Isolated elliptic curves and the MOV attack (Q1676235): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Heuristic Asymptotic Formula Concerning the Distribution of Prime Numbers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modular polynomials via isogeny volcanoes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Integer-Valued Polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3139838 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Handbook of Elliptic and Hyperelliptic Curve Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the embedding degree of reductions of an elliptic curve / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4920301 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Gaussian primes / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Limitations to the equi-distribution of primes. IV / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using a parity-sensitive sieve to count prime values of a polynomial / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3578286 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Expander graphs based on GRH with an application to elliptic curve cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Subexponential Algorithm for Evaluating Large Degree Isogenies / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3191615 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic curve cryptography: the serpentine course of a paradigm shift / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3561288 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4135671 / rank
 
Normal rank
Property / cites work
 
Property / cites work: MOV attack in various subgroups on elliptic curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reducing elliptic curve logarithms to logarithms in a finite field / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic implications of Hess' generalized GHS attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithmic Number Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Eisenstein primes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Choosing the correct elliptic curve in the CM method / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sur certaines hypothèses concernant les nombres premiers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Nonsingular plane cubic curves over finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5301801 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Arithmetic of Elliptic Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: The discrete logarithm problem on elliptic curves of trace one / rank
 
Normal rank
Property / cites work
 
Property / cites work: Isogeny volcanoes / rank
 
Normal rank

Latest revision as of 15:50, 14 July 2024

scientific article
Language Label Description Also known as
English
Isolated elliptic curves and the MOV attack
scientific article

    Statements

    Isolated elliptic curves and the MOV attack (English)
    0 references
    0 references
    6 November 2017
    0 references
    elliptic curves
    0 references
    isogenies
    0 references
    isolated curves
    0 references
    embedding degree
    0 references
    cryptography
    0 references
    distribution of primes
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references