Monte Carlo Methods for Index Computation (mod p)

From MaRDI portal
Revision as of 11:05, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4161380

DOI10.2307/2006496zbMath0382.10001OpenAlexW4246140522WikidataQ56388145 ScholiaQ56388145MaRDI QIDQ4161380

J. M. Pollard

Publication date: 1978

Published in: Mathematics of Computation (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.2307/2006496




Related Items (only showing first 100 items - show all)

The improvement of initial value closer to the target for Fermat’s factorization algorithmRETRACTED ARTICLE: Approach towards problem solving on single machine scheduling with unequal release dates and learning effectImproving ECDLP Computation in Characteristic 2Minimization of the total weighted tardiness on a single machine scheduling problem with a position based learning effect and unequal release datesOn improvements of ther-adding walk in a finite field of characteristic 2Combining Montgomery multiplication with tag tracing for the Pollard rho algorithm in prime order fieldsDifferential fault attack on Montgomery ladder and in the presence of scalar randomization$$\mathsf {HIKE}$$ : Walking the Privacy TrailAcceleration of Index Calculus for Solving ECDLP over Prime Fields and Its LimitationAn analysis of the algebraic group modelON BOUNDS FOR BALANCED EMBEDDING DEGREEAlgebraic curves and cryptographyAn optimal distributed discrete log protocol with applications to homomorphic secret sharingImproved Structure Preserving Signatures Under Standard Bilinear AssumptionsPollard's rho attack on ECDLP and Threshold SchemesSecure and Efficient Pairing at 256-Bit Security LevelBounds in Various Generalized Settings of the Discrete Logarithm ProblemCurves with Fast Computations in the First Pairing GroupHow to Solve Multiple Short-Exponent Discrete Logarithm ProblemAnother look at HMQVA Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product ExponentsDiscrete logarithm problems with auxiliary inputsA Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve CryptographyComputing prime divisors in an intervalBitcoin security with a twisted Edwards curveA Brief History of PairingsEffective compression maps for torus-based cryptographyNew algorithm for the elliptic curve discrete logarithm problem with auxiliary inputsFast cryptography in genus 2Multiple images encryption based on 3D scrambling and hyper-chaotic systemOn the cost of ASIC hardware crackers: a SHA-1 case studyGroup Law Computations on Jacobians of Hyperelliptic CurvesReducing the Key Size of Rainbow Using Non-commutative RingsOptimum attack on 3-round Feistel-2 structureSecurity analysis of discrete logarithm based cryptosystemsConstructing Isogenies between Elliptic Curves Over Finite FieldsImproving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude(t,m) THRESHOLD AND GENERALIZED ID-BASED CONFERENCE KEY DISTRIBUTION SYSTEMCryptanalysis of the Round-Reduced GOST Hash FunctionSparse polynomial interpolation based on diversificationA review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass pointBootstrapping for approximate homomorphic encryptionA deterministic algorithm for the discrete logarithm problem in a semigroupCycle detection using a stackA key distribution system equivalent to factoringCycle structure of iterating Rédei functionsAnalysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite DegreeImproved algorithm for the isogeny problem for ordinary elliptic curvesOn the multi-user security of short Schnorr signatures with preprocessingComputing elliptic curve discrete logarithms with improved baby-step giant-step algorithmBaby-step giant-step algorithms for the symmetric groupTime-Memory Trade-Offs for Near-CollisionsOn Symmetric Encryption with Distinguishable Decryption FailuresA variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexityQuantum algorithm for solving hyperelliptic curve discrete logarithm problemScalable zero knowledge via cycles of elliptic curvesFault attacks on hyperelliptic curve discrete logarithm problem over binary fieldAn efficient collision detection method for computing discrete logarithms with Pollard's rhoPrivacy preserving multi-party computation delegation for deep learning in cloud computingSpeeding up elliptic curve discrete logarithm computations with point halvingElliptic curve cryptography: the serpentine course of a paradigm shiftComputing discrete logarithms with the parallelized kangaroo method.A non-uniform birthday problem with applications to discrete logarithmsElliptic curve discrete logarithm problem over small degree extension fieldsB-SIDH: supersingular isogeny Diffie-Hellman using twisted torsionAccelerating Pollard's rho algorithm on finite fieldsHigher \(K\)-groups of smooth projective curves over finite fieldsImproved Pollard rho method for computing discrete logarithms over finite extension fieldsDiscrete logarithm problem using index calculus methodEncoding-Free ElGamal-Type Encryption Schemes on Elliptic CurvesComputing elliptic curve discrete logarithms with the negation mapFault-based attack on Montgomery's ladder algorithmThe graph structure of Chebyshev polynomials over finite fields and applicationsThe functional graph of linear maps over finite fields and applicationsMemoryless near-collisions via coding theoryUsing symmetries in the index calculus for elliptic curves discrete logarithmEfficient signature generation by smart cardsOn computing the degree of a Chebyshev polynomial from its valueAn interactive identification scheme based on discrete logarithms and factoringSequences with good correlation property based on depth and interleaving techniquesComputational hardness of IFP and ECDLPPerformance analysis of index calculus methodOn the discrete logarithm problem for prime-field elliptic curvesPolynomial time bounded distance decoding near Minkowski's bound in discrete logarithm latticesFactor-4 and 6 compression of cyclotomic subgroups of andComputing the characteristic polynomials of a class of hyperelliptic curves for cryptographic applicationsA birthday paradox for Markov chains with an optimal bound for collision in the Pollard rho algorithm for discrete logarithmComparing two pairing-based aggregate signature schemesOn not storing the path of a random walkSpeeding up exponentiation using an untrusted computational resourceID-based threshold digital signature schemes on the elliptic curve discrete logarithm problemA taxonomy of pairing-friendly elliptic curvesSecurity Analysis of the Strong Diffie-Hellman ProblemThe Function Field Sieve in the Medium Prime CaseECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted MessageSpeeding Up the Pollard Rho Method on Prime FieldsCryptographic implications of Hess' generalized GHS attackComplexity bounds on Semaev's naive index calculus method for ECDLPOn the asymptotic effectiveness of Weil descent attacksIndiscreet logarithms in finite fields of small characteristic







This page was built for publication: Monte Carlo Methods for Index Computation (mod p)