메뉴 건너뛰기




Volumn 46, Issue 4, 2004, Pages 599-634

A survey of public-key cryptosystems

Author keywords

Cryptography; Elliptic curve; Public key

Indexed keywords

ALGORITHMS; COMPUTERS; MATRIX ALGEBRA; POLYNOMIALS; QUANTUM CRYPTOGRAPHY; SECURITY OF DATA;

EID: 11344267619     PISSN: 00361445     EISSN: None     Source Type: Journal    
DOI: 10.1137/S0036144503439190     Document Type: Article
Times cited : (39)

References (124)
  • 1
    • 84929727140 scopus 로고
    • A subexponential algorithm for discrete logarithms over the rational subgroup of the Jacobians of large genus hyperelliptic curves over finite fields
    • Lecture Notes in Comput. Sci. 877, Springer-Verlag, Berlin
    • L. Adleman, J. Demarrais, and M. Huang, A subexponential algorithm for discrete logarithms over the rational subgroup of the Jacobians of large genus hyperelliptic curves over finite fields, in Algorithmic Number Theory: First International Symposium, Lecture Notes in Comput. Sci. 877, Springer-Verlag, Berlin, 1994, pp. 28-40.
    • (1994) Algorithmic Number Theory: First International Symposium , pp. 28-40
    • Adleman, L.1    Demarrais, J.2    Huang, M.3
  • 3
    • 0033245872 scopus 로고    scopus 로고
    • An algebraic method for public-key cryptography
    • I. Anshel, M. Anshel, and D. Goldfeld, An algebraic method for public-key cryptography, Math. Res. Lett., 6 (1999), pp. 1-5.
    • (1999) Math. Res. Lett , vol.6 , pp. 1-5
    • Anshel, I.1    Anshel, M.2    Goldfeld, D.3
  • 4
    • 84937563572 scopus 로고    scopus 로고
    • New key agreement protocol in braid group cryptography
    • Lecture Notes in Comput. Sci. 2020, Springer-Verlag, Berlin
    • I. Anshel, M. Anshel, and D. Goldfeld, New key agreement protocol in braid group cryptography, in Topics in Cryptogrgphy - CT-RSA 2001, Lecture Notes in Comput. Sci. 2020, Springer-Verlag, Berlin, 2001, pp. 13-27.
    • (2001) Topics in Cryptogrgphy - CT-RSA 2001 , pp. 13-27
    • Anshel, I.1    Anshel, M.2    Goldfeld, D.3
  • 5
    • 35048858891 scopus 로고    scopus 로고
    • Aspects of hyperelliptic curves over large prime fields in software implementations
    • Lecture in Comput. Sci. 3156, Springer-Verlag, Berlin
    • R. Avanzi, Aspects of hyperelliptic curves over large prime fields in software implementations, in Cryptographic Hardware and Embedded Systems - CHES 2004, Lecture in Comput. Sci. 3156, Springer-Verlag, Berlin, 2004, pp. 148-162.
    • (2004) Cryptographic Hardware and Embedded Systems - CHES 2004 , pp. 148-162
    • Avanzi, R.1
  • 6
    • 0343736058 scopus 로고    scopus 로고
    • The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm
    • R. Balasubramanian and N. Koblitz, The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm, J. Cryptology, 11 (1998), pp. 141-145.
    • (1998) J. Cryptology , vol.11 , pp. 141-145
    • Balasubramanian, R.1    Koblitz, N.2
  • 7
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • Lecture Notes in Comput. Sci. 1462, Springer-Verlag, Berlin
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Relations among notions of security for public-key encryption schemes, in Advances in Cryptology - CRYPTO '98, Lecture Notes in Comput. Sci. 1462, Springer-Verlag, Berlin, 1998, pp. 26-45.
    • (1998) Advances in Cryptology - CRYPTO '98 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 10
    • 4344711588 scopus 로고    scopus 로고
    • Circuits for Integer Factorization: A Proposal
    • preprint
    • D. Bernstein, Circuits for Integer Factorization: A Proposal, preprint, 2001.
    • (2001)
    • Bernstein, D.1
  • 11
    • 84949244035 scopus 로고
    • Cryptographic protocols based on the discrete logarithm problem in real quadratic number fields
    • Lecture Notes in Comput. Sci. 839, Springer-Verlag, Berlin
    • I. Biehl, J. Buchmann, and C. Thiel, Cryptographic protocols based on the discrete logarithm problem in real quadratic number fields, in Advances in Cryptology - CRYPTO '94, Lecture Notes in Comput. Sci. 839, Springer-Verlag, Berlin, 1994, pp. 56-60.
    • (1994) Advances in Cryptology - CRYPTO '94 , pp. 56-60
    • Biehl, I.1    Buchmann, J.2    Thiel, C.3
  • 14
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
    • Lecture Notes in Comput. Sci. 1462, Springer-Verlag, Berlin
    • D. Bleichenbacher, Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1, in Advances in Cryptology - CRYPTO '98, Lecture Notes in Comput. Sci. 1462, Springer-Verlag, Berlin, 1998, pp. 1-12.
    • (1998) Advances in Cryptology - CRYPTO '98 , pp. 1-12
    • Bleichenbacher, D.1
  • 15
    • 0000552770 scopus 로고    scopus 로고
    • Twenty years of attacks on the RSA cryptosystem
    • D. Boneh, Twenty years of attacks on the RSA cryptosystem, Notices Amer. Math. Soc., 46 (1999), pp. 203-213.
