An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
From MaRDI portal
Publication:4154061
Cited in
(only showing first 100 items - show all)- Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields
- Über die mathematischen Grundlagen einiger Chiffrierverfahren
- Standard generators of finite fields and their cyclic subgroups
- Privacy-preserving distributed mining of association rules using elliptic-curve cryptosystem and Shamir's secret sharing scheme
- A note on Girault's self-certified model
- A serial version of the Pohlig-Hellman algorithm for computing discrete logarithms
- Analysis of the Herlestam and Johannesson discrete logarithm scheme in \(GF(2^ N)\) for large N
- Efficient cryptosystems from \(2^k\)-th power residue symbols
- Efficient Finite Fields in the Maxima Computer Algebra System
- An authentication-combined access control scheme using a one-way function
- Controlling access in tree hierarchies
- Ramanujan's class invariants and their use in elliptic curve cryptography
- A fast parallel sparse polynomial GCD algorithm
- A low-memory algorithm for point counting on Picard curves
- Algorithms for black-box fields and their application to cryptography
- Solving systems of linear equations arising in the computation of logarithms in a finite prime field
- Scalable zero knowledge via cycles of elliptic curves
- Towards isogeny-based password-authenticated key establishment
- A key-exchange system based on imaginary quadratic fields
- Fast generation of prime numbers and secure public-key cryptographic parameters.
- Factor base discrete logarithms in Kummer extensions
- Subgroup security in pairing-based cryptography
- Survey on SAP and its application in public-key cryptography
- Orienting supersingular isogeny graphs
- Efficient compression of SIDH public keys
- Families of genus 2 curves with small embedding degree
- Fault attacks on hyperelliptic curve discrete logarithm problem over binary field
- Applying quick exponentiation for block upper triangular matrices
- Studying the performance of artificial neural networks on problems related to cryptography
- Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields
- The Pohlig-Hellman method generalized for group structure computation
- A simplified approach to rigorous degree 2 elimination in discrete logarithm algorithms
- Bootstrapping for approximate homomorphic encryption
- Computing integral points on hyperelliptic curves using quadratic Chabauty
- Prime-number algorithm for public-key systems
- A construction for authentication/secrecy codes from certain combinatorial designs
- An algorithm for evaluation of discrete logarithms in some nonprime finite fields
- A VLSI architecture for performing finite field arithmetic with reduced table lookup
- Constructing nonresidues in finite fields and the extended Riemann hypothesis
- A new password authentication mechanism based on two phases encryption
- A deterministic algorithm for the discrete logarithm problem in a semigroup
- Computing low-weight discrete logarithms
- Polylogarithmic two-round argument systems
- Algebraic curves and cryptography
- scientific article; zbMATH DE number 7716603 (Why is no real title available?)
- On computing logarithms over GF(2**p)
- Indiscreet logarithms in finite fields of small characteristic
- Nonlinear vectorial primitive recursive sequences
- On the discrete logarithm problem in finite fields of fixed characteristic
- Polynomial time bounded distance decoding near Minkowski's bound in discrete logarithm lattices
- A practical anonymous payment scheme for electronic commerce
- Elliptic curve cryptosystems and their implementation
- On random walks for Pollard's rho method
- A traceable group signature scheme.
- Post-quantum static-static key agreement using multiple protocol instances
- Complexity of a determinate algorithm for the discrete logarithm
- Speeding Up the Pollard Rho Method on Prime Fields
- Performance analysis of index calculus method
- A deterministic version of Pollard's \(p-1\) algorithm
- Elliptic curve cryptography: the serpentine course of a paradigm shift
- Accelerating Pollard's rho algorithm on finite fields
- Discrete logarithm based additively homomorphic encryption and secure data aggregation
- On index calculus algorithms for subfield curves
- ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem
- Constructing hyperelliptic curves of genus 2 suitable for cryptography
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Computing Logarithms in Finite Fields of Characteristic Two
- Low complexity normal bases for \(F_{2^{mn}}\)
- Low complexity normal bases
- Using partial smoothness of \(p-1\) for factoring polynomials modulo \(p\)
- A practical anonymous multi-authority e-cash scheme.
- Diffie-Hellman Oracles
- Prime Numbers with a Fixed Number of One Bits or Zero Bits in Their Binary Representation
- Analysis of the fault attack ECDLP over prime field
- One-way permutations on elliptic curves
- An efficient collision detection method for computing discrete logarithms with Pollard's rho
- Isogenies and the discrete logarithm problem in Jacobians of genus 3 hyperelliptic curves
- Collisions in fast generation of ideal classes and points on hyperelliptic and elliptic curves
- General secret sharing based on the Chinese remainder theorem with applications in e-voting
- Collapse of the hierarchy of constant-depth exact quantum circuits
- Improved Pollard rho method for computing discrete logarithms over finite extension fields
- Discrete logarithm problem using index calculus method
- Several security schemes constructed using ECC-based self-certified public key cryptosystems
- Elliptic curve discrete logarithm problem over small degree extension fields
- Analysis and design of a secure key exchange scheme
- Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
- Parallel use of multiplicative congruential random number generators
- Sequence acquisition using bit estimation techniques
- Bug Attacks
- Point counting on Picard curves in large characteristic
- Constant-round perfect zero-knowledge computationally convincing protocols
- Smoothness and factoring polynomials over finite fields
- Deterministic root finding over finite fields using Graeffe transforms
- Higher \(K\)-groups of smooth projective curves over finite fields
- Trading GRH for algebra: algorithms for factoring polynomials and related structures
- Another look at HMQV
- An Identity-Based Key Agreement Protocol for the Network Layer
- Unmediated communication in repeated games with imperfect monitoring.
- Privacy preserving OLAP over distributed XML data: A theoretically-sound secure-multiparty-computation approach
- A double large prime variation for small genus hyperelliptic index calculus
This page was built for publication: An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4154061)