-
1
-
-
84966219173
-
Elliptic curves and primality proving
-
0792.11056 10.2307/2152935 1199989
-
A.O.L. Atkin F. Morain 1993 Elliptic curves and primality proving Math. Comput. 61 29 68 0792.11056 10.2307/2152935 1199989
-
(1993)
Math. Comput.
, vol.61
, pp. 29-68
-
-
Atkin, A.O.L.1
Morain, F.2
-
2
-
-
0001224411
-
Efficient arithmetic in finite field extensions with application in elliptic curve cryptography
-
1050.11100 1837786
-
D. Bailey C. Paar 2001 Efficient arithmetic in finite field extensions with application in elliptic curve cryptography J. Cryptol. 14 153 176 1050.11100 1837786
-
(2001)
J. Cryptol.
, vol.14
, pp. 153-176
-
-
Bailey, D.1
Paar, C.2
-
3
-
-
0343736058
-
The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm
-
0978.94038 10.1007/s001459900040 1620936
-
R. Balasubramanian N. Koblitz 1998 The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm J. Cryptol. 11 141 145 0978.94038 10.1007/s001459900040 1620936
-
(1998)
J. Cryptol.
, vol.11
, pp. 141-145
-
-
Balasubramanian, R.1
Koblitz, N.2
-
4
-
-
33745604534
-
Pairing-friendly elliptic curves of prime order
-
DOI 10.1007/11693383-22, Selected Areas in Cryptography - 12th International Workshop, SAC 2005, Revised Selected Papers
-
P.S.L.M. Barreto, M. Naehrig, Pairing-friendly elliptic curves of prime order, in Selected Areas in Cryptography-SAC 2005. Lecture Notes in Computer Science, vol. 3897 (Springer, Berlin, 2006), pp. 319-331 (Pubitemid 43986803)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3897
, pp. 319-331
-
-
Barreto, P.S.L.M.1
Naehrig, M.2
-
5
-
-
35248835023
-
Constructing elliptic curves with prescribed embedding degrees
-
Springer Berlin
-
P.S.L.M. Barreto, B. Lynn, M. Scott, Constructing elliptic curves with prescribed embedding degrees, in Security in Communication Networks-SCN 2002. Lecture Notes in Computer Science, vol. 2576 (Springer, Berlin, 2002), pp. 263-273
-
(2002)
Security in Communication Networks-SCN 2002 Lecture Notes in Computer Science
, vol.2576
, pp. 263-273
-
-
Barreto, P.S.L.M.1
Lynn, B.2
Scott, M.3
-
6
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Springer Berlin. 10.1007/3-540-45708-9-23
-
P.S.L.M. Barreto, H.Y. Kim, B. Lynn, M. Scott, Efficient algorithms for pairing-based cryptosystems, in Advances in Cryptology-Crypto 2002. Lecture Notes in Computer Science, vol. 2442 (Springer, Berlin, 2002), pp. 354-368
-
(2002)
Advances in Cryptology-Crypto 2002 Lecture Notes in Computer Science
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
7
-
-
35048900981
-
On the selection of pairing-friendly groups
-
Springer Berlin
-
P.S.L.M. Barreto, B. Lynn, M. Scott, On the selection of pairing-friendly groups, in Selected Areas in Cryptography-SAC 2003. Lecture Notes in Computer Science, vol. 3006 (Springer, Berlin, 2003), pp. 17-25
-
(2003)
Selected Areas in Cryptography-SAC 2003 Lecture Notes in Computer Science
, vol.3006
, pp. 17-25
-
-
Barreto, P.S.L.M.1
Lynn, B.2
Scott, M.3
-
9
-
-
84968508650
-
A heuristic asymptotic formula concerning the distribution of prime numbers
-
0105.03302 10.2307/2004056 148632
-
P. Bateman R. Horn 1962 A heuristic asymptotic formula concerning the distribution of prime numbers Math. Comput. 16 363 367 0105.03302 10.2307/2004056 148632
-
(1962)
Math. Comput.
