Jeffrey Hoffstein Jill Pipher Joseph H. Silverman
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
President's Report
Newsletter Volume 42, No. 5 • SePTemBeR–oCT oBeR 2012 PRESIDENT’S REPORT AWM Prize Winners. I am pleased to announce the winners of two of the three major prizes given by AWM at the Joint Mathematics Meetings (JMM). The Louise Hay Award is given to Amy Cohen, Rutgers University, in recognition of The purpose of the Association her “contributions to mathematics education through her writings, her talks, and for Women in Mathematics is her outstanding service to professional organizations.” The Gweneth Humphreys • to encourage women and girls to Award is given to James Morrow, University of Washington, in recognition of study and to have active careers in his “outstanding achievements in inspiring undergraduate women to discover and the mathematical sciences, and • to promote equal opportunity and pursue their passion for mathematics.” I quote from the citations written by the the equal treatment of women and selection committees and extend warm congratulations to the honorees. These girls in the mathematical sciences. awards will be presented at the Prize Session at JMM 2013 in San Diego. Congratulations to Raman Parimala, Emory University, who will present the AWM Noether Lecture at JMM 2013, entitled “A Hasse Principle for Quadratic Forms over Function Fields.” She is honored for her groundbreaking research in theory of quadratic forms, hermitian forms, linear algebraic groups, and Galois cohomology. The Noether Lecture is the oldest of the three named AWM Lectures. (The Falconer Lecture is presented at MathFest, and the Sonia Kovalevsky at the SIAM Annual Meeting.) The first Noether Lecture was given by F. Jessie MacWilliams in 1980 in recognition of her fundamental contributions to the theory of error correcting codes. -
Calendar of AMS Meetings and Conferences
Calendar of AMS Meetings and Conferences This calendar lists all meetings and conferences approved prior to the date this insofar as is possible. Abstracts should be submitted on special forms which are issue went to press. The summer and annual meetings are joint meetings of the available in many departments of mathematics and from the headquarters office of Mathematical Association of America and the American Mathematical Society. The the Society. Abstracts of papers to be presented at the meeting must be received meeting dates which fall rather far in the future are subject to change; this is par at the headquarters of the Society in Providence, Rhode Island, on or before the ticularly true of meetings to which no numbers have been assigned. Programs of deadline given below for the meeting. The abstract deadlines listed below should the meetings will appear in the issues indicated below. First and supplementary be carefully reviewed since an abstract deadline may expire before publication of announcements of the meetings will have appeared in earlier issues. Abstracts a first announcement. Note that the deadline for abstracts for consideration for of papers presented at a meeting of the Society are published in the journal Ab presentation at special sessions is usually three weeks earlier than that specified stracts of papers presented to the American Mathematical Society in the issue below. For additional information, consult the meeting announcements and the list corresponding to that of the Notices which contains the program of the meeting, of special sessions. Meetings Abstract Program Meeting# Date Place Deadline Issue 876 * October 30-November 1 , 1992 Dayton, Ohio August 3 October 877 * November ?-November 8, 1992 Los Angeles, California August 3 October 878 * January 13-16, 1993 San Antonio, Texas OctoberS December (99th Annual Meeting) 879 * March 26-27, 1993 Knoxville, Tennessee January 5 March 880 * April9-10, 1993 Salt Lake City, Utah January 29 April 881 • Apnl 17-18, 1993 Washington, D.C. -
11 Digital Signatures
