scientific article; zbMATH DE number 2086697

From MaRDI portal
Publication:4737234

zbMath1055.94013MaRDI QIDQ4737234

Steven D. Galbraith, Florian Hess, Nigel P. Smart

Publication date: 11 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320029.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (32)

Quantum lattice enumeration and tweaking discrete pruningImproved algorithm for the isogeny problem for ordinary elliptic curvesOn the Security of OSIDH\textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twistGenerating subgroups of ray class groups with small prime idealsComputing the endomorphism ring of an ordinary elliptic curve over a finite fieldCryptographic group actions and applicationsRecent progress on the elliptic curve discrete logarithm problemA note on the kernel of group homomorphism of the Weil descent methodTowards practical key exchange from ordinary isogeny graphsModular polynomials via isogeny volcanoesA low-memory algorithm for finding short product representations in finite groups.Extending the GLS endomorphism to speed up GHS Weil descent using MagmaComputational problems in supersingular elliptic curve isogeniesFast algorithms for computing isogenies between elliptic curvesAlgebraic curves and cryptographyElliptic curve cryptosystems in the presence of permanent and transient faultsA Subexponential Algorithm for Evaluating Large Degree IsogeniesCan we beat the square root bound for ECDLP over \(\mathbb{F}_p^2\) via representation?Cryptographic implications of Hess' generalized GHS attackA trade-off between classical and quantum circuit size for an attack against CSIDHCover attacks for elliptic curves with cofactor twoComputing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\)On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groupsApplications to cryptography of twisting commutative algebraic groupsОб алгоритмах построения изогений эллиптических кривых над конечными полями и их приложенияхExtractors for binary elliptic curvesExpander graphs based on GRH with an application to elliptic curve cryptographyOn Elkies subgroups of \(\ell\)-torsion points in elliptic curves defined over a finite fieldTowards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve IsogeniesSolving discrete logarithm problems faster with the aid of pre-computationModular polynomials on Hilbert surfaces




This page was built for publication: