem. -- Compartment-based and Hierarchical Threshold Delegated Verifiable Accountable Subgroup Multi-signatures. -- Towards message recovery in NTRU Encryption with auxiliary data. 330 $aThis book constitutes the refereed post-conference proceedings of the 4th International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024, held in Szczecin, Poland, during June 24?26, 2024. The 9 full papers and 2 invited papers presented in this book were carefully reviewed and selected from 12 submissions. They were organized in topical sections as follows: invited talks; elliptic curves in cryptography; number theory; algebraic structures and public-key cryptography. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14966 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aAlgorithms 606 $aNumber theory 606 $aSoftware engineering 606 $aComputers 606 $aCryptology 606 $aDiscrete Mathematics in Computer Science 606 $aAlgorithms 606 $aNumber Theory 606 $aSoftware Engineering 606 $aComputing Milieux 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 0$aAlgorithms. 615 0$aNumber theory. 615 0$aSoftware engineering. 615 0$aComputers. 615 14$aCryptology. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aAlgorithms. 615 24$aNumber Theory. 615 24$aSoftware Engineering. 615 24$aComputing Milieux. 676 $a005.824 700 $aDa?browski$b Andrzej$00 701 $aPieprzyk$b Josef$0486892 701 $aPomyka?a$b Jacek$01784659 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910983309303321 996 $aNumber-Theoretic Methods in Cryptology$94316264 997 $aUNINA