Cryptographic implications of Hess' generalized GHS attack (Q2502169): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00200-005-0186-8 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2112566740 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4847910 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A general framework for subexponential discrete logarithm algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2712108 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing Isogenies between Elliptic Curves Over Finite Fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737234 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374896 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: A double large prime variation for small genus hyperelliptic index calculus / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing Riemann-Roch spaces in algebraic function fields and related topics. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reducing elliptic curve logarithms to logarithms in a finite field / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724449 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallel collision search with cryptanalytic applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Monte Carlo Methods for Index Computation (mod p) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4217446 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Evaluation of discrete logarithms in a group of 𝑝-torsion points of an elliptic curve in characteristic 𝑝 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The discrete logarithm problem on elliptic curves of trace one / rank
 
Normal rank
Property / cites work
 
Property / cites work: On random walks for Pollard's rho method / rank
 
Normal rank

Latest revision as of 19:08, 24 June 2024

scientific article
Language Label Description Also known as
English
Cryptographic implications of Hess' generalized GHS attack
scientific article

    Statements

    Cryptographic implications of Hess' generalized GHS attack (English)
    0 references
    0 references
    0 references
    12 September 2006
    0 references
    Elliptic curve cryptography
    0 references
    Weil descent
    0 references
    isogenies
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references