, vol.16
, pp. 363-367
-
-
Bateman, P.1
Horn, R.2
-
10
-
-
84864158414
-
On the security of pairing-friendly abelian varieties over non-prime fields
-
to appear. Preprint available at:
-
N. Benger, M. Charlemagne, D. Freeman, On the security of pairing-friendly abelian varieties over non-prime fields, in Pairing-Based Cryptography-Pairing 2009, to appear. Preprint available at: http://eprint.iacr.org/2008/417/
-
Pairing-Based Cryptography-Pairing 2009
-
-
Benger, N.1
Charlemagne, M.2
Freeman, D.3
-
11
-
-
23044483770
-
-
I.F. Blake G. Seroussi N.P. Smart (eds). Cambridge University Press Cambridge 1089.94018
-
I.F. Blake, G. Seroussi, N.P. Smart (eds.), Advances in Elliptic Curve Cryptography (Cambridge University Press, Cambridge, 2005)
-
(2005)
Advances in Elliptic Curve Cryptography
-
-
-
12
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Springer Berlin. 10.1007/3-540-44647-8-13 Full version: SIAM J. Comput. 32(3), 586-615 (2003)
-
D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, in Advances in Cryptology-Crypto 2001. Lecture Notes in Computer Science, vol. 2139 (Springer, Berlin, 2001), pp. 213-229. Full version: SIAM J. Comput. 32(3), 586-615 (2003)
-
(2001)
Advances in Cryptology-Crypto 2001 Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
13
-
-
84946840347
-
Short signatures from the Weil pairing
-
Springer Berlin. 10.1007/3-540-45682-1-30 Full version: J. Cryptol. 17, 297-319 (2004)
-
D. Boneh, B. Lynn, H. Shacham, Short signatures from the Weil pairing, in Advances in Cryptology-Asiacrypt 2001. Lecture Notes in Computer Science, vol. 2248 (Springer, Berlin, 2002), pp. 514-532. Full version: J. Cryptol. 17, 297-319 (2004)
-
(2002)
Advances in Cryptology-Asiacrypt 2001 Lecture Notes in Computer Science
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
14
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Springer Berlin
-
D. Boneh, E.-J. Goh, K. Nissim, Evaluating 2-DNF formulas on ciphertexts, in Theory of Cryptography Conference-TCC 2005. Lecture Notes in Computer Science, vol. 3378 (Springer, Berlin, 2005), pp. 325-341
-
(2005)
Theory of Cryptography Conference-TCC 2005 Lecture Notes in Computer Science
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
15
-
-
0031232428
-
The Magma algebra system. I. The user language
-
0898.68039 10.1006/jsco.1996.0125 1484478
-
W. Bosma J. Cannon C. Playoust 1997 The Magma algebra system. I. The user language J. Symb. Comput. 24 3-4 235 265 0898.68039 10.1006/jsco.1996.0125 1484478
-
(1997)
J. Symb. Comput.
, vol.24
, Issue.34
, pp. 235-265
-
-
Bosma, W.1
Cannon, J.2
Playoust, C.3
-
16
-
-
47249102588
-
Fast algorithms for computing isogenies between elliptic curves
-
10.1090/S0025-5718-08-02066-8 2398793
-
A. Bostan F. Morain B. Salvy É. Schost 2008 Fast algorithms for computing isogenies between elliptic curves Math. Comput. 77 1755 1778 10.1090/S0025-5718-08-02066-8 2398793
-
(2008)
Math. Comput.