    • (1999) Notices Amer. Math. Soc. , vol.46 , pp. 203-213
    • Boneh, D.1
  • 16
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • Lecture Notes in Comput. Sci. 1233, Springer-Verlag, Berlin
    • D. Boneh, R. Demillo, and R. Lipton, On the importance of checking cryptographic protocols for faults, in Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Comput. Sci. 1233, Springer-Verlag, Berlin, 1997, pp. 37-51.
    • (1997) Advances in Cryptology - EUROCRYPT '97 , pp. 37-51
    • Boneh, D.1    Demillo, R.2    Lipton, R.3
  • 18
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, SIAM J. Comput., 32 (2003), pp. 586-615.
    • (2003) SIAM J. Comput. , vol.32 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 19
    • 84955604812 scopus 로고    scopus 로고
    • Algorithms for black-box fields and their applications to cryptography
    • Lecture Notes in Comput. Sci. 1109, Springer-Verlag, Berlin
    • D. Boneh and R. Lipton, Algorithms for black-box fields and their applications to cryptography, in Advances in Cryptology - CRYPTO '96, Lecture Notes in Comput. Sci. 1109, Springer-Verlag, Berlin, 1996, pp. 283-297.
    • (1996) Advances in Cryptology - CRYPTO '96 , pp. 283-297
    • Boneh, D.1    Lipton, R.2
  • 20
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Lecture Notes in Comput. Sci. 2248, Springer-Verlag, Berlin
    • D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, in Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Comput. Sci. 2248, Springer-Verlag, Berlin, 2001, pp. 514-532.
    • (2001) Advances in Cryptology - ASIACRYPT 2001 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 21
    • 84957634529 scopus 로고    scopus 로고
    • Breaking RSA may not be equivalent to factoring
    • Lecture Notes in Comput. Sci. 1403, Springer-Verlag, Berlin
    • D. Boneh and R. Venkatesan, Breaking RSA may not be equivalent to factoring, in Advances in Cryptology - EUROCRYPT '98, Lecture Notes in Comput. Sci. 1403, Springer-Verlag, Berlin, 1998, pp. 59-71.
    • (1998) Advances in Cryptology - EUROCRYPT '98 , pp. 59-71
    • Boneh, D.1    Venkatesan, R.2
  • 22
    • 85034633063 scopus 로고
    • Breaking iterated knapsacks
    • Lecture Notes in Comput. Sci. 196, Springer-Verlag, Berlin
    • E. Brickell, Breaking iterated knapsacks, in Advances in Cryptology - CRYPTO '84, Lecture Notes in Comput. Sci. 196, Springer-Verlag, Berlin, 1985, pp. 342-358.
    • (1985) Advances in Cryptology - CRYPTO '84 , pp. 342-358
    • Brickell, E.1
  • 23
    • 0024012468 scopus 로고
    • Cryptanalysis: A survey of recent results
    • E. Brickell and A. Odlyzko, Cryptanalysis: A survey of recent results Proc. IEEE, 76 (1988), pp. 578-593.
    • (1988) Proc. IEEE , vol.76 , pp. 578-593
    • Brickell, E.1    Odlyzko, A.2
  • 25
    • 0028444535 scopus 로고
    • A key exchange protocol using real quadratic fields
    • J. Buchmann, R. Scheidler, and H. C. Williams, A key exchange protocol using real quadratic fields, J. Cryptology, 7 (1994), pp. 171-199.
    • (1994) J. Cryptology , vol.7 , pp. 171-199
    • Buchmann, J.1    Scheidler, R.2    Williams, H.C.3
  • 26
    • 0024139987 scopus 로고
    • A key exchange system based on imaginary quadratic fields
    • J. Buchmann and H. C. Williams, A key exchange system based on imaginary quadratic fields, J. Cryptology, 1 (1988), pp. 107-118.
    • (1988) J. Cryptology , vol.1 , pp. 107-118
    • Buchmann, J.1    Williams, H.C.2
  • 27
    • 0024079003 scopus 로고
    • A knapsack-type public key cryptosystem based on arithmetic in finite fields
    • B. Chor and R. Rivest, A knapsack-type public key cryptosystem based on arithmetic in finite fields, IEEE Trans. Inform. Theory, 34 (1988), pp. 901-909.
    • (1988) IEEE Trans. Inform. Theory , vol.34 , pp. 901-909
    • Chor, B.1    Rivest, R.2
  • 29
    • 0021468777 scopus 로고
    • Fast evaluation of logarithms in fields of characteristic two
    • D. Coppersmith, Fast evaluation of logarithms in fields of characteristic two, IEEE Trans. Inform. Theory, 30 (1984), pp. 587-594.
    • (1984) IEEE Trans. Inform. Theory , vol.30 , pp. 587-594
    • Coppersmith, D.1
  • 30
    • 84957355408 scopus 로고    scopus 로고
    • Lattice attacks on NTRU
    • Lecture Notes in Comput. Sci. 1233, Springer-Verlag, Berlin
    • D. Coppersmith and A. Shamir, Lattice attacks on NTRU, in Advances in Cryptology - EUROCRYPT '97, Lecture Notes in Comput. Sci. 1233, Springer-Verlag, Berlin, 1997, pp. 52-61.
    • (1997) Advances in Cryptology - EUROCRYPT '97 , pp. 52-61
    • Coppersmith, D.1    Shamir, A.2
  • 33
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. Elgamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory, 31 (1985), pp. 469-472.
