On implementation of GHS attack against elliptic curve cryptosystems over cubic extension fields of odd characteristic
DOI10.1090/CONM/701/14144zbMATH Open1388.14078OpenAlexW2791586492MaRDI QIDQ4635408FDOQ4635408
Jinhui Chao, Naoki Hashizume, Fumiyuki Momose
Publication date: 16 April 2018
Published in: Number Theory Related to Modular Curves (Search for Journal in Brave)
Full work available at URL: https://semanticscholar.org/paper/8e673435ec710492e0421605feb705892874b881
Cryptography (94A60) Varieties over finite and local fields (11G25) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Cites Work
- Title not available (Why is that?)
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- Weil descent of Jacobians.
- Constructive and destructive facets of Weil descent on elliptic curves
- Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem
- A double large prime variation for small genus hyperelliptic index calculus
- Title not available (Why is that?)
- Algorithmic Number Theory
- Advances in Cryptology - ASIACRYPT 2003
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Topics in Cryptology β CT-RSA 2004
Cited In (5)
Uses Software
Recommendations
- Solving elliptic curve discrete logarithm problems using Weil descent π π
- Extending the GLS endomorphism to speed up GHS Weil descent using Magma π π
- Constructive and destructive facets of Weil descent on elliptic curves π π
- Models of curves from GHS attack in odd characteristic π π
- Cover attacks for elliptic curves with cofactor two π π
- Title not available (Why is that?) π π
- Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristic π π
- Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem π π
- The Equivalence between the DHP and DLP for Elliptic Curves Used in Practical Applications π π
- Title not available (Why is that?) π π
This page was built for publication: On implementation of GHS attack against elliptic curve cryptosystems over cubic extension fields of odd characteristic
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4635408)