1999 Technical Reports
1999 Technical Reports

C. Colbourn, J. Dinitz and D. Stinson
Applications of Combinatorial Designs to Communications,
Cryptography, and Networking
ps
CORR 9901

A. Enge
Computing Discrete Logarithms in HighGenus Hyperelliptic
Jacobians in Provably Subexponential Time
ps
CORR 9904

J. Silverman
The Xedni Calculus and the Elliptic Curve Discrete Logarithm Problem
ps
CORR 9905

M. Jacobson, N. Koblitz, J. Silverman, A. Stein and E. Teske
Analysis of the Xedni Calculus Attack
ps
CORR 9906

D. Stinson
Some BabyStep GiantStep Algorithms for the Low Hamming Weight
Discrete Logarithm Problem
ps
CORR 9907

A. Stein and E. Teske
Catching Kangaroos in Function Fields
ps
CORR 9909

D. Stinson and R. Wei
Determining the Maximum Consistent Set of Shares in a Threshold Scheme
ps
CORR 9910

S. Jiang, Z. Dai and G. Gong
Notes on qary Interleaved Sequences
ps
CORR 9912

G. Gong, Z. Dai and S. Golomb
Enumeration and Criteria for Cyclically ShiftDistinct GMW Sequences
ps
CORR 9913

D. Stinson and R. Wei
Unconditionally Secure Proactive Secret Sharing Scheme with
Combinatorial Structures
ps
CORR 9914

A. Stein
Introduction to Continued Fraction Expansions in Real Quadratic
Function Fields
ps
CORR 9916

A. Stein
Infrastructure in Real Quadratic Function Fields
ps
CORR 9917

M. Jacobson and H. Williams
The Size of the Fundamental Solutions of Consecutive Pell Equations
ps
CORR 9918

A. Stein
Sharp Upper Bounds for Arithmetics in Hyperelliptic Function Fields
ps
CORR 9923

A. Stein and E. Teske
Explicit Bounds and Heuristics on Class Numbers in Hyperelliptic
Function Fields
ps
CORR 9926

Y. Wang
Linear Complexity Versus Pseurorandomness:
On Beth and Dai's Result
ps
CORR 9927

G. Gong, Z. Dai and D. Ye
Decomposition and Classification of Cascaded GMW Functions
ps
CORR 9929

T. Cusick and G. Gong
A Conjecture on Binary Sequences with the "Trinomial Property"
ps
CORR 9930

M. Jacobson and H. Williams
New Quadratic Polynomials with High Densities of Prime Values
ps
CORR 9932

D. Johnson and A. Menezes
The Elliptic Curve Digital Signature Algorithm (ECDSA)
ps,
pdf
CORR 9934

W. Martin
Minimum Distance Bounds for sRegular Codes
ps
CORR 9938

J. Solinas
Generalized Mersenne Numbers
ps,
pdf
CORR 9939

S. Blackburn and S. Galbraith
Certification of Secure RSA Keys
ps
CORR 9944

R. Scheidler
Ideal Arithmetic and Infrastructure in Purely Cubic Function Fields
ps
CORR 9945

J. Solinas
Improved Algorithms for Arithmetic on Anomalous Binary Curves
ps,
pdf
CORR 9946

K. Kurosawa, T. Johansson and D. Stinson
Almost kwise Independent Sample Spaces and Their Cryptographic
Applications
ps
CORR 9948

S. Galbraith and J. McKee
The Probability that the Number of Points on an Elliptic Curve
Over a Finite Field is Prime
ps
CORR 9951

R. Scheidler
Cryptography in Quadratic Function Fields
ps
CORR 9953

W. Banks, F. Griffin, D. Lieman and I. Shparlinski
NonLinear Complexity of the NaorReingold Pseudorandom Function
ps
CORR 9954

P. Eisen and D. Stinson
Threshold Visual Cryptography Schemes With Specified Whiteness
Levels of Reconstructed Pixels
ps
CORR 9957

M. Jacobson
Computing Discrete Logarithms in Quadratic Orders
ps
CORR 9958

G. Gong
Discrepancy Transforms and their Applications
ps
CORR 9960

S. Golomb, G. Gong and L. Mittenthal
Constructions of Orthomorphisms of Z_2^n
ps
CORR 9961

A. Youssef and G. Gong
On the Interpolation Attacks on Block Ciphers
ps
CORR 9964
