Cryptographic implications of Hess' generalized GHS attack
From MaRDI portal
Publication:2502169
DOI10.1007/s00200-005-0186-8zbMath1098.94029OpenAlexW2112566740MaRDI QIDQ2502169
Edlyn Teske, Alfred J. Menezes
Publication date: 12 September 2006
Published in: Applicable Algebra in Engineering, Communication and Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00200-005-0186-8
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Number-theoretic algorithms; complexity (11Y16) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Related Items (6)
Isolated elliptic curves and the MOV attack ⋮ Elliptic curve cryptography: the serpentine course of a paradigm shift ⋮ Algebraic curves and cryptography ⋮ Extractors for binary elliptic curves ⋮ Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography ⋮ Super-isolated abelian varieties
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem
- Parallel collision search with cryptanalytic applications
- The discrete logarithm problem on elliptic curves of trace one
- Computing Riemann-Roch spaces in algebraic function fields and related topics.
- On random walks for Pollard's rho method
- A general framework for subexponential discrete logarithm algorithms
- A double large prime variation for small genus hyperelliptic index calculus
- Monte Carlo Methods for Index Computation (mod p)
- Constructing Isogenies between Elliptic Curves Over Finite Fields
- A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves
- Reducing elliptic curve logarithms to logarithms in a finite field
- Evaluation of discrete logarithms in a group of 𝑝-torsion points of an elliptic curve in characteristic 𝑝
- Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
- Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem
- Topics in Cryptology – CT-RSA 2004
This page was built for publication: Cryptographic implications of Hess' generalized GHS attack