    • (1985) IEEE Trans. Inform. Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 34
    • 0001782990 scopus 로고
    • Combinatorial cryptosystems galore!
    • M. Fellows and N. Koblitz, Combinatorial cryptosystems galore!, Contemp. Math., 168 (1994), pp. 51-61.
    • (1994) Contemp. Math , vol.168 , pp. 51-61
    • Fellows, M.1    Koblitz, N.2
  • 35
    • 0001113371 scopus 로고    scopus 로고
    • An extension of Satoh's algorithm and its implementation
    • M. Fouquet, P. Gaudry, and R. Harley, An extension of Satoh's algorithm and its implementation, J. Ramanujan Math. Soc., 15 (2000), pp. 281-318.
    • (2000) J. Ramanujan Math. Soc. , vol.15 , pp. 281-318
    • Fouquet, M.1    Gaudry, P.2    Harley, R.3
  • 36
    • 84968502759 scopus 로고
    • A remark A concerning m-divisibility and the discrete logarithm in the divisor class group of curves
    • G. Frey and H. Rück, A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves, Math. Comp., 62 (1994), pp. 865-874.
    • (1994) Math. Comp. , vol.62 , pp. 865-874
    • Frey, G.1    Rück, H.2
  • 37
    • 84948978775 scopus 로고    scopus 로고
    • An algorithm for solving the discrete log problem on hyperelliptic curves
    • Lecture Notes in Comput. Sci. 1807, Springer-Verlag, Berlin
    • P. Gaudry, An algorithm for solving the discrete log problem on hyperelliptic curves, in Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Comput. Sci. 1807, Springer-Verlag, Berlin, 2000, pp. 19-34.
    • (2000) Advances in Cryptology - EUROCRYPT 2000 , pp. 19-34
    • Gaudry, P.1
  • 38
    • 84958773354 scopus 로고    scopus 로고
    • A comparison and a combination of SST and AGM algorithms for counting points of elliptic curves in characteristic 2
    • Lecture Notes in Comput. Sci. 2656, Springer-Verlag, Berlin
    • P. Gaudry, A comparison and a combination of SST and AGM algorithms for counting points of elliptic curves in characteristic 2, in Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Comput. Sci. 2656, Springer-Verlag, Berlin, 2003, pp. 311-327.
    • (2003) Advances in Cryptology - EUROCRYPT 2003 , pp. 311-327
    • Gaudry, P.1
  • 40
    • 0001788567 scopus 로고    scopus 로고
    • Constructive and destructive facets of Weil descent on elliptic curves
    • P. Gaudry, F. Hess, and N. Smart, Constructive and destructive facets of Weil descent on elliptic curves, J. Cryptology, 15 (2002), pp. 19-34.
    • (2002) J. Cryptology , vol.15 , pp. 19-34
    • Gaudry, P.1    Hess, F.2    Smart, N.3
  • 42
    • 35248821952 scopus 로고    scopus 로고
    • Cryptanalysis of the NTRU signature scheme (NSS) from Eurocrypt 2001
    • Lecture Notes in Comput. Sci. 2248, Springer-Verlag, Berlin
    • C. Gentry, J. Jonsson, M. Szydlo, and J. Stern, Cryptanalysis of the NTRU signature scheme (NSS) from Eurocrypt 2001, in Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Comput. Sci. 2248, Springer-Verlag, Berlin, 2001, pp. 1-20.
    • (2001) Advances in Cryptology - ASIACRYPT 2001 , pp. 1-20
    • Gentry, C.1    Jonsson, J.2    Szydlo, M.3    Stern, J.4
  • 43
    • 84947222499 scopus 로고    scopus 로고
    • Analysis of the revised NTRU signature scheme R-NSS
    • Lecture Notes in Comput. Sci. 2332, Springer-Verlag, Berlin
    • C. Gentry and M. Szydlo, Analysis of the revised NTRU signature scheme R-NSS, in Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Comput. Sci. 2332, Springer-Verlag, Berlin, 2002, pp. 299-320.
    • (2002) Advances in Cryptology - EUROCRYPT 2002 , pp. 299-320
    • Gentry, C.1    Szydlo, M.2
  • 45
    • 0033321914 scopus 로고    scopus 로고
    • Public-key cryptosystems based on cubic finite field extensions
    • G. Gong and L. Harn, Public-key cryptosystems based on cubic finite field extensions, IEEE Trens. Inform. Theory, 45 (1999), pp. 2601-2605.
    • (1999) IEEE Trens. Inform. Theory , vol.45 , pp. 2601-2605
    • Gong, G.1    Harn, L.2
  • 46
    • 0000303380 scopus 로고
    • Discrete logarithms in GF(p) using the number field sieve
    • D. M. Gordon, Discrete logarithms in GF(p) using the number field sieve, SIAM J. Discrete Math., 6 (1993), pp. 124-138.
    • (1993) SIAM J. Discrete Math , vol.6 , pp. 124-138
    • Gordon, D.M.1
  • 47
    • 84968519059 scopus 로고
    • A rigorous subexponential algorithm for computation of class groups
    • J. L. Hafner and K. S. McCurley, A rigorous subexponential algorithm for computation of class groups, J. Amer. Math. Soc., 2 (1989), pp. 839-850.
    • (1989) J. Amer. Math. Soc. , vol.2 , pp. 839-850
    • Hafner, J.L.1    McCurley, K.S.2
  • 49
    • 0023985175 scopus 로고
    • Solving simultaneous modular equations of low degree
    • J. Håstad, Solving simultaneous modular equations of low degree SIAM J. Comput., 17 (1988), pp. 336-341.