This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the following specific permissions for the electronic version of this book: Permission is granted to retrieve, print and store a single copy of this chapter for personal use. This permission does not extend to binding multiple chapters of the book, photocopying or producing copies for other than personal use of the person creating the copy, or making electronic copies available for retrieval by others without prior permission in writing from CRC Press. Except where over-ridden by the specific permission above, the standard copyright notice from CRC Press applies to this electronic version: Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher. The consent of CRC Press does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific permission must be obtained in writing from CRC Press for such copying. c 1997 by CRC Press, Inc. Chapter 11 Digital Signatures Contents in Brief 11.1 Introduction :::::::::::::::::::::::::::::425 11.2 A framework for digital signature mechanisms ::::::::::426 11.3 RSA and related signature schemes :::::::::::::::::433 11.4 Fiat-Shamir signature schemes :::::::::::::::::::447 11.5 The DSA and related signature schemes ::::::::::::::451 11.6 One-time digital signatures :::::::::::::::::::::462 11.7 Other signature schemes ::::::::::::::::::::::471 11.8 Signatures with additional functionality ::::::::::::::474 11.9 Notes and further references ::::::::::::::::::::481 11.1 Introduction This chapter considers techniques designed to provide the digital counterpart to a handwrit- ten signature. -
MPSAC Membership List
MATHEMATICAL AND PHYSICAL SCIENCES ADVISORY COMMITTEE MEMBERSHIP LIST Term Expires: 03/31/2021 Dr. Robert Bryant Duke University [email protected] Biographical Information: http://fds.duke.edu/db/aas/math/faculty/bryant/ Dr. William Zajc Columbia University [email protected] Biographical Information: http://www.nevis.columbia.edu/~zajc/MakeZajcCV.pdf Biographical Information on MPSAC members can be found at the publically available web sites indicated with each name. NSF is not responsible for the content of those web sites. MATHEMATICAL AND PHYSICAL SCIENCES ADVISORY COMMITTEE MEMBERSHIP LIST Term Expires: 09/30/2022 Dr. Susanne Brenner Louisiana State University [email protected] Biographical Information: https://www.math.lsu.edu/~brenner/ Dr. Lynne Hillenbrand California Institute of Technology [email protected] Biographical Information: http://www.astro.caltech.edu/~lah/Site/%40Caltech.html Biographical Information on MPSAC members can be found at the publically available web sites indicated with each name. NSF is not responsible for the content of those web sites. MATHEMATICAL AND PHYSICAL SCIENCES ADVISORY COMMITTEE MEMBERSHIP LIST Term Expires: 09/30/2021 Dr. Miguel Garcia-Garibay University of California, Los Angeles [email protected] Biographical Information https://www.chemistry.ucla.edu/directory/garcia-garibay-miguel Dr. Catherine Hunt University of Virginia [email protected] Biographical Information: https://engineering.virginia.edu/faculty/katie-hunt Dr. Andrew Millis Columbia University/Simons Foundation [email protected] [email protected] Biographical Information https://physics.columbia.edu/content/andrew-j-millis Biographical Information on MPSAC members can be found at the publically available web sites indicated with each name. NSF is not responsible for the content of those web sites. -
Program of the Sessions San Diego, California, January 9–12, 2013
Program of the Sessions San Diego, California, January 9–12, 2013 AMS Short Course on Random Matrices, Part Monday, January 7 I MAA Short Course on Conceptual Climate Models, Part I 9:00 AM –3:45PM Room 4, Upper Level, San Diego Convention Center 8:30 AM –5:30PM Room 5B, Upper Level, San Diego Convention Center Organizer: Van Vu,YaleUniversity Organizers: Esther Widiasih,University of Arizona 8:00AM Registration outside Room 5A, SDCC Mary Lou Zeeman,Bowdoin upper level. College 9:00AM Random Matrices: The Universality James Walsh, Oberlin (5) phenomenon for Wigner ensemble. College Preliminary report. 7:30AM Registration outside Room 5A, SDCC Terence Tao, University of California Los upper level. Angles 8:30AM Zero-dimensional energy balance models. 