Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Alfred Menezes

From Wikipedia, the free encyclopedia
Canadian cryptographer
Alfred Menezes
Born
Alfred J. Menezes

1965 (age 60–61)[1]
OccupationsMathematician
Cryptographer
Known forMOV attack onECC
MQV key agreement, co-founder ofCentre for Applied Cryptographic Research
Academic background
Alma materUniversity of Waterloo (B.Math, 1987; M.Math, 1989; Ph.D., 1992)
Doctoral advisorScott Vanstone
Academic work
InstitutionsUniversity of Waterloo

Alfred Menezes is co-author of several books oncryptography, including theHandbook of Applied Cryptography, and is a professor of mathematics at theUniversity of Waterloo inCanada.[2]

Education

[edit]

Alfred Menezes' family is fromGoa, a state in western India, but he was born inTanzania and grew up inKuwait except for a few years at a boarding school in India. His undergraduate and post-graduate degrees are from theUniversity of Waterloo.[3]: 302 

Academic career

[edit]

After five years teaching atAuburn University, in 1997 he returned to the University of Waterloo, where he is now a professor of mathematics in the Department of Combinatorics and Optimization. He co-founded and is a member of theCentre for Applied Cryptographic Research, and has served as its Managing Director.[4] Menezes' main areas of research areElliptic Curve Cryptography (ECC),provable security, and related areas. He is a Canadian citizen.

Menezes' bookElliptic Curve Public Key Cryptosystems, published in 1993,[5] was the first book devoted entirely to ECC. He co-authored the widely-used reference bookHandbook of Applied Cryptography.[6]

In 2001 Menezes won theHall Medal of theInstitute of Combinatorics and its Applications.

Menezes has been a conference organizer or program committee member for approximately fifty conferences on Cryptography.[7] He was Program Chair for Crypto 2007, and in 2012 he was an invited speaker at Eurocrypt.[8]

Menezes, in co-operation withNeal Koblitz, authored a series ofAnother Look papers that describe errors or weaknesses in existing security proofs, the first beingAnother look at HMAC (2013). The two now maintain a website dedicated to this type of papers.[9]

Books

[edit]

Selected publications

[edit]
  • "Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields" (with G. Adj, I. Canales-Martinez, N. Cruz-Cortes, T. Oliveira, L. Rivera-Zamarripa and F. Rodriguez-Henriquez), Cryptology ePrint Archive: Report 2016/914.https://eprint.iacr.org/2016/914
  • "Another look at tightness II: Practical issues in cryptography" (with S. Chatterjee, N. Koblitz and P. Sarkar), Mycrypt 2016, Lecture Notes in Computer Science, 10311 (2017), 21–55.doi:10.1007/978-3-319-61273-7_3
  • "Another look at HMAC" (with N. Koblitz), Journal of Mathematical Cryptology, 7 (2013), 225–251.doi:10.1515/jmc-2013-5004
  • "Elliptic curve cryptography: The serpentine course of a paradigm shift" (with A. H. Koblitz and N. Koblitz), Journal of Number Theory, 131 (2011), 781–814.doi:10.1016/j.jnt.2009.01.006
  • "Another look at 'provable security'" (with N. Koblitz), Journal of Cryptology, 20 (2007), 3–37.doi:10.1007/s00145-005-0432-z
  • "An efficient protocol for authenticated key agreement" (with L. Law, M. Qu, J. Solinas and S. Vanstone), Designs, Codes and Cryptography, 28 (2003), 119–134.doi:10.1023/A:1022595222606
  • "Solving elliptic curve discrete logarithm problems using Weil descent" (with M. Jacobson and A. Stein), Journal of the Ramanujan Mathematical Society, 16 (2001), 231–260.
  • "The elliptic curve digital signature algorithm (ECDSA)" (with D. Johnson and S. Vanstone), International Journal on Information Security, 1 (2001), 36–63.doi:10.1007/s102070100002
  • "Analysis of the Weil descent attack of Gaudry, Hess and Smart" (with M. Qu), Topics in Cryptology – CT-RSA 2001, Lecture Notes in Computer Science, 2020 (2001), 308–318.doi:10.1007/3-540-45353-9_23
  • "Unknown key-share attacks on the station-to-station (STS) protocol" (with S. Blake-Wilson), Proceedings of PKC '99, Lecture Notes in Computer Science, 1560 (1999), 154–170.doi:10.1007/3-540-49162-7_12
  • "Reducing elliptic curve logarithms to logarithms in a finite field" (with T. Okamoto and S. Vanstone), IEEE Transactions on Information Theory, 39 (1993), 1639–1646.doi:10.1109/18.259647

See also

[edit]

References

[edit]
  1. ^Cf.Library of Congress catalog data
  2. ^"Alfred Menezes: Mini-biography",Certicom company website
  3. ^Koblitz, Neal (2008).Random Curves: Journeys of a Mathematician. Springer-Verlag.ISBN 9783540740773.
  4. ^"Alfred Menezes". Archived fromthe original on 13 April 2018. Retrieved11 April 2018.
  5. ^Menezes, Alfred J. (1993).Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publisher.ISBN 9780792393689.
  6. ^Menezes, Alfred J.; van Oorschot, Paul; Vanstone, Scott A. (1996).Handbook of Applied Cryptography.CRC Press.ISBN 0-8493-8523-7.
  7. ^"Professional Activities". Archived fromthe original on 6 June 2018. Retrieved11 April 2018.
  8. ^"Another look at provable security".YouTube. 4 July 2012.Archived from the original on 2021-12-22. Retrieved11 April 2018.
  9. ^Neal, Koblitz; Alfred, Menezes."Another Look at Provable Security".www.math.uwaterloo.ca.

External links

[edit]
International
National
Academics
People
Other
Retrieved from "https://en.wikipedia.org/w/index.php?title=Alfred_Menezes&oldid=1336910680"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp