The discrete logarithm problem on elliptic curves of trace one

From MaRDI portal
Publication:1304977

DOI10.1007/s001459900052zbMath0963.11068OpenAlexW2046569422WikidataQ56047758 ScholiaQ56047758MaRDI QIDQ1304977

Nigel P. Smart

Publication date: 24 June 2001

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s001459900052




Related Items

Generating anomalous elliptic curvesNonlinearities in elliptic curve authenticationBootstrapping for approximate homomorphic encryptionOn the multi-user security of short Schnorr signatures with preprocessingOn Random Number Generation for Kernel ApplicationsIsolated elliptic curves and the MOV attackMultiplication polynomials for elliptic curves over finite local ringsA survey of elliptic curves for proof systemsScalable zero knowledge via cycles of elliptic curvesDiSSECT: distinguisher of standard and simulated elliptic curves via traitsWeak instances of class group action based cryptography via self-pairingsElliptic loopsAcceleration of Index Calculus for Solving ECDLP over Prime Fields and Its LimitationRevisiting cycles of pairing-friendly elliptic curvesGroup structure of elliptic curves over \(\mathbb{Z}/N\mathbb{Z}\)Elliptic curve discrete logarithm problem over small degree extension fieldsA Weil pairing on the \(p\)-torsion of ordinary elliptic curves over \(K[\varepsilon\)] ⋮ Elliptic curve lifting problem and its applicationsComputational hardness of IFP and ECDLPAmicable Pairs and Aliquot Cycles for Elliptic CurvesAlgebraic curves and cryptographyImproving e-payment security using elliptic curve cryptosystemOn Cycles of Pairing-Friendly Elliptic CurvesID-based threshold digital signature schemes on the elliptic curve discrete logarithm problemCan we beat the square root bound for ECDLP over \(\mathbb{F}_p^2\) via representation?Cryptographic implications of Hess' generalized GHS attackComplexity bounds on Semaev's naive index calculus method for ECDLPOn the asymptotic effectiveness of Weil descent attacksSolving the multi-discrete logarithm problems over a group of elliptic curves with prime orderIndex calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problemConstruction of strong elliptic curves suitable for cryptographic applicationsExpander graphs based on GRH with an application to elliptic curve cryptographyLifting and Elliptic Curve Discrete LogarithmsStrong Forward Security in Identity-Based SigncryptionBitcoin security with a twisted Edwards curve