10:45AM Universality of random matrices and (1) Hans Kaper, Georgetown University (6) Dyson Brownian Motion. Preliminary 10:30AM Hands-on Session: Dynamics of energy report. (2) balance models, I. Laszlo Erdos, LMU, Munich Anna Barry*, Institute for Math and Its Applications, and Samantha 2:30PM Free probability and Random matrices. Oestreicher*, University of Minnesota (7) Preliminary report. Alice Guionnet, Massachusetts Institute 2:00PM One-dimensional energy balance models. of Technology (3) Hans Kaper, Georgetown University 4:00PM Hands-on Session: Dynamics of energy NSF-EHR Grant Proposal Writing Workshop (4) balance models, II. Anna Barry*, Institute for Math and Its Applications, and Samantha 3:00 PM –6:00PM Marina Ballroom Oestreicher*, University of Minnesota F, 3rd Floor, Marriott The time limit for each AMS contributed paper in the sessions meeting will be found in Volume 34, Issue 1 of Abstracts is ten minutes. -
Fault Analysis of the Ntrusign Digital Signature Scheme
Cryptogr. Commun. (2012) 4:131–144 DOI 10.1007/s12095-011-0061-3 Fault analysis of the NTRUSign digital signature scheme Abdel Alim Kamal · Amr M. Youssef Received: 11 December 2010 / Accepted: 14 December 2011 / Published online: 6 January 2012 © Springer Science+Business Media, LLC 2012 Abstract We present a fault analysis of the NTRUSign digital signature scheme. The utilized fault model is the one in which the attacker is assumed to be able to fault a small number of coefficients in a specific polynomial during the signing process but cannot control the exact location of the injected transient faults. For NTRUsign with parameters (N, q = pl, B, standard, N ), when the attacker is able to skip the norm-bound signature checking step, our attack needs one fault, ≈ − 1 (( )t) succeeds with probability 1 p and requires O qN steps when the number of faulted polynomial coefficients is upper bounded by t. The attack is also applicable to NTRUSign utilizing the transpose NTRU lattice but it requires double the number of fault injections. Different countermeasures against the proposed attack are investigated. Keywords Side channel attacks · Lattice-based public key cryptosystems · Fault analysis and countermeasures · Digital signature schemes · NTRU Mathematics Subject Classification (2010) 94A60 1 Introduction NTRUSign [1–4] is a parameterized family of lattice-based public key digital signa- ture schemes that is currently under consideration for standardization by the IEEE P1363 working group. It was proposed after the original NTRU signature scheme (NSS) [5] was broken [6, 7]. Similar to the GGH cryptosystem [8], the security of A. A. -
Subliminal Channels in High-Speed Signatures
Die approbierte Originalversion dieser Diplom-/ Masterarbeit ist in der Hauptbibliothek der Tech- nischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at institute of telecommunications The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng Subliminal Channels in High-Speed Signatures Master’s Thesis for obtaining the academic degree Diplom-Ingenieur as part of the study Electrical Engineering and Information Technology carried out by Alexander Hartl student number: 01125115 Institute of Telecommunications at TU Wien Supervision: Univ. Prof. Dipl.-Ing. Dr.-Ing. Tanja Zseby Dipl.-Ing. Robert Annessi, B.Sc Acknowledgments I want to express my gratitude for everyone who assisted or encouraged me in various ways during my studies. In particular, I would like to thank Prof. Tanja Zseby and Dipl.-Ing. Robert Annessi for giving me the opportunity to write this thesis, for supporting me actively while I was working on it and for many valuable comments and suggestions. I owe special thanks to my family, especially my parents Edith and Rudolf, for their endless support during all these years. Thank you, Sabrina, for encouraging me and for so many cheerful hours in my life. Abstract One of the fundamental building blocks for achieving security in data networks is the use of digital signatures. A digital signature is a bit string which allows the receiver of a message to ensure that the message indeed originated from the apparent sender and has not been altered along the path. -
Meetings & Conferences of The
