scientific article; zbMATH DE number 2086697
From MaRDI portal
Publication:4737234
zbMath1055.94013MaRDI QIDQ4737234
Steven D. Galbraith, Florian Hess, Nigel P. Smart
Publication date: 11 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320029.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (32)
Quantum lattice enumeration and tweaking discrete pruning ⋮ Improved algorithm for the isogeny problem for ordinary elliptic curves ⋮ On the Security of OSIDH ⋮ \textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twist ⋮ Generating subgroups of ray class groups with small prime ideals ⋮ Computing the endomorphism ring of an ordinary elliptic curve over a finite field ⋮ Cryptographic group actions and applications ⋮ Recent progress on the elliptic curve discrete logarithm problem ⋮ A note on the kernel of group homomorphism of the Weil descent method ⋮ Towards practical key exchange from ordinary isogeny graphs ⋮ Modular polynomials via isogeny volcanoes ⋮ A low-memory algorithm for finding short product representations in finite groups. ⋮ Extending the GLS endomorphism to speed up GHS Weil descent using Magma ⋮ Computational problems in supersingular elliptic curve isogenies ⋮ Fast algorithms for computing isogenies between elliptic curves ⋮ Algebraic curves and cryptography ⋮ Elliptic curve cryptosystems in the presence of permanent and transient faults ⋮ A Subexponential Algorithm for Evaluating Large Degree Isogenies ⋮ Can we beat the square root bound for ECDLP over \(\mathbb{F}_p^2\) via representation? ⋮ Cryptographic implications of Hess' generalized GHS attack ⋮ A trade-off between classical and quantum circuit size for an attack against CSIDH ⋮ Cover attacks for elliptic curves with cofactor two ⋮ Computing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\) ⋮ On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups ⋮ Applications to cryptography of twisting commutative algebraic groups ⋮ Об алгоритмах построения изогений эллиптических кривых над конечными полями и их приложениях ⋮ Extractors for binary elliptic curves ⋮ Expander graphs based on GRH with an application to elliptic curve cryptography ⋮ On Elkies subgroups of \(\ell\)-torsion points in elliptic curves defined over a finite field ⋮ Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies ⋮ Solving discrete logarithm problems faster with the aid of pre-computation ⋮ Modular polynomials on Hilbert surfaces
This page was built for publication: