On implementation of GHS attack against elliptic curve cryptosystems over cubic extension fields of odd characteristic
DOI10.1090/CONM/701/14144zbMATH Open1388.14078OpenAlexW2791586492MaRDI QIDQ4635408FDOQ4635408
Authors: Naoki Hashizume, Fumiyuki Momose, Jinhui Chao
Publication date: 16 April 2018
Published in: Number Theory Related to Modular Curves (Search for Journal in Brave)
Full work available at URL: https://semanticscholar.org/paper/8e673435ec710492e0421605feb705892874b881
Recommendations
- Solving elliptic curve discrete logarithm problems using Weil descent
- Extending the GLS endomorphism to speed up GHS Weil descent using Magma
- Constructive and destructive facets of Weil descent on elliptic curves
- Models of curves from GHS attack in odd characteristic
- Cover attacks for elliptic curves with cofactor two
- scientific article; zbMATH DE number 2042679
- Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristic
- Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem
- The Equivalence between the DHP and DLP for Elliptic Curves Used in Practical Applications
- scientific article; zbMATH DE number 2154287
Cryptography (94A60) Varieties over finite and local fields (11G25) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Cites Work
- An algorithm for solving the discrete log problem on hyperelliptic curves
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- Weil descent of Jacobians.
- Constructive and destructive facets of Weil descent on elliptic curves
- Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem
- A double large prime variation for small genus hyperelliptic index calculus
- Title not available (Why is that?)
- Algorithmic Number Theory
- Index calculus attack for hyperelliptic curves of small genus
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristic
- Topics in Cryptology – CT-RSA 2004
Cited In (7)
- Models of curves from GHS attack in odd characteristic
- Cover attacks for elliptic curves over cubic extension fields
- Solving elliptic curve discrete logarithm problems using Weil descent
- Title not available (Why is that?)
- Attacking a binary GLS elliptic curve with Magma
- Title not available (Why is that?)
- Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristic
Uses Software
This page was built for publication: On implementation of GHS attack against elliptic curve cryptosystems over cubic extension fields of odd characteristic
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4635408)