    • (1988) SIAM J. Comput. , vol.17 , pp. 336-341
    • Håstad, J.1
  • 50
    • 0018019325 scopus 로고
    • Hiding information and signatures in trapdoor knapsacks
    • M. E. Hellman and R. C. Merkle, Hiding information and signatures in trapdoor knapsacks, IEEE Trans. Inform. Theory, 24 (1978), pp. 525-530.
    • (1978) IEEE Trans. Inform. Theory , vol.24 , pp. 525-530
    • Hellman, M.E.1    Merkle, R.C.2
  • 51
    • 35248867395 scopus 로고    scopus 로고
    • The GHS attack revisited
    • Lecture Notes in Comput. Sci. 2656, Springer-Verlag, Berlin
    • F. Hess, The GHS attack revisited, in Advances in Cryptology - EUROCRYPT 2003, Lecture Notes in Comput. Sci. 2656, Springer-Verlag, Berlin, 2003, pp. 374-387.
    • (2003) Advances in Cryptology - EUROCRYPT 2003 , pp. 374-387
    • Hess, F.1
  • 53
    • 38049018110 scopus 로고    scopus 로고
    • NSS: An NTRU lattice-based signature scheme
    • Lecture Notes in Comput. Sci. 2045, Springer-Verlag, Berlin
    • J. Hoffstein, J. Pipher, and J. Silverman, NSS: An NTRU lattice-based signature scheme, in Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Comput. Sci. 2045, Springer-Verlag, Berlin, 2001, pp. 211-228.
    • (2001) Advances in Cryptology - EUROCRYPT 2001 , pp. 211-228
    • Hoffstein, J.1    Pipher, J.2    Silverman, J.3
  • 55
    • 84947423684 scopus 로고    scopus 로고
    • A linear algebraic attack on the AAFG1 braid group cryptosystem
    • Lecture Notes in Comput. Sci. 2384, Springer-Verlag, Berlin
    • J. Hughes, A linear algebraic attack on the AAFG1 braid group cryptosystem, in Proceedings of the 7th Australian Conference on Information Security and Privacy ACISP 2002, Lecture Notes in Comput. Sci. 2384, Springer-Verlag, Berlin, 2002, pp. 176-189.
    • (2002) Proceedings of the 7th Australian Conference on Information Security and Privacy ACISP 2002 , pp. 176-189
    • Hughes, J.1
  • 56
    • 84947711740 scopus 로고    scopus 로고
    • Efficient implementation of Schoof's algorithm
    • Lecture Notes in Comput. Sci. 1514, Springer-Verlag, Berlin
    • T. Izu, J. Kogure, M. Noro, and K. Yokoyama, Efficient implementation of Schoof's algorithm, in Advances in Cryptology - ASIACRYPT '98, Lecture Notes in Comput. Sci. 1514, Springer-Verlag, Berlin, 1998, pp. 66-79.
    • (1998) Advances in Cryptology - ASIACRYPT '98 , pp. 66-79
    • Izu, T.1    Kogure, J.2    Noro, M.3    Yokoyama, K.4
  • 58
    • 11344293445 scopus 로고    scopus 로고
    • Solving elliptic curve discrete logarithm problems using Weil descent
    • M. Jacobson, A. Menezes, and A. Stein, Solving elliptic curve discrete logarithm problems using Weil descent, J. Ramanujan Math. Soc., 16 (2001), pp. 231-260.
    • (2001) J. Ramanujan Math. Soc. , vol.16 , pp. 231-260
    • Jacobson, M.1    Menezes, A.2    Stein, A.3
  • 59
    • 84974588978 scopus 로고    scopus 로고
    • A chosen ciphertext attack against NTRU
    • Lecture Notes in Comput. Sci. 1880, Springer-Verlag, Berlin
    • E. Jaulmes and A. Joux, A chosen ciphertext attack against NTRU, in Advances in Cryptology - CRYPTO 2000, Lecture Notes in Comput. Sci. 1880, Springer-Verlag, Berlin, 2000, pp. 20-35.
    • (2000) Advances in Cryptology - CRYPTO 2000 , pp. 20-35
    • Jaulmes, E.1    Joux, A.2
  • 60
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • Lecture Notes in Comput. Sci. 1838, Springer-Verlag, Berlin
    • A. Joux, A one round protocol for tripartite Diffie-Hellman, in Algorithmic Number Theory: Fourth International Symposium, Lecture Notes in Comput. Sci. 1838, Springer-Verlag, Berlin, 2000, pp. 385-393.
    • (2000) Algorithmic Number Theory: Fourth International Symposium , pp. 385-393
    • Joux, A.1
  • 61
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, Elliptic curve cryptosystems, Math. Comp., 48 (1987), pp. 203-209.
    • (1987) Math. Comp. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 62
    • 0024864204 scopus 로고
    • Hyperelliptic cryptosystems
    • N. Koblitz, Hyperelliptic cryptosystems, J. Cryptology, 1 (1989), pp. 139-150.
    • (1989) J. Cryptology , vol.1 , pp. 139-150
    • Koblitz, N.1
  • 63
    • 85030323959 scopus 로고
    • Constructing elliptic curve cryptosystems in characteristic 2
    • Lecture Notes in Comput. Sci. 537, Springer-Verlag, Berlin
    • N. Koblitz, Constructing elliptic curve cryptosystems in characteristic 2, in Advances in Cryptology - CRYPTO '90, Lecture Notes in Comput. Sci. 537, Springer-Verlag, Berlin, 1991, pp. 156-167.
