An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)

From MaRDI portal
Revision as of 10:33, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4154061

DOI10.1109/TIT.1978.1055817zbMath0375.68023WikidataQ56784431 ScholiaQ56784431MaRDI QIDQ4154061

Stephen C. Pohlig, Martin Edward Hellman

Publication date: 1978

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)




Related Items (only showing first 100 items - show all)

Constructing hyperelliptic curves of genus 2 suitable for cryptographyUsing partial smoothness of 𝑝-1 for factoring polynomials modulo 𝑝Security analysis of discrete logarithm based cryptosystemsA DSA-like digital signature protocolDiffie-Hellman OraclesAlgorithms for Black-Box Fields and their Application to CryptographyInsecure primitive elements in an ElGamal signature protocolConstruction of CM Picard curvesPoint counting on Picard curves in large characteristicAnalysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite DegreeOn the Security of OSIDHSubgroup Security in Pairing-Based CryptographyFast subgroup membership testings for \(\mathbb{G}_1, \mathbb{G}_2\) and \(\mathbb{G}_T\) on pairing-friendly curvesBreaking SIDH in polynomial timeDiSSECT: distinguisher of standard and simulated elliptic curves via traitsMiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative ComplexityFaster Privacy-Preserving Location Proximity SchemesCryptographic multilinear maps using pro-\(p\) groupsAn analysis of the algebraic group modelOn the discrete logarithm problem in finite fields of fixed characteristicComputing integral points on hyperelliptic curves using quadratic ChabautyEfficient Finite Fields in the Maxima Computer Algebra SystemEncoding-Free ElGamal-Type Encryption Schemes on Elliptic CurvesA simplified approach to rigorous degree 2 elimination in discrete logarithm algorithmsUnnamed ItemAn Identity-Based Key Agreement Protocol for the Network LayerConstructing nonresidues in finite fields and the extended Riemann hypothesisOn Relationship of Computational Diffie-Hellman Problem and Computational Square-Root Exponent ProblemON BOUNDS FOR BALANCED EMBEDDING DEGREEEvaluation of discrete logarithms in a group of 𝑝-torsion points of an elliptic curve in characteristic 𝑝Performance analysis of index calculus methodComputing discrete logarithms in an intervalComputing Logarithms in Finite Fields of Characteristic TwoOn the deterministic complexity of factoring polynomialsAlgebraic curves and cryptographyEfficient Compression of SIDH Public KeysA deterministic version of Pollard’s $p-1$ algorithmTwo phases encryption and its applicationsBug AttacksECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted MessageSpeeding Up the Pollard Rho Method on Prime FieldsAnother look at HMQVEphemeral key recovery using index calculus methodPolylogarithmic two-round argument systemsOn the efficient generation of prime-order elliptic curvesРешение систем линейных уравнений при вычислении логарифмов в конечном простом полеCryptographic aspects of real hyperelliptic curvesStructure computation and discrete logarithms in finite abelian $p$-groupsGenerating Genus Two Hyperelliptic Curves over Large Characteristic Finite FieldsFamilies of genus 2 curves with small embedding degreeCritical remarks on some public-key cryptosystemsON A NEW CIPHER SYSTEM OVER GALOIS FIELDS OF ORDER 27Faster Halvings in Genus 2The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility SequencesAdversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup ModuliPreventing Unknown Key-Share Attack using Cryptographic Bilinear MapsEfficient Algorithms for Supersingular Isogeny Diffie-HellmanPrime Numbers with a Fixed Number of One Bits or Zero Bits in Their Binary RepresentationAn algorithm for evaluation of discrete logarithms in some nonprime finite fieldsTrading GRH for algebra: Algorithms for factoring polynomials and related structuresA double large prime variation for small genus hyperelliptic index calculusTaking roots over high extensions of finite fieldsGeneral Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-VotingBitcoin security with a twisted Edwards curveEffective compression maps for torus-based cryptographyControlling access in tree hierarchiesA practical anonymous payment scheme for electronic commerceA conference key distribution system based on cross-productImproved torsion-point attacks on SIDH variantsOn index calculus algorithms for subfield curvesDeterministic root finding over finite fields using Graeffe transformsPrivacy-preserving distributed mining of association rules using elliptic-curve cryptosystem and Shamir's secret sharing schemeFast generators for the Diffie-Hellman key agreement protocol and malicious standardsFast generation of prime numbers and secure public-key cryptographic parameters.A VLSI architecture for performing finite field arithmetic with reduced table lookupBug attacksThe \(\mathbb Q\)-curve construction for endomorphism-accelerated elliptic curvesComplexity of a determinate algorithm for the discrete logarithmBootstrapping for approximate homomorphic encryptionA deterministic algorithm for the discrete logarithm problem in a semigroupAnalysis and design of a secure key exchange schemeFactor base discrete logarithms in Kummer extensionsCollapse of the hierarchy of constant-depth exact quantum circuitsA construction for authentication/secrecy codes from certain combinatorial designsA key distribution system equivalent to factoringA key-exchange system based on imaginary quadratic fieldsApplying quick exponentiation for block upper triangular matricesEfficient cryptosystems from \(2^k\)-th power residue symbolsStudying the performance of artificial neural networks on problems related to cryptographyOn the multi-user security of short Schnorr signatures with preprocessingNonlinear vectorial primitive recursive sequencesUnivariate polynomial factorization over finite fieldsScalable zero knowledge via cycles of elliptic curvesFault attacks on hyperelliptic curve discrete logarithm problem over binary fieldAnalysis of the fault attack ECDLP over prime fieldAn efficient collision detection method for computing discrete logarithms with Pollard's rhoStandard generators of finite fields and their cyclic subgroupsCPP: towards comprehensive privacy preserving for query processing in information networksElliptic curve cryptography: the serpentine course of a paradigm shiftElliptic curve discrete logarithm problem over small degree extension fields






This page was built for publication: An improved algorithm for computing logarithms over&lt;tex&gt;GF(p)&lt;/tex&gt;and its cryptographic significance (Corresp.)