Evaluation of discrete logarithms in a group of 𝑝-torsion points of an elliptic curve in characteristic 𝑝

From MaRDI portal
Publication:4372702

DOI10.1090/S0025-5718-98-00887-4zbMath1016.11021OpenAlexW1979485530WikidataQ56047757 ScholiaQ56047757MaRDI QIDQ4372702

I. A. Semaev

Publication date: 16 December 1997

Published in: Mathematics of Computation (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1090/s0025-5718-98-00887-4




Related Items

Constructing Isogenies between Elliptic Curves Over Finite FieldsNumber of rational points of elliptic curvesScalable zero knowledge via cycles of elliptic curvesDiSSECT: distinguisher of standard and simulated elliptic curves via traitsThe number of rational points of hyperelliptic curves over subsets of finite fieldsAcceleration of Index Calculus for Solving ECDLP over Prime Fields and Its LimitationGroup structure of elliptic curves over \(\mathbb{Z}/N\mathbb{Z}\)Elliptic curve discrete logarithm problem over small degree extension fieldsA Weil pairing on the \(p\)-torsion of ordinary elliptic curves over \(K[\varepsilon\)] ⋮ Fault-based attack on Montgomery's ladder algorithmElliptic curve lifting problem and its applicationsComputational hardness of IFP and ECDLPAmicable Pairs and Aliquot Cycles for Elliptic CurvesAlgebraic curves and cryptographyOn Cycles of Pairing-Friendly Elliptic CurvesID-based threshold digital signature schemes on the elliptic curve discrete logarithm problemCan we beat the square root bound for ECDLP over \(\mathbb{F}_p^2\) via representation?Cryptographic implications of Hess' generalized GHS attackComplexity bounds on Semaev's naive index calculus method for ECDLPOn the asymptotic effectiveness of Weil descent attacksIndex calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problemOn the security properties of Russian standardized elliptic curvesConstruction of strong elliptic curves suitable for cryptographic applicationsLifting and Elliptic Curve Discrete LogarithmsSeveral security schemes constructed using ECC-based self-certified public key cryptosystemsOn the discrete logarithm in the divisor class group of curvesBitcoin security with a twisted Edwards curve



Cites Work