, vol.77
, pp. 1755-1778
-
-
Bostan, A.1
Morain, F.2
Salvy, B.3
Schost, É.4
-
17
-
-
23944463638
-
Elliptic curves suitable for pairing based cryptography
-
DOI 10.1007/s10623-004-3808-4
-
F. Brezing A. Weng 2005 Elliptic curves suitable for pairing based cryptography Des. Codes Cryptogr. 37 133 141 1100.14517 10.1007/s10623-004-3808- 4 2165045 (Pubitemid 41202622)
-
(2005)
Designs, Codes, and Cryptography
, vol.37
, Issue.1
, pp. 133-141
-
-
Brezing, F.1
Weng, A.2
-
18
-
-
38849170047
-
-
Ph.D. thesis, Dept. of Mathematics, Leiden University, 2006. Available at
-
R. Bröker, Constructing elliptic curves of prescribed order. Ph.D. thesis, Dept. of Mathematics, Leiden University, 2006. Available at: http://www.math.leidenuniv.nl/~reinier/thesis.pdf
-
Constructing Elliptic Curves of Prescribed Order
-
-
Bröker, R.1
-
19
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
Springer Berlin
-
J.C. Cha, J.H. Cheon, An identity-based signature from gap Diffie-Hellman groups, in Public-Key Cryptography-PKC 2003. Lecture Notes in Computer Science, vol. 2567 (Springer, Berlin, 2003), pp. 18-30
-
(2003)
Public-Key Cryptography-PKC 2003 Lecture Notes in Computer Science
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
20
-
-
84893811934
-
On the existence of distortion maps on ordinary elliptic curves
-
Available at
-
D. Charles, On the existence of distortion maps on ordinary elliptic curves, Cryptology ePrint Archive Report 2006/128. Available at: http://eprint.iacr.org/2006/128/
-
Cryptology EPrint Archive Report 2006/128
-
-
Charles, D.1
-
23
-
-
38149066096
-
Pairing-friendly elliptic curves with small security loss by Cheon's algorithm
-
Springer Berlin. 10.1007/978-3-540-76788-6-24
-
A. Comuta, M. Kawazoe, T. Takahashi, Pairing-friendly elliptic curves with small security loss by Cheon's algorithm, in Information Security and Cryptography-ICISC 2007. Lecture Notes in Computer Science, vol. 4817 (Springer, Berlin, 2007), pp. 297-308
-
(2007)
Information Security and Cryptography-ICISC 2007 Lecture Notes in Computer Science
, vol.4817
, pp. 297-308
-
-
Comuta, A.1
Kawazoe, M.2
Takahashi, T.3
-
24
-
-
0021468777
-
Fast evaluation of logarithms in fields of characteristic two
-
0554.12013 10.1109/TIT.1984.1056941 755785
-
D. Coppersmith 1984 Fast evaluation of logarithms in fields of characteristic two IEEE Trans. Inf. Theory 30 587 594 0554.12013 10.1109/TIT.1984.1056941 755785
-
(1984)
IEEE Trans. Inf. Theory
, vol.30
, pp. 587-594
-
-
Coppersmith, D.1
-
25
-
-
0004232801
-
-
G. Cornell J. Silverman (eds). Springer New York 0596.00007
-
G. Cornell, J. Silverman (eds.), Arithmetic Geometry (Springer, New York, 1986)
-
(1986)
Arithmetic Geometry
-
-
-
26
-
-
33645142138
-
Effective polynomial families for generating more pairing-friendly elliptic curves
-
Available at
-
P. Duan, S. Cui, C.W. Chan, Effective polynomial families for generating more pairing-friendly elliptic curves, Cryptology ePrint Archive Report 2005/236. Available at: http://eprint.iacr.org/2005/236/
-
Cryptology EPrint Archive Report 2005/236
-
-
Duan, P.1
Cui, S.2
Chan, C.W.3
-
27
-
-
17444391606
-
Building curves with arbitrary small MOV degree over finite prime fields
-
DOI 10.1007/s00145-004-0219-7
-
R. Dupont A. Enge F. Morain 2005 Building curves with arbitrary small MOV degree over finite prime fields J. Cryptol. 18 79 89 1084.94014 10.1007/s00145-004-0219-7 2148052 (Pubitemid 40537625)
-
(2005)
Journal of Cryptology
, vol.18
, Issue.2
, pp. 79-89
-
-
Dupont, R.1
Enge, A.2
Morain, F.3
-
28
-
-
84956867482
-
Speeding up the discrete log computation on curves with automorphisms
-
Springer Berlin
-
I. Duursma, P. Gaudry, F. Morain, Speeding up the discrete log computation on curves with automorphisms, in Advances in Cryptology-Asiacrypt 1999. Lecture Notes in Computer Science, vol. 1716 (Springer, Berlin, 1999), pp. 103-121
-
(1999)
Advances in Cryptology-Asiacrypt 1999 Lecture Notes in Computer Science
, vol.1716
, pp. 103-121
-
-
Duursma, I.1
Gaudry, P.2
Morain, F.3
-
29
-
-
63049109787
-
The complexity of class polynomial computation via floating point approximations
-
2476572
-
A. Enge 2009 The complexity of class polynomial computation via floating point approximations Math. Comput. 78 1089 1107 2476572
-
(2009)
Math. Comput.