    • (1991) Advances in Cryptology - CRYPTO '90 , pp. 156-167
    • Koblitz, N.1
  • 64
    • 0348022988 scopus 로고
    • Elliptic curve implementation of zero-knowledge blobs
    • N. Koblitz, Elliptic curve implementation of zero-knowledge blobs, J. Cryptology, 4 (1991), pp. 207-213.
    • (1991) J. Cryptology , vol.4 , pp. 207-213
    • Koblitz, N.1
  • 65
    • 85024567680 scopus 로고
    • CM-curves with good cryptographic properties
    • Lecture Notes in Comput. Sci. 576, Springer-Verlag, Berlin
    • N. Koblitz, CM-curves with good cryptographic properties, in Advances in Cryptology - CRYPTO '91, Lecture Notes in Comput. Sci. 576, Springer-Verlag, Berlin, 1992, pp. 279-287.
    • (1992) Advances in Cryptology - CRYPTO '91 , pp. 279-287
    • Koblitz, N.1
  • 68
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Lecture Notes in Comput. Sci. 1109, Springer-Verlag, Berlin
    • P. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, in Advances in Cryptology - CRYPTO '96, Lecture Notes in Comput. Sci. 1109, Springer-Verlag, Berlin, 1996, pp. 104-113.
    • (1996) Advances in Cryptology - CRYPTO '96 , pp. 104-113
    • Kocher, P.1
  • 69
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Lecture Notes in Comput. Sci. 1666, Springer-Verlag, Berlin
    • P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, in Advances in Cryptology - CRYPTO '99, Lecture Notes in Comput. Sci. 1666, Springer-Verlag, Berlin, 1999, pp. 388-397.
    • (1999) Advances in Cryptology - CRYPTO '99 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 70
    • 85009967725 scopus 로고
    • Constructing elliptic curves with given group order over large finite fields
    • Lecture Notes in Comput. Sci. 877, Springer-Verlag, Berlin
    • G. Lay and H. Zimmer, Constructing elliptic curves with given group order over large finite fields, in Algorithmic Number Theory: First International Symposium, Lecture Notes in Comput. Sci. 877, Springer-Verlag, Berlin, 1994, pp. 250-263.
    • (1994) Algorithmic Number Theory: First International Symposium , pp. 250-263
    • Lay, G.1    Zimmer, H.2
  • 71
    • 34250244723 scopus 로고
    • Factoring polynomials with integer coefficients
    • A. K. Lenstra, H. W. Lenstra, Jr., and L. Lovasz, Factoring polynomials with integer coefficients, Math. Ann., 261 (1982), pp. 513-534.
    • (1982) Math. Ann. , vol.261 , pp. 513-534
    • Lenstra, A.K.1    Lenstra Jr., H.W.2    Lovasz, L.3
  • 72
    • 84948989672 scopus 로고    scopus 로고
    • Analysis and optimization of the TWINKLE factoring device
    • Lecture Notes in Comput. Sci. 1807, Springer-Verlag, Berlin
    • A. K. Lenstra and A. Shamir, Analysis and optimization of the TWINKLE factoring device, in Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Comput. Sci. 1807, Springer-Verlag, Berlin, 2000, pp. 35-52.
    • (2000) Advances in Cryptology - EUROCRYPT 2000 , pp. 35-52
    • Lenstra, A.K.1    Shamir, A.2
  • 73
    • 84974628135 scopus 로고    scopus 로고
    • The XTR public key system
    • Lecture Notes in Comput. Sci. 1880, Springer-Verlag, Berlin
    • A. K. Lenstra and E. R. Verheul, The XTR public key system, in Advances in Cryptology - CRYPTO 2000, Lecture Notes in Comput. Sci. 1880, Springer-Verlag, Berlin, 2000, pp. 1-19.
    • (2000) Advances in Cryptology - CRYPTO 2000 , pp. 1-19
    • Lenstra, A.K.1    Verheul, E.R.2
  • 74
    • 0001258323 scopus 로고
    • Factoring integers with elliptic curves
    • H. W. Lenstra, Jr., Factoring integers with elliptic curves, Ann. of Math. (2), 126 (1987), pp. 649-673.
    • (1987) Ann. of Math. , vol.126 , Issue.2 , pp. 649-673
    • Lenstra Jr., H.W.1
  • 75
    • 85034665565 scopus 로고
    • A public key cryptosystem based on the word problem Berlin
    • Lecture Notes in Comput. Sci. 196, Springer-Verlag
    • M. Magyarik and N. Wagner, A public key cryptosystem based on the word problem, in Advances in Cryptology - CRYPTO '84, Lecture Notes in Comput. Sci. 196, Springer-Verlag, Berlin, 1985, pp. 19-36.
    • (1985) Advances in Cryptology - CRYPTO '84 , pp. 19-36
    • Magyarik, M.1    Wagner, N.2
  • 76
    • 33846862428 scopus 로고    scopus 로고
    • A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1 v2.0
    • Lecture Notes in Comput. Sci. 2139, Springer-Verlag, Berlin
    • J. Manger, A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1 v2.0, in Advances in Cryptology - CRYPTO 2001, Lecture Notes in Comput. Sci. 2139, Springer-Verlag, Berlin, 2001, pp. 230-238.
