An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
From MaRDI portal
Publication:4154061
DOI10.1109/TIT.1978.1055817zbMath0375.68023WikidataQ56784431 ScholiaQ56784431MaRDI QIDQ4154061
Stephen C. Pohlig, Martin Edward Hellman
Publication date: 1978
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Data encryption (aspects in computer science) (68P25) Computation of special functions and constants, construction of tables (65D20)
Related Items (only showing first 100 items - show all)
Constructing hyperelliptic curves of genus 2 suitable for cryptography ⋮ Using partial smoothness of 𝑝-1 for factoring polynomials modulo 𝑝 ⋮ Security analysis of discrete logarithm based cryptosystems ⋮ A DSA-like digital signature protocol ⋮ Diffie-Hellman Oracles ⋮ Algorithms for Black-Box Fields and their Application to Cryptography ⋮ Insecure primitive elements in an ElGamal signature protocol ⋮ Construction of CM Picard curves ⋮ Point counting on Picard curves in large characteristic ⋮ Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree ⋮ On the Security of OSIDH ⋮ Subgroup Security in Pairing-Based Cryptography ⋮ Fast subgroup membership testings for \(\mathbb{G}_1, \mathbb{G}_2\) and \(\mathbb{G}_T\) on pairing-friendly curves ⋮ Breaking SIDH in polynomial time ⋮ DiSSECT: distinguisher of standard and simulated elliptic curves via traits ⋮ MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity ⋮ Faster Privacy-Preserving Location Proximity Schemes ⋮ Cryptographic multilinear maps using pro-\(p\) groups ⋮ An analysis of the algebraic group model ⋮ On the discrete logarithm problem in finite fields of fixed characteristic ⋮ Computing integral points on hyperelliptic curves using quadratic Chabauty ⋮ Efficient Finite Fields in the Maxima Computer Algebra System ⋮ Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves ⋮ A simplified approach to rigorous degree 2 elimination in discrete logarithm algorithms ⋮ Unnamed Item ⋮ An Identity-Based Key Agreement Protocol for the Network Layer ⋮ Constructing nonresidues in finite fields and the extended Riemann hypothesis ⋮ On Relationship of Computational Diffie-Hellman Problem and Computational Square-Root Exponent Problem ⋮ ON BOUNDS FOR BALANCED EMBEDDING DEGREE ⋮ Evaluation of discrete logarithms in a group of 𝑝-torsion points of an elliptic curve in characteristic 𝑝 ⋮ Performance analysis of index calculus method ⋮ Computing discrete logarithms in an interval ⋮ Computing Logarithms in Finite Fields of Characteristic Two ⋮ On the deterministic complexity of factoring polynomials ⋮ Algebraic curves and cryptography ⋮ Efficient Compression of SIDH Public Keys ⋮ A deterministic version of Pollard’s $p-1$ algorithm ⋮ Two phases encryption and its applications ⋮ Bug Attacks ⋮ ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message ⋮ Speeding Up the Pollard Rho Method on Prime Fields ⋮ Another look at HMQV ⋮ Ephemeral key recovery using index calculus method ⋮ Polylogarithmic two-round argument systems ⋮ On the efficient generation of prime-order elliptic curves ⋮ Решение систем линейных уравнений при вычислении логарифмов в конечном простом поле ⋮ Cryptographic aspects of real hyperelliptic curves ⋮ Structure computation and discrete logarithms in finite abelian $p$-groups ⋮ Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields ⋮ Families of genus 2 curves with small embedding degree ⋮ Critical remarks on some public-key cryptosystems ⋮ ON A NEW CIPHER SYSTEM OVER GALOIS FIELDS OF ORDER 27 ⋮ Faster Halvings in Genus 2 ⋮ The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences ⋮ Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli ⋮ Preventing Unknown Key-Share Attack using Cryptographic Bilinear Maps ⋮ Efficient Algorithms for Supersingular Isogeny Diffie-Hellman ⋮ Prime Numbers with a Fixed Number of One Bits or Zero Bits in Their Binary Representation ⋮ An algorithm for evaluation of discrete logarithms in some nonprime finite fields ⋮ Trading GRH for algebra: Algorithms for factoring polynomials and related structures ⋮ A double large prime variation for small genus hyperelliptic index calculus ⋮ Taking roots over high extensions of finite fields ⋮ General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting ⋮ Bitcoin security with a twisted Edwards curve ⋮ Effective compression maps for torus-based cryptography ⋮ Controlling access in tree hierarchies ⋮ A practical anonymous payment scheme for electronic commerce ⋮ A conference key distribution system based on cross-product ⋮ Improved torsion-point attacks on SIDH variants ⋮ On index calculus algorithms for subfield curves ⋮ Deterministic root finding over finite fields using Graeffe transforms ⋮ Privacy-preserving distributed mining of association rules using elliptic-curve cryptosystem and Shamir's secret sharing scheme ⋮ Fast generators for the Diffie-Hellman key agreement protocol and malicious standards ⋮ Fast generation of prime numbers and secure public-key cryptographic parameters. ⋮ A VLSI architecture for performing finite field arithmetic with reduced table lookup ⋮ Bug attacks ⋮ The \(\mathbb Q\)-curve construction for endomorphism-accelerated elliptic curves ⋮ Complexity of a determinate algorithm for the discrete logarithm ⋮ Bootstrapping for approximate homomorphic encryption ⋮ A deterministic algorithm for the discrete logarithm problem in a semigroup ⋮ Analysis and design of a secure key exchange scheme ⋮ Factor base discrete logarithms in Kummer extensions ⋮ Collapse of the hierarchy of constant-depth exact quantum circuits ⋮ A construction for authentication/secrecy codes from certain combinatorial designs ⋮ A key distribution system equivalent to factoring ⋮ A key-exchange system based on imaginary quadratic fields ⋮ Applying quick exponentiation for block upper triangular matrices ⋮ Efficient cryptosystems from \(2^k\)-th power residue symbols ⋮ Studying the performance of artificial neural networks on problems related to cryptography ⋮ On the multi-user security of short Schnorr signatures with preprocessing ⋮ Nonlinear vectorial primitive recursive sequences ⋮ Univariate polynomial factorization over finite fields ⋮ Scalable zero knowledge via cycles of elliptic curves ⋮ Fault attacks on hyperelliptic curve discrete logarithm problem over binary field ⋮ Analysis of the fault attack ECDLP over prime field ⋮ An efficient collision detection method for computing discrete logarithms with Pollard's rho ⋮ Standard generators of finite fields and their cyclic subgroups ⋮ CPP: towards comprehensive privacy preserving for query processing in information networks ⋮ Elliptic curve cryptography: the serpentine course of a paradigm shift ⋮ Elliptic curve discrete logarithm problem over small degree extension fields
This page was built for publication: An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)