메뉴 건너뛰기




Volumn 47, Issue , 1997, Pages 23-32

The discrete logarithm problem in GL(n, q)

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0012085380     PISSN: 03817032     EISSN: 28175204     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (55)

References (16)
  • 1
    • 84966236672 scopus 로고
    • A subexponential algorithm for discrete logarithms over all finite fields
    • L. Adleman and J. DeMarrais, "A subexponential algorithm for discrete logarithms over all finite fields", Mathematics of Computation, 61 (1993), 1-15.
    • (1993) Mathematics of Computation , vol.61 , pp. 1-15
    • Adleman, L.1    DeMarrais, J.2
  • 3
    • 0024139987 scopus 로고
    • A key-exchange system based on imaginary quadratic fields
    • J. Buchmann and H. Williams, "A key-exchange system based on imaginary quadratic fields" Journal of Cryptology, 1 (1988), 107-118.
    • (1988) Journal of Cryptology , vol.1 , pp. 107-118
    • Buchmann, J.1    Williams, H.2
  • 8
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation, 48 (1987), 203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 9
    • 0024864204 scopus 로고
    • Hyperelliptic cryptosystems
    • N. Koblitz, "Hyperelliptic cryptosystems", Journal of Cryptology, 1 (1989), 139-150.
    • (1989) Journal of Cryptology , vol.1 , pp. 139-150
    • Koblitz, N.1
  • 10
    • 0002139049 scopus 로고
    • The discrete logarithm problem
    • Cryptology and Computational Number Theory
    • K. McCurley, "The discrete logarithm problem", Cryptology and Computational Number Theory, Proceedings of Symposia in Applied Mathematics, 42 (1990), 49-74.
    • (1990) Proceedings of Symposia in Applied Mathematics , vol.42 , pp. 49-74
    • McCurley, K.1
  • 12
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography
    • Advances in Cryptology - Proceedings of Crypto '85, Springer-Verlag
    • V. Miller, "Uses of elliptic curves in cryptography", Advances in Cryptology - Proceedings of Crypto '85, Lecture Notes in Computer Science, 218 (1986), Springer-Verlag, 417-426.
    • (1986) Lecture Notes in Computer Science , vol.218 , pp. 417-426
    • Miller, V.1
  • 13
    • 0039217637 scopus 로고
    • Fermat's theorem for matrices
    • I. Niven, "Fermat's theorem for matrices", Duke Mathematical Journal, 15 (1948), 823-826.
    • (1948) Duke Mathematical Journal , vol.15 , pp. 823-826
    • Niven, I.1
  • 14
    • 84957014368 scopus 로고
    • Discrete logarithms in finite fields and their cryptographic significance
    • Advances in Cryptology - Proceedings of Eurocrypt '84, Springer- Verlag
    • A. Odlyzko, "Discrete logarithms in finite fields and their cryptographic significance", Advances in Cryptology - Proceedings of Eurocrypt '84, Lecture Notes in Computer Science, 209 (1985), Springer- Verlag, 224-314.
    • (1985) Lecture Notes in Computer Science , vol.209 , pp. 224-314
    • Odlyzko, A.1
  • 16
    • 84972540003 scopus 로고
    • Approximate formulas for some functions of prime numbers
    • J. Rosser and L. Schoenfeld, "Approximate formulas for some functions of prime numbers", Illinois Journal of Mathematics, 6 (1962), 64-94.
    • (1962) Illinois Journal of Mathematics , vol.6 , pp. 64-94
    • Rosser, J.1    Schoenfeld, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.