Breaking ‘128-bit Secure’ Supersingular Binary Curves

From MaRDI portal
Publication:2874534

DOI10.1007/978-3-662-44381-1_8zbMath1334.94080arXiv1402.3668OpenAlexW1518618574MaRDI QIDQ2874534

Jens Zumbrägel, Thorsten Kleinjung, Robert Granger

Publication date: 7 August 2014

Published in: Advances in Cryptology – CRYPTO 2014 (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/1402.3668




Related Items (25)

Smoothness test for polynomials defined over small characteristic finite fieldsComputing discrete logarithms in cryptographically-interesting characteristic-three finite fieldsClassifying and generating exact coset representatives of \(\operatorname{PGL}_2(\mathbb{F}_q)\) in \(\operatorname{PGL}_2(\mathbb{F}_{q^2})\)New discrete logarithm computation for the medium prime case using the function field sieveStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionEfficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed TraceabilityA survey of elliptic curves for proof systemsIndividual discrete logarithm with sublattice reductionRoots of certain polynomials over finite fieldsSolving discrete logarithms on a 170-bit MNT curve by pairing reductionOn the discrete logarithm problem in finite fields of fixed characteristicTechnical history of discrete logarithms in small characteristic finite fields. The road from subexponential to quasi-polynomial complexityFaster individual discrete logarithms in finite fields of composite extension degreeOn Constructing Parameterized Families of Pairing-Friendly Elliptic Curves with $$\rho =1$$Computing discrete logarithms in \(\mathbb F_{p^6}\)Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsUpdating key size estimations for pairingsAlmost perfect nonlinear trinomials and hexanomialsIndiscreet logarithms in finite fields of small characteristicWeakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptographyComputation of a 30750-bit binary field discrete logarithmFaster initial splitting for small characteristic composite extension degree fieldsStructure-preserving public-key encryption with leakage-resilient CCA securityStill wrong use of pairings in cryptographyAsymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields




This page was built for publication: Breaking ‘128-bit Secure’ Supersingular Binary Curves