메뉴 건너뛰기




Volumn 128, Issue 1 SPEC., 2003, Pages 165-180

Weil descent of Jacobians

Author keywords

[No Author keywords available]

Indexed keywords

COMBINATORIAL MATHEMATICS; MATHEMATICAL TECHNIQUES;

EID: 0038060517     PISSN: 0166218X     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0166-218X(02)00443-2     Document Type: Conference Paper
Times cited : (9)

References (14)
  • 3
    • 84956867482 scopus 로고    scopus 로고
    • Speeding up the discrete log computation on curves with automorphisms
    • Lam et al. (Eds.) Springer, Berlin
    • I. Duursma, P. Gaudry, F. Morain, Speeding up the discrete log computation on curves with automorphisms, in: Lam et al. (Eds.), ASIACRYPT '99, Lecture Notes in Computer Science, Vol. 1716, Springer, Berlin, 1999, pp. 103-121.
    • (1999) ASIACRYPT '99, Lecture Notes in Computer Science , vol.1716 , pp. 103-121
    • Duursma, I.1    Gaudry, P.2    Morain, F.3
  • 4
    • 0033473028 scopus 로고    scopus 로고
    • Sieving in function fields
    • R. Flassenberg, and S. Paulus Sieving in function fields Exp. Math. 8 4 1997 339 349
    • (1997) Exp. Math. , vol.8 , Issue.4 , pp. 339-349
    • Flassenberg, R.1    Paulus, S.2
  • 5
    • 3042543049 scopus 로고    scopus 로고
    • How to disguise an elliptic curve
    • Waterloo
    • G. Frey, How to disguise an elliptic curve, Talk at ECC '98, Waterloo, 1998, http://cacr.math.uwaterloo.ca/conferences/1998/ecc98/slides.html.
    • (1998) Talk at ECC '98
    • Frey, G.1
  • 6
    • 84863828410 scopus 로고    scopus 로고
    • Limitations of constructive Weil descent
    • K. Alster, et al. (Eds.) Walter de Gruyter, Berlin
    • S.D. Galbraith, Limitations of constructive Weil descent, in: K. Alster, et al. (Eds.), Public-Key Cryptography and Computational Number Theory, Walter de Gruyter, Berlin, 2001, pp. 59-70.
    • (2001) Public-Key Cryptography and Computational Number Theory , pp. 59-70
    • Galbraith, S.D.1
  • 7
    • 84961355784 scopus 로고    scopus 로고
    • A cryptographic application of Weil descent
    • M. Walker, Lecture Notes in Computer Science Springer Berlin
    • S.D. Galbraith, and N.P. Smart A cryptographic application of Weil descent M. Walker, Codes and Cryptography Cirencester Lecture Notes in Computer Science Vol. 1746 1999 Springer Berlin 191 200
    • (1999) Codes and Cryptography Cirencester , vol.1746 , pp. 191-200
    • Galbraith, S.D.1    Smart, N.P.2
  • 8
    • 84948978775 scopus 로고    scopus 로고
    • An algorithm for solving the discrete log problem on hyperelliptic curves
    • B. Preneel, Lecture Notes in Computer Science
    • P. Gaudry An algorithm for solving the discrete log problem on hyperelliptic curves B. Preneel, EUROCRYPT 2000 Lecture Notes in Computer Science Vol. 1807 2000 19 34
    • (2000) EUROCRYPT 2000 , vol.1807 , pp. 19-34
    • Gaudry, P.1
  • 9
    • 0001788567 scopus 로고    scopus 로고
    • Constructive and destructive facets of Weil descent on elliptic curves
    • P. Gaudry, F. Hess, and N.P. Smart Constructive and destructive facets of Weil descent on elliptic curves J. Cryptology 15 1 2002 19 46
    • (2002) J. Cryptology , vol.15 , Issue.1 , pp. 19-46
    • Gaudry, P.1    Hess, F.2    Smart, N.P.3
  • 10
    • 84949195686 scopus 로고    scopus 로고
    • Speeding up the arithmetic on Koblitz curves of genus two
    • D. Stinson, Lecture Notes in Computer Science Springer Berlin
    • C. Günther, T. Lange, and A. Stein Speeding up the arithmetic on Koblitz curves of genus two D. Stinson, SAC 2001 Lecture Notes in Computer Science Vol. 2012 2001 Springer Berlin 106 117
    • (2001) SAC 2001 , vol.2012 , pp. 106-117
    • Günther, C.1    Lange, T.2    Stein, A.3
  • 11
    • 0024864204 scopus 로고
    • Hyperelliptic cryptosystems
    • N. Koblitz Hyperelliptic cryptosystems J. Cryptology 1 3 1989 139 150
    • (1989) J. Cryptology , vol.1 , Issue.3 , pp. 139-150
    • Koblitz, N.1
  • 12
    • 84945129506 scopus 로고    scopus 로고
    • How secure are elliptic curves over composite extension fields?
    • B. Pfitzmann (Ed.) Springer, Berlin
    • N.P. Smart, How secure are elliptic curves over composite extension fields? in: B. Pfitzmann (Ed.), EUROCRYPT 2001, Lecture Notes in Computer Science, Vol. 2045, Springer, Berlin, 2001, pp. 30-39.
    • (2001) EUROCRYPT 2001, Lecture Notes in Computer Science , vol.2045 , pp. 30-39
    • Smart, N.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.