    • (2001) Advances in Cryptology - CRYPTO 2001 , pp. 230-238
    • Manger, J.1
  • 78
    • 11344252143 scopus 로고    scopus 로고
    • Analysis of the GHS Weil descent attack on the ECDLP over characteristic two finite fields of composite degree
    • M. Maurer, A. Menezes, and E. Teske, Analysis of the GHS Weil descent attack on the ECDLP over characteristic two finite fields of composite degree, LMS J. Comput. Math., 5 (2002), pp. 127-174.
    • (2002) LMS J. Comput. Math. , vol.5 , pp. 127-174
    • Maurer, M.1    Menezes, A.2    Teske, E.3
  • 79
    • 0032621240 scopus 로고    scopus 로고
    • The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms
    • U. M. Maurer and S. Wolf, The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms, SIAM J. Comput., 28 (1999), pp. 1689-1721.
    • (1999) SIAM J. Comput. , vol.28 , pp. 1689-1721
    • Maurer, U.M.1    Wolf, S.2
  • 80
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • A. Menezes, T. Okamoto, and S. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Trans. Inform. Theory, 39 (1993), pp. 1639-1646.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 1639-1646
    • Menezes, A.1    Okamoto, T.2    Vanstone, S.3
  • 81
    • 33847320580 scopus 로고    scopus 로고
    • Analysis of the Weil descent attack of Gaudry, Hess and Smart
    • Lecture Notes in Comput. Sci. 2020, Springer-Verlag, Berlin
    • A. Menezes and M. Qu, Analysis of the Weil descent attack of Gaudry, Hess and Smart, in Topics in Cryptology - CT-RSA 2001, Lecture Notes in Comput. Sci. 2020, Springer-Verlag, Berlin, 2001, pp. 308-318.
    • (2001) Topics in Cryptology - CT-RSA 2001 , pp. 308-318
    • Menezes, A.1    Qu, M.2
  • 82
    • 35048833769 scopus 로고    scopus 로고
    • Weak fields for ECC
    • Lecture Notes in Comput. Sci. 2964, Springer-Verlag, Berlin
    • A. Menezes, E. Teske, and A. Weng, Weak fields for ECC, in Topics in Cryptology - CT-RSA 2004, Lecture Notes in Comput. Sci. 2964, Springer-Verlag, Berlin, 2004, pp. 366-386.
    • (2004) Topics in Cryptology - CT-RSA 2004 , pp. 366-386
    • Menezes, A.1    Teske, E.2    Weng, A.3
  • 84
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography
    • Lecture Notes in Comput. Sci. 218, Springer-Verlag, Berlin
    • V. Miller, Uses of elliptic curves in cryptography, in Advances in Cryptology - CRYPTO '85, Lecture Notes in Comput. Sci. 218, Springer-Verlag, Berlin, 1986, pp. 417-426.
    • (1986) Advances in Cryptology - CRYPTO '85 , pp. 417-426
    • Miller, V.1
  • 86
    • 84889062986 scopus 로고
    • Building cyclic elliptic curves modulo large primes
    • Lecture Notes in Comput. Sci. 547, Springer-Verlag, Berlin
    • F. Morain, Building cyclic elliptic curves modulo large primes, in Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Comput. Sci. 547, Springer-Verlag, Berlin, 1991, pp. 328-336.
    • (1991) Advances in Cryptology - EUROCRYPT '91 , pp. 328-336
    • Morain, F.1
  • 87
    • 0002996665 scopus 로고
    • On the algorithmic unsolvability of the word problem in group theory
    • P. S. Novikov, On the algorithmic unsolvability of the word problem in group theory, Trudy Mat. Inst. im. Steklov., 44 (1955), pp. 1-143.
    • (1955) Trudy Mat. Inst. Im. Steklov , vol.44 , pp. 1-143
    • Novikov, P.S.1
  • 89
    • 84957640013 scopus 로고
    • Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt '88
    • Lecture Notes in Comput. Sci. 963, Springer-Verlag, Berlin
    • J. Patarin, Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt '88, in Advances in Cryptology - CRYPTO '95, Lecture Notes in Comput. Sci. 963, Springer-Verlag, Berlin, 1995, pp. 248-261.
    • (1995) Advances in Cryptology - CRYPTO '95 , pp. 248-261
    • Patarin, J.1
  • 90
    • 84947932132 scopus 로고    scopus 로고
    • Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms
    • Lecture Notes in Comput. Sci. 1070, Springer-Verlag, Berlin
    • J. Patarin, Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms, in Advances in Cryptology - EUROCRYPT '96, Lecture Notes in Comput. Sci. 1070, Springer-Verlag, Berlin, 1996, pp. 33-48.
    • (1996) Advances in Cryptology - EUROCRYPT '96 , pp. 33-48
    • Patarin, J.1
  • 91
    • 84955622221 scopus 로고    scopus 로고
    • Asymmetric cryptography with a hidden monomial
    • Lecture Notes in Comput. Sci. 1109, Springer-Verlag, Berlin
    • J. Patarin, Asymmetric cryptography with a hidden monomial, in Advances in Cryptology - CRYPTO '96, Lecture Notes in Comput. Sci. 1109, Springer-Verlag, Berlin, 1996, pp. 45-60.
