Evaluation of discrete logarithms in a group of 𝑝-torsion points of an elliptic curve in characteristic 𝑝

From MaRDI portal
Revision as of 01:04, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4372702

DOI10.1090/S0025-5718-98-00887-4zbMath1016.11021OpenAlexW1979485530WikidataQ56047757 ScholiaQ56047757MaRDI QIDQ4372702

I. A. Semaev

Publication date: 16 December 1997

Published in: Mathematics of Computation (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1090/s0025-5718-98-00887-4





Cites Work


Related Items (31)

Constructing Isogenies between Elliptic Curves Over Finite FieldsNumber of rational points of elliptic curvesDiscrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree $$1$$Scalable zero knowledge via cycles of elliptic curvesDiSSECT: distinguisher of standard and simulated elliptic curves via traitsThe number of rational points of hyperelliptic curves over subsets of finite fieldsAcceleration of Index Calculus for Solving ECDLP over Prime Fields and Its LimitationGroup structure of elliptic curves over \(\mathbb{Z}/N\mathbb{Z}\)Elliptic curve discrete logarithm problem over small degree extension fieldsA Weil pairing on the \(p\)-torsion of ordinary elliptic curves over \(K[\varepsilon\)] ⋮ Fault-based attack on Montgomery's ladder algorithmElliptic curve lifting problem and its applicationsExp function for Edwards curves over local fieldsComputational hardness of IFP and ECDLPAmicable Pairs and Aliquot Cycles for Elliptic CurvesAlgebraic curves and cryptographyMOV attack in various subgroups on elliptic curvesOn Cycles of Pairing-Friendly Elliptic CurvesID-based threshold digital signature schemes on the elliptic curve discrete logarithm problemCan we beat the square root bound for ECDLP over \(\mathbb{F}_p^2\) via representation?Cryptographic implications of Hess' generalized GHS attackComplexity bounds on Semaev's naive index calculus method for ECDLPOn the asymptotic effectiveness of Weil descent attacksSolving modular cubic equations with Coppersmith's methodIndex calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problemOn the security properties of Russian standardized elliptic curvesConstruction of strong elliptic curves suitable for cryptographic applicationsLifting and Elliptic Curve Discrete LogarithmsSeveral security schemes constructed using ECC-based self-certified public key cryptosystemsOn the discrete logarithm in the divisor class group of curvesBitcoin security with a twisted Edwards curve





This page was built for publication: Evaluation of discrete logarithms in a group of 𝑝-torsion points of an elliptic curve in characteristic 𝑝