On implementation of GHS attack against elliptic curve cryptosystems over cubic extension fields of odd characteristic
DOI10.1090/conm/701/14144zbMath1388.14078OpenAlexW2791586492MaRDI QIDQ4635408
Jinhui Chao, Naoki Hashizume, Fumiyuki Momose
Publication date: 16 April 2018
Published in: Number Theory Related to Modular Curves (Search for Journal in Brave)
Full work available at URL: https://semanticscholar.org/paper/8e673435ec710492e0421605feb705892874b881
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Varieties over finite and local fields (11G25) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Constructive and destructive facets of Weil descent on elliptic curves
- Weil descent of Jacobians.
- A double large prime variation for small genus hyperelliptic index calculus
- Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- Algorithmic Number Theory
- Topics in Cryptology – CT-RSA 2004
- Advances in Cryptology - ASIACRYPT 2003
This page was built for publication: On implementation of GHS attack against elliptic curve cryptosystems over cubic extension fields of odd characteristic