WorldCat Identities

Galbraith, Steven D.

Overview
Works: 51 works in 126 publications in 2 languages and 3,338 library holdings
Genres: Conference papers and proceedings  Academic theses 
Roles: Author, Editor, 958, Creator, Opponent, Contributor
Classifications: QA268, 003.54
Publication Timeline
.
Most widely held works by Steven D Galbraith
Mathematics of public key cryptography by Steven D Galbraith( )

16 editions published between 2011 and 2012 in English and held by 1,080 WorldCat member libraries worldwide

"Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students and researchers in mathematics, computer science and electrical engineering. Carefully written to communicate the major ideas and techniques of public key cryptography to a wide readership, this text is enlivened throughout with historical remarks and insightful perspectives on the development of the subject. Numerous examples, proofs and exercises make it suitable as a textbook for an advanced course, as well as for self-study. For more experienced researchers it serves as a convenient reference for many important topics: the Pollard algorithms, Maurer reduction, isogenies, algebraic tori, hyperelliptic curves and many more."--Provided by publisher
Cryptography and coding : 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 : proceedings by Steven D Galbraith( )

14 editions published in 2007 in English and held by 559 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007. The 22 revised full papers presented together with 2 invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation
Pairing-based cryptography - Pairing 2008 : second international conference, Egham, UK, September 1-3, 2008 ; proceedings by David Hutchison( )

15 editions published in 2008 in English and held by 499 WorldCat member libraries worldwide

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008. The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation
Progress in Cryptology - INDOCRYPT 2012 : 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012 ; proceedings by Steven D Galbraith( )

14 editions published in 2012 in English and held by 398 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols
Advances in Cryptology - ASIACRYPT 2018 : 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, proceedings by International Conference on the Theory and Application of Cryptology and Information Security( )

8 editions published in 2018 in English and held by 347 WorldCat member libraries worldwide

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations
Advances in cryptology - ASIACRYPT 2018 : 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2-6, 2018 : proceedingsnPart 2 by International Conference on the Theory and Application of Cryptology and Information Security( )

3 editions published in 2018 in English and held by 174 WorldCat member libraries worldwide

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations
Marketing in Israel by Steven D Galbraith( Book )

3 editions published in 1988 in English and held by 82 WorldCat member libraries worldwide

Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008. Proceedings by David Hutchison( )

2 editions published in 2008 in English and held by 13 WorldCat member libraries worldwide

Cryptography and Coding by Steven D Galbraith( )

3 editions published in 2007 in English and held by 12 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007. The 22 revised full papers presented together with 2 invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation
Equations for modular curves by Steven D Galbraith( Book )

3 editions published in 1996 in English and held by 5 WorldCat member libraries worldwide

Arithmetic on superelliptic curves by Steven D Galbraith( Book )

3 editions published in 1998 in English and held by 4 WorldCat member libraries worldwide

Anneaux d'endomorphismes en cryptographie by Gaëtan Bisson( )

2 editions published in 2011 in French and held by 2 WorldCat member libraries worldwide

Modern communications heavily rely on cryptography to ensure data integrity and privacy. Over the past two decades, very efficient, secure, and featureful cryptographic schemes have been built on top of abelian varieties defined overfinite fields. This thesis contributes to several computational aspects of ordinary abelian varieties related to their endomorphism ring structure. This structure plays a crucial role in the construction of abelian varieties with desirable properties, such as pairings, and we show that more such varieties can be constructed than expected. We also address the inverse problem, that of computing the endomorphism ring of a prescribed abelian variety. Prior state-of-the-art methods could only solve this problem in exponential time, and we design several algorithms of subexponential complexityfor solving it in the ordinary case. For elliptic curves, we rigorously bound the complexity of our algorithms assuming solely the extended Riemann hypothesis, and demonstrate that they are very effective in practice. As a subroutine, we design in particular a memory-less algorithm to solve a generalization of the subset sum problem. We also generalize our method to higher-dimensional abelian varieties. Practically speaking, we develop a library enabling the computation of isogenies between abelian varieties; this building block enables us to apply a generalization of our algorithm to cases that were previously not computable
The mathematics of public key cryptography by Steven D Galbraith( )

1 edition published in 2012 in English and held by 2 WorldCat member libraries worldwide

This advanced graduate textbook gives an authoritative and insightful description of the major ideas and techniques of public key cryptography
Cryptography and coding proceedings( )

1 edition published in 2007 in English and held by 2 WorldCat member libraries worldwide

Pairing-based cryptography - Pairing 2007 : second international conference, Egham UK, September 1-3, 2008 ; proceedings by International Conference on Pairing-Based Cryptography( Book )

1 edition published in 2008 in English and held by 2 WorldCat member libraries worldwide

Pairing-Based Cryptography Pairing 2008 00 : Second International Conference, Egham, UK, September 1-3, 2008. Proceedings( )

2 editions published in 2008 in English and held by 2 WorldCat member libraries worldwide

Advances in Cryptology {u2013} ASIACRYPT 2018 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2{u2013}6, 2018, Proceedings, Part I( )

1 edition published in 2018 in English and held by 2 WorldCat member libraries worldwide

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.43 (from 0.18 for Mathematic ... to 0.95 for Pairing-Ba ...)

Cryptography and coding : 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 : proceedings Cryptography and coding proceedings
Covers
Pairing-based cryptography - Pairing 2008 : second international conference, Egham, UK, September 1-3, 2008 ; proceedingsCryptography and coding proceedingsPairing-based cryptography - Pairing 2007 : second international conference, Egham UK, September 1-3, 2008 ; proceedings
Alternative Names
Galbraith, S.

Galbraith, S. 1968-

Galbraith, S. D.

Galbraith, S. D. 1968-

Galbraith, St. D.

Galbraith, St. D. 1968-

Galbraith, Stephen

Galbraith, Stephen 1968-

Galbraith, Stephen D.

Galbraith, Stephen D. 1968-

Galbraith, Steven.

Galbraith, Steven 1968-

Galbraith, Steven D.

Steven D. Galbraith New Zealand mathematician and cryptographer

Languages
English (93)

French (2)