Meetings & Conferences of the AMS IMPORTANT INFORMATION REGARDING MEETINGS PROGRAMS: AMS Sectional Meeting programs do not appear in the print version of the Notices. However, comprehensive and continually updated meeting and program information with links to the abstract for each talk can be found on the AMS website. See www.ams.org/meetings/. Final programs for Sectional Meetings will be archived on the AMS website accessible from the stated URL . Jill Pipher, Brown University, Harmonic analysis and New Brunswick, New elliptic boundary value problems. David Vogan, Department of Mathematics, MIT, Matri- Jersey ces almost of order two. Wei Zhang, Columbia University, The Euler product and Rutgers University the Taylor expansion of an L-function. November 14–15, 2015 Special Sessions Saturday – Sunday If you are volunteering to speak in a Special Session, you Meeting #1115 should send your abstract as early as possible via the ab- Eastern Section stract submission form found at www.ams.org/cgi-bin/ Associate secretary: Steven H. Weintraub abstracts/abstract.pl. Announcement issue of Notices: September 2015 Advances in Valuation Theory, Samar El Hitti, New York Program first available on AMS website: October 1, 2015 City College of Technology, City University of New York, Issue of Abstracts: Volume 36, Issue 4 Franz-Viktor Kuhlmann, University of Saskatchewan, and Deadlines Hans Schoutens, New York City College of Technology, For organizers: Expired City University of New York. For abstracts: Expired Algebraic Geometry and Combinatorics, Elizabeth Drel- lich, University of North Texas, Erik Insko, Florida Gulf The scientific information listed below may be dated. Coast University, Aba Mbirika, University of Wisconsin- For the latest information, see www.ams.org/amsmtgs/ Eau Claire, and Heather Russell, Washington College. -
Public-Key Cryptography
Public-key Cryptogra; Theory and Practice ABHIJIT DAS Department of Computer Science and Engineering Indian Institute of Technology Kharagpur C. E. VENIMADHAVAN Department of Computer Science and Automation Indian Institute ofScience, Bangalore PEARSON Chennai • Delhi • Chandigarh Upper Saddle River • Boston • London Sydney • Singapore • Hong Kong • Toronto • Tokyo Contents Preface xiii Notations xv 1 Overview 1 1.1 Introduction 2 1.2 Common Cryptographic Primitives 2 1.2.1 The Classical Problem: Secure Transmission of Messages 2 Symmetric-key or secret-key cryptography 4 Asymmetric-key or public-key cryptography 4 1.2.2 Key Exchange 5 1.2.3 Digital Signatures 5 1.2.4 Entity Authentication 6 1.2.5 Secret Sharing 8 1.2.6 Hashing 8 1.2.7 Certification 9 1.3 Public-key Cryptography 9 1.3.1 The Mathematical Problems 9 1.3.2 Realization of Key Pairs 10 1.3.3 Public-key Cryptanalysis 11 1.4 Some Cryptographic Terms 11 1.4.1 Models of Attacks 12 1.4.2 Models of Passive Attacks 12 1.4.3 Public Versus Private Algorithms 13 2 Mathematical Concepts 15 2.1 Introduction 16 2.2 Sets, Relations and Functions 16 2.2.1 Set Operations 17 2.2.2 Relations 17 2.2.3 Functions 18 2.2.4 The Axioms of Mathematics 19 Exercise Set 2.2 20 2.3 Groups 21 2.3.1 Definition and Basic Properties . 21 2.3.2 Subgroups, Cosets and Quotient Groups 23 2.3.3 Homomorphisms 25 2.3.4 Generators and Orders 26 2.3.5 Sylow's Theorem 27 Exercise Set 2.3 29 2.4 Rings 31 2.4.1 Definition and Basic Properties 31 2.4.2 Subrings, Ideals and Quotient Rings 34 2.4.3 Homomorphisms 37 2.4.4 -
Assistantships and Graduate Fellowships in the Mathematical Sciences
2011 Assistantships and Graduate Fellowships in the Mathematical Sciences American Mathematical Society Compiled under the direction of the Annual Survey Data Committee, sponsored by the AMS, ASA, IMS, MAA, and SIAM This publication is under the direction of the AMS-ASA-IMS-MAA-SIAM Annual Survey Data Committee. Members of the committee are: Pam Arroway, Richard Cleary (chair), Steven Dunbar, Susan Geller, Boris Hasselblatt, Abbe H. Herzig, Ellen Kirkman, Peter March, James W. Maxwell (ex officio), David Morrison, and Bart Ng. ISSN 1040-7650 ISBN-13: 978-0-8218-6897-3 c Copyright 2011 by the American Mathematical Society Printed in the United States of America All rights reserved ∞ The paper in this publication is acid-free and falls within the guidelines established to ensure permanence and durability. This publication was typeset using the TEX typesetting system. Visit the AMS website at URL: http://www.ams.org 10987654321 161514131211 ii CONTENTS Foreword v Current Employment Trends in the Mathematical Sciences vii Introduction Organization of