    • (1996) Advances in Cryptology - CRYPTO '96 , pp. 45-60
    • Patarin, J.1
  • 92
    • 35248899925 scopus 로고    scopus 로고
    • Hyperelliptic curve cryptosystems: Closing the performance gap to elliptic curves
    • Lecture Notes in Comput. Sci. 2779, Springer-Verlag, Berlin
    • J. Pelzl, T. Wollinger, J. Guajardo, and C. Paar, Hyperelliptic curve cryptosystems: Closing the performance gap to elliptic curves, in Cryptographic Hardware and Embedded Systems - CHES 2003, Lecture Notes in Comput. Sci. 2779, Springer-Verlag, Berlin, 2003, pp. 351-365.
    • (2003) Cryptographic Hardware and Embedded Systems - CHES 2003 , pp. 351-365
    • Pelzl, J.1    Wollinger, T.2    Guajardo, J.3    Paar, C.4
  • 93
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • S. Poslig and M. Hellman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Trans. Inform. Theory, 24 (1978), pp. 106-110.
    • (1978) IEEE Trans. Inform. Theory , vol.24 , pp. 106-110
    • Poslig, S.1    Hellman, M.2
  • 94
    • 84966238549 scopus 로고
    • Monte Carlo methods for index computation mod p
    • J. Pollard, Monte Carlo methods for index computation mod p, Math. Comp., 32 (1978), pp. 918-924.
    • (1978) Math. Comp. , vol.32 , pp. 918-924
    • Pollard, J.1
  • 95
    • 33645002788 scopus 로고
    • Factoring with cubic integers
    • Lecture Notes in Math. 1554, Springer-Verlag, Berlin
    • J. Pollard, Factoring with cubic integers, in The Development of the Number Field Sieve, Lecture Notes in Math. 1554, Springer-Verlag, Berlin, 1993, pp. 4-10.
    • (1993) The Development of the Number Field Sieve , pp. 4-10
    • Pollard, J.1
  • 96
    • 0141457783 scopus 로고    scopus 로고
    • Shor's discrete logarithm quantum algorithm for elliptic curves
    • J. Proos and C. Zalka, Shor's discrete logarithm quantum algorithm for elliptic curves, Quantum Inf. Comput., 3 (2003), pp. 317-344.
    • (2003) Quantum Inf. Comput. , vol.3 , pp. 317-344
    • Proos, J.1    Zalka, C.2
  • 97
    • 0016090968 scopus 로고
    • A high-security log-in procedure
    • G. Purdy, A high-security log-in procedure, Coram. ACM, 17 (1974), pp. 442-445.
    • (1974) Coram. ACM , vol.17 , pp. 442-445
    • Purdy, G.1
  • 98
    • 0017930809 scopus 로고
    • A Method for obtaining digital signatures and public key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Comm. ACM, 21 (1978), pp. 120-126.
    • (1978) Comm. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 100
    • 0001100056 scopus 로고    scopus 로고
    • The canonical lift of an ordinary elliptic curve over a prime field and its point counting
    • T. Satoh, The canonical lift of an ordinary elliptic curve over a prime field and its point counting, J. Ramanujan Math. Soc., 15 (2000), pp. 247-270.
    • (2000) J. Ramanujan Math. Soc. , vol.15 , pp. 247-270
    • Satoh, T.1
  • 101
    • 0343623059 scopus 로고    scopus 로고
    • Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves
    • T. satoh and K. Araki, Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves, Comment. Math. Univ. St. Paul., 47 (1998), pp. 81-92.
    • (1998) Comment. Math. Univ. St. Paul , vol.47 , pp. 81-92
    • Satoh, T.1    Araki, K.2
  • 102
    • 0037273463 scopus 로고    scopus 로고
    • Fast computation of canonical lifts of elliptic curves and its application to point counting
    • T. Satoh, B. Skjernaa, and Y. Taguchi, Fast computation of canonical lifts of elliptic curves and its application to point counting, Finite Fields Appl., 9 (2003), pp. 89-101.
    • (2003) Finite Fields Appl. , vol.9 , pp. 89-101
    • Satoh, T.1    Skjernaa, B.2    Taguchi, Y.3
  • 104
    • 84966233278 scopus 로고
    • Elliptic curves over finite fields and the computation of square roots mod p
    • R. Schoof, Elliptic curves over finite fields and the computation of square roots mod p, Math. Comp., 44 (1985), pp. 483-494.
    • (1985) Math. Comp. , vol.44 , pp. 483-494
    • Schoof, R.1
  • 105
    • 38249034734 scopus 로고
    • Nonsingular plane cubic curves
    • R. Schoof, Nonsingular plane cubic curves, J. Combin. Theory Ser. A, 46 (1987), pp. 183-211.
    • (1987) J. Combin. Theory Ser. A , vol.46 , pp. 183-211
    • Schoof, R.1
  • 106
    • 0032352723 scopus 로고    scopus 로고
    • Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p
    • I. Semaev, Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p, Math. Comp., 67 (1998), pp. 353-356
    • (1998) Math. Comp. , vol.67 , pp. 353-356
    • Semaev, I.1
  • 107
    • 0020250504 scopus 로고
    • A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem
    • IEEE Computer Society Press, New York
    • A. Shamir, A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem, in Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, IEEE Computer Society Press, New York, 1982, pp. 145-152.
    • (1982) Proceedings of the 23rd Annual Symposium on Foundations of Computer Science , pp. 145-152
    • Shamir, A.1
  • 108
    • 35248849882 scopus 로고    scopus 로고
    • Factoring large numbers with the TWIRL device
    • Lecture Notes in Comput. Sci. 2729, Springer-Verlag, Berlin
    • A. Shamir and E. Tromer, Factoring large numbers with the TWIRL device, in Advances in Cryptology - CRYPTO 2003, Lecture Notes in Comput. Sci. 2729, Springer-Verlag, Berlin, 2003, pp. 1-26.
