An attack on disguised elliptic curves
From MaRDI portal
Publication:3516762
DOI10.1515/JMC.2008.001zbMATH Open1140.94011MaRDI QIDQ3516762FDOQ3516762
Publication date: 11 August 2008
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Cryptography (94A60) Curves over finite and local fields (11G20) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Cites Work
Cited In (8)
- Trapdoor DDH groups from pairings and isogenies
- A hybrid Gröbner bases approach to computing power integral bases
- Invalid curve attacks in a GLS setting
- On Edwards curves and ZVP-attacks
- Fault attacks on hyperelliptic curve discrete logarithm problem over binary field
- Cryptanalysis of elliptic curve hidden number problem from PKC 2017
- New Constructions and Applications of Trapdoor DDH Groups
- Zero-Value Point Attacks on Elliptic Curve Cryptosystem
This page was built for publication: An attack on disguised elliptic curves
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3516762)