An overview of trace based public key cryptography over finite fields
From MaRDI portal
Publication:2349644
DOI10.1016/j.cam.2013.10.022zbMath1312.94026OpenAlexW2030664111MaRDI QIDQ2349644
Publication date: 17 June 2015
Published in: Journal of Computational and Applied Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cam.2013.10.022
discrete logarithm problempublic key cryptosystemscharacteristic sequencefinite field extensionsdigital signature schemeLFSR based exponentiation
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Message transmission for GH-public key cryptosystem
- Factor-4 and 6 compression of cyclotomic subgroups of and
- Double-Exponentiation in Factor-4 Groups and Its Applications
- Looking beyond XTR
- Public-key cryptosystems based on cubic finite field extensions
- Advances in Cryptology - CRYPTO 2003
This page was built for publication: An overview of trace based public key cryptography over finite fields