    • (2003) Advances in Cryptology - CRYPTO 2003 , pp. 1-26
    • Shamir, A.1    Tromer, E.2
  • 109
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • P. W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Comput., 26 (1997), 1484-1509.
    • (1997) SIAM J. Comput. , vol.26 , pp. 1484-1509
    • Shor, P.W.1
  • 110
    • 0003474033 scopus 로고    scopus 로고
    • The Arithmetic of Elliptic Curves
    • Springer-Verlag, New York
    • J. Silverman, The Arithmetic of Elliptic Curves, Springer-Verlag, New York, 1986.
    • , vol.1986
    • Silverman, J.1
  • 111
    • 0012234171 scopus 로고    scopus 로고
    • The xedni calculus and the elliptic curve discrete logarithm problem
    • J. Silverman, The xedni calculus and the elliptic curve discrete logarithm problem, Des. Codes Cryptogr., 20 (2000), pp. 5-40.
    • (2000) Des. Codes Cryptogr. , vol.20 , pp. 5-40
    • Silverman, J.1
  • 112
    • 84947727672 scopus 로고    scopus 로고
    • Elliptic curve discrete logarithms and the index calculus
    • Lecture Notes in Comput. Sci. 1514, Springer-Verlag, Berlin
    • J. Silverman and J. Suzuki, Elliptic curve discrete logarithms and the index calculus, Advances in Cryptology - ASIACRYPT '98, Lecture Notes in Comput. Sci. 1514, Springer-Verlag, Berlin, 1998, pp. 110-125.
    • (1998) Advances in Cryptology - ASIACRYPT '98 , pp. 110-125
    • Silverman, J.1    Suzuki, J.2
  • 113
    • 0003539458 scopus 로고    scopus 로고
    • The discrete logarithm problem on elliptic curves of trace one
    • N. Smart, The discrete logarithm problem on elliptic curves of trace one, J. Cryptology, 12 (1999), pp. 193-196.
    • (1999) J. Cryptology , vol.12 , pp. 193-196
    • Smart, N.1
  • 114
    • 0010029876 scopus 로고    scopus 로고
    • Efficient arithmetic on Koblitz curves
    • J. Solinas, Efficient arithmetic on Koblitz curves, Des. Codes Cryptogr., 19 (2000), pp. 195-249.
    • (2000) Des. Codes Cryptogr. , vol.19 , pp. 195-249
    • Solinas, J.1
  • 116
    • 84947761194 scopus 로고    scopus 로고
    • Speeding up Pollard's rho method for computing discrete logarithms
    • Lecture Notes in Comput. Sci. 1423, Springer-Verlag, Berlin
    • E. Teske, Speeding up Pollard's rho method for computing discrete logarithms, in Algorithmic Number Theory: Third International Symposium, Lecture Notes in Comput. Sci. 1423, Springer-Verlag, Berlin, 1998, pp. 541-554.
    • (1998) Algorithmic Number Theory: Third International Symposium , pp. 541-554
    • Teske, E.1
  • 117
    • 0345058968 scopus 로고    scopus 로고
    • Index calculus attack for hyperelliptic curves of small genus
    • Lecture Notes in Comput. Sci. 2894, Springer-Verlag, Berlin
    • N. Thériault, Index calculus attack for hyperelliptic curves of small genus, in Advances in Cryptology - ASIACRYPT 2003, Lecture Notes in Comput. Sci. 2894, Springer-Verlag, Berlin, 2003, pp. 75-92.
    • (2003) Advances in Cryptology - ASIACRYPT 2003 , pp. 75-92
    • Thériault, N.1
  • 119
    • 84957701870 scopus 로고    scopus 로고
    • Cryptanalysis of the Chor-Rivest cryptosystem
    • Lecture Notes in Comput. Sci. 1462, Springer-Verlag, Berlin
    • S. Vaudenay, Cryptanalysis of the Chor-Rivest cryptosystem, in Advances in Cryptology - CRYPTO '98, Lecture Notes in Comput. Sci. 1462, Springer-Verlag, Berlin, 1998, pp. 243-256.
    • (1998) Advances in Cryptology - CRYPTO '98 , pp. 243-256
    • Vaudenay, S.1
  • 120
    • 84945129491 scopus 로고    scopus 로고
    • Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
    • Lecture Notes in Comput. Sci. 2045, Springer-Verlag, Berlin
    • E. Verheul, Evidence that XTR is more secure than supersingular elliptic curve cryptosystems, in Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Comput. Sci. 2045, Springer-Verlag, Berlin, 2001, pp. 195-210.
    • (2001) Advances in Cryptology - EUROCRYPT 2001 , pp. 195-210
    • Verheul, E.1
  • 122
    • 0001556633 scopus 로고
    • Abelian varieties over finite fields
    • W. Waterhouse, Abelian varieties over finite fields, Ann. Sci. École Norm. Sup. (4), 2 (1969), pp. 521-560.
    • (1969) Ann. Sci. École Norm. Sup. , vol.2 , Issue.4 , pp. 521-560
    • Waterhouse, W.1
  • 123
    • 0025430939 scopus 로고
    • Cryptanalysis of short RSA secret exponents
    • M. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Trans. Inform. Theory, 36 (1990), pp. 553-558.
    • (1990) IEEE Trans. Inform. Theory , vol.36 , pp. 553-558
    • Wiener, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.