, vol.78
, pp. 1089-1107
-
-
Enge, A.1
-
30
-
-
33746705572
-
Constructing pairing-friendly elliptic curves with embedding degree 10
-
Springer Berlin. 10.1007/11792086-32
-
D. Freeman, Constructing pairing-friendly elliptic curves with embedding degree 10, in Algorithmic Number Theory Symposium-ANTS-VII. Lecture Notes in Computer Science, vol. 4076 (Springer, Berlin, 2006), pp. 452-465
-
(2006)
Algorithmic Number Theory Symposium-ANTS-VII Lecture Notes in Computer Science
, vol.4076
, pp. 452-465
-
-
Freeman, D.1
-
31
-
-
50049117602
-
Constructing pairing-friendly genus 2 curves with ordinary Jacobians
-
Springer Berlin. 10.1007/978-3-540-73489-5-9
-
D. Freeman, Constructing pairing-friendly genus 2 curves with ordinary Jacobians, in Pairing-Based Cryptography-Pairing 2007. Lecture Notes in Computer Science, vol. 4575 (Springer, Berlin, 2007), pp. 152-176
-
(2007)
Pairing-Based Cryptography-Pairing 2007 Lecture Notes in Computer Science
, vol.4575
, pp. 152-176
-
-
Freeman, D.1
-
32
-
-
52149096501
-
A generalized Brezing-Weng method for constructing pairing-friendly ordinary abelian varieties
-
Springer Berlin. 10.1007/978-3-540-85538-5-11
-
D. Freeman, A generalized Brezing-Weng method for constructing pairing-friendly ordinary abelian varieties, in Pairing-Based Cryptography-Pairing 2008. Lecture Notes in Computer Science, vol. 5209 (Springer, Berlin, 2008), pp. 146-163
-
(2008)
Pairing-Based Cryptography-Pairing 2008 Lecture Notes in Computer Science
, vol.5209
, pp. 146-163
-
-
Freeman, D.1
-
33
-
-
44649167142
-
Abelian varieties with prescribed embedding degree
-
DOI 10.1007/978-3-540-79456-1-3, Algorithmic Number Theory - 8th International Symposium, ANTS-VIII, Proceedings
-
D. Freeman, P. Stevenhagen, M. Streng, Abelian varieties with prescribed embedding degree, in Algorithmic Number Theory Symposium-ANTS-VIII. Lecture Notes in Computer Science, vol. 5011 (Springer, Berlin, 2008), pp. 60-73 (Pubitemid 351775523)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.5011
, pp. 60-73
-
-
Freeman, D.1
Stevenhagen, P.2
Streng, M.3
-
34
-
-
84968502759
-
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
-
0813.14045 10.2307/2153546
-
G. Frey H. Rück 1994 A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves Math. Comput. 62 865 874 0813.14045 10.2307/2153546
-
(1994)
Math. Comput.
, vol.62
, pp. 865-874
-
-
Frey, G.1
Rück, H.2
-
35
-
-
17844407999
-
Easy decision Diffie-Hellman groups
-
1116.14014 2085876
-
S. Galbraith V. Rotger 2004 Easy decision Diffie-Hellman groups LMS J. Comput. Math. 7 201 218 1116.14014 2085876
-
(2004)
LMS J. Comput. Math.