This Book xi Assistantships and Graduate Fellowships 1 iii FOREWORD This is the twenty-fourth issue of Assistantships and Graduate Fellowships in the Mathematical Sciences (A&GF). This publication is primarily intended as a conve- nient source of comparative information on graduate programs in the mathematical sciences for prospective graduate students and their advisors. Its contents will also be useful to others in the mathematical community who are interested in support patterns for graduate education. The A&GF is a complement to the annual Society publication, Mathematical Sciences Professional Directory. Information in the A&GF was provided by departments in response to a survey questionnaire mailed in late spring 2011. -
Efficient Implementations of Attribute-Based Credentials on Smart Cards
Efficient Implementations of Attribute-based Credentials on Smart Cards Pim Vullers Copyright c 2014 Pim Vullers IPA Dissertation Series: 2014-15 ISBN: 978-94-6259-376-3 NUR: 980 Typeset using LATEX 2ε (TEXLive 2013) Cover design by Koen Vullers Printed by Ipskamp Drukkers (http://proefschriften.net/) The work in this thesis has been carried out under the auspices of the research school IPA (Institute for Programming research and Algorithmics). The author was employed at the Radboud University Nijmegen. This research was sponsored by Trans Link Systems / Open Ticketing. This work is licensed under the Creative Commons Attribution-ShareAlike 4.0 International license. To view a copy of this license, please visit http://creativecommons.org/licenses/by-sa/4.0/. Efficient Implementations of Attribute-based Credentials on Smart Cards Proefschrift ter verkrijging van de graad van doctor aan de Radboud Universiteit Nijmegen op gezag van de rector magnificus prof. dr. Th.L.M. Engelen, volgens besluit van het college van decanen in het openbaar te verdedigen op vrijdag 28 november 2014 om 10.30 uur precies. door Pim Vullers geboren op 20 juni 1986 te Venlo Promotor: Prof. dr. B.P.F. Jacobs Manuscriptcommissie: Prof. dr. E.R. Verheul Prof. dr. S. Mauw Université du Luxembourg, Luxemburg Prof. dr. ir. B. de Decker KU Leuven, België Dr. G. Neven IBM Research Zürich, Zwitserland Dr. ir. E. Poll Samenvatting We leven in een wereld waarin computers een steeds grotere rol spelen. Daarom wordt het alsmaar belangrijker om gebruikers en objecten digitaal te kunnen iden- tificeren. Om dit te bereiken gebruiken veel bestaande systemen unieke nummers, denk bijvoorbeeld aan je burgerservicenummer (BSN). -
User Manual V.1.3 (“NTRU Release”) 1 What Is Goldbug?
Secure Instant Messenger User Manual v.1.3 (“NTRU Release”) http://goldbug.sf.net 1 What is GoldBug? GoldBug is a secure Instant Messenger. You can be sure with using GoldBug (GB), that no third party can look into your chat communication. Private user-to-user communication remains private. GoldBug therefore uses strong multi-encryption with different layers of modern encryption technologies of well known and revised crypto libraries (like libgcrypt (GnuPG) and OpenSSL). For example it generates more than 8 public / private encryption keys based on RSA or NTRU or ElGamal. The app offers as well decentral and encrypted Email and decentral public E*IRC-Chat. As in every Messenger, you can share and transfer files. With tools like Rosetta Cryptopad and/or the File-Encryption tool you can convert text and files into ciphertext. 2 Why encryption matters: Today mostly every WIFI is protected with a password. In a few years as well every plaintext message or email to friends over the internet will be encrypted too. It is not a question to have something to hide or not, • it is a question to control by yourself the security of your communications - or having it controled by others. • It‘ s a question of free thinking and • taking away the presumption of innocence.*) • Democracy requires the thinking and debate of alternatives in private and public. "The question is not 'do you have something to hide?' Strong-Multi-Encryption ensures the The question is whether we control declaration of human rights in broad constitutional consensi and is a digital or they controls us." - Oliver Stone self-defense, everyone needs to learn http://www.youtube.com/watch?v=0U37hl0n9mY and utilize.