, vol.7
, pp. 201-218
-
-
Galbraith, S.1
Rotger, V.2
-
36
-
-
34548662147
-
Ordinary abelian varieties having small embedding degree
-
DOI 10.1016/j.ffa.2007.02.003, PII S1071579707000147
-
S. Galbraith J. McKee P. Valença 2007 Ordinary abelian varieties having small embedding degree Finite Fields Appl. 13 800 814 1161.11017 10.1016/j.ffa.2007.02.003 2359321 (Pubitemid 47419387)
-
(2007)
Finite Fields and their Applications
, vol.13
, Issue.4
, pp. 800-814
-
-
Galbraith, S.D.1
McKee, J.F.2
Valenca, P.C.3
-
37
-
-
53249117524
-
Pairings for cryptographers
-
10.1016/j.dam.2007.12.010 2462118
-
S. Galbraith K. Paterson N. Smart 2008 Pairings for cryptographers Discrete Appl. Math. 15 3113 3121 10.1016/j.dam.2007.12.010 2462118
-
(2008)
Discrete Appl. Math.
, vol.15
, pp. 3113-3121
-
-
Galbraith, S.1
Paterson, K.2
Smart, N.3
-
38
-
-
79957797091
-
Faster point multiplication on elliptic curves with efficient endomorphisms
-
Springer Berlin. 10.1007/3-540-44647-8-11
-
R. Gallant, R.J. Lambert, S.A. Vanstone, Faster point multiplication on elliptic curves with efficient endomorphisms, in Advances in Cryptology-Crypto 2001. Lecture Notes in Computer Science, vol. 2139 (Springer, Berlin, 2001), pp. 190-200
-
(2001)
Advances in Cryptology-Crypto 2001 Lecture Notes in Computer Science
, vol.2139
, pp. 190-200
-
-
Gallant, R.1
Lambert, R.J.2
Vanstone, S.A.3
-
39
-
-
33746734238
-
High security pairing-based cryptography revisited
-
Springer Berlin. 10.1007/11792086-34
-
R. Granger, D. Page, N. Smart, High security pairing-based cryptography revisited, in Algorithmic Number Theory Symposium ANTS-VII. Lecture Notes in Computer Science, vol. 4076 (Springer, Berlin, 2006), pp. 480-494
-
(2006)
Algorithmic Number Theory Symposium ANTS-VII Lecture Notes in Computer Science
, vol.4076
, pp. 480-494
-
-
Granger, R.1
Page, D.2
Smart, N.3
-
40
-
-
0037743010
-
Software implementation of finite fields of characteristic three, for use in pairing-based cryptosystems
-
1068.94012 1942259
-
K. Harrison D. Page N.P. Smart 2002 Software implementation of finite fields of characteristic three, for use in pairing-based cryptosystems LMS J. Comput. Math. 5 181 193 1068.94012 1942259
-
(2002)
LMS J. Comput. Math.
, vol.5
, pp. 181-193
-
-
Harrison, K.1
Page, D.2
Smart, N.P.3
-
44
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
Springer Berlin. 10.1007/10722028-23 Full version: J. Cryptol. 17, 263-276 (2004)
-
A. Joux, A one round protocol for tripartite Diffie-Hellman, in Algorithmic Number Theory Symposium-ANTS-IV. Lecture Notes in Computer Science, vol. 1838 (Springer, Berlin, 2000), pp. 385-393. Full version: J. Cryptol. 17, 263-276 (2004)
-
(2000)
Algorithmic Number Theory Symposium-ANTS-IV Lecture Notes in Computer Science
, vol.1838
, pp. 385-393
-
-
Joux, A.1
-
45
-
-
21144454271
-
Separating decision diffie-hellman from computational diffie-hellman in cryptographic groups
-
DOI 10.1007/s00145-003-0052-4
-
A. Joux K. Nguyen 2003 Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups J. Cryptol. 16 239 247 1101.14309 10.1007/s00145-003-0052-4 2002044 (Pubitemid 40877275)
-
(2003)
Journal of Cryptology
, vol.16
, Issue.4
, pp. 239-247
-
-
Joux, A.1
Nguyen, K.2
-
47
-
-
52149103365
-
Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field
-
Springer Berlin. 10.1007/978-3-540-85538-5-9
-
E. Kachisa, E. Schaefer, M. Scott, Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field, in Pairing-Based Cryptography-Pairing 2008. Lecture Notes in Computer Science, vol. 5209 (Springer, Berlin, 2008), pp. 126-135
-
(2008)
Pairing-Based Cryptography-Pairing 2008 Lecture Notes in Computer Science
, vol.5209
, pp. 126-135
-
-
Kachisa, E.1
Schaefer, E.2
Scott, M.3
-
49
-
-
44649130857
-
On prime-order elliptic curves with embedding degrees k = 3, 4, and 6
-
DOI 10.1007/978-3-540-79456-1-6, Algorithmic Number Theory - 8th International Symposium, ANTS-VIII, Proceedings
-
K. Karabina, E. Teske, On prime-order elliptic curves with embedding degrees 3, 4 and 6, in Algorithmic Number Theory Symposium-ANTS-VIII. Lecture Notes in Computer Science, vol. 5011 (Springer, Berlin, 2008), pp. 102-117 (Pubitemid 351775526)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.5011
, pp. 102-117
-
-
Karabina, K.1
Teske, E.2
-
50
-
-
73849103859
-
Good and bad uses of elliptic curves in cryptography
-
1063.11051 1986087 805-806
-
N. Koblitz 2002 Good and bad uses of elliptic curves in cryptography Mosc. Math. J. 2 693 715 1063.11051 1986087 805-806
-
(2002)
Mosc. Math. J.
, vol.2
, pp. 693-715
-
-
Koblitz, N.1
-
51
-
-
31344437951
-
Pairing-based cryptography at high security levels
-
Springer Berlin
-
N. Koblitz, A. Menezes, Pairing-based cryptography at high security levels, in Proceedings of Cryptography and Coding: 10th IMA International Conference. Lecture Notes in Computer Science, vol. 3796 (Springer, Berlin, 2005), pp. 13-36
-
(2005)
Proceedings of Cryptography and Coding: 10th IMA International Conference Lecture Notes in Computer Science
, vol.3796
, pp. 13-36
-
-
Koblitz, N.1
Menezes, A.2
-
53
-
-
0012783530
-
-
Springer Berlin 0984.00001 revised 3rd edn
-
S. Lang, Algebra, revised 3rd edn. (Springer, Berlin, 2002)
-
(2002)
Algebra
-
-
Lang, S.1
-
54
-
-
84946820591
-
Unbelievable security: Matching AES security using public key systems
-
Springer Berlin. 10.1007/3-540-45682-1-5
-
A.K. Lenstra, Unbelievable security: Matching AES security using public key systems, in Advances in Cryptology-Asiacrypt 2001. Lecture Notes in Computer Science, vol. 2248 (Springer, Berlin, 2001), pp. 67-86
-
(2001)
Advances in Cryptology-Asiacrypt 2001 Lecture Notes in Computer Science
, vol.2248
, pp. 67-86
-
-
Lenstra, A.K.1
-
56
-
-
33749548456
-
Elliptic curves with low embedding degree
-
DOI 10.1007/s00145-006-0544-0
-
F. Luca I. Shparlinski 2006 Elliptic curves with low embedding degree J. Cryptol. 19 553 562 1133.14303 10.1007/s00145-006-0544-0 2267556 (Pubitemid 44537069)
-
(2006)
Journal of Cryptology
, vol.19
, Issue.4
, pp. 553-562
-
-
Luca, F.1
Shparlinski, I.E.2
-
57
-
-
17044400225
-
MOV attack in various subgroups on elliptic curves
-
1072.11094 2114268
-
F. Luca D. Mireles I. Shparlinski 2004 MOV attack in various subgroups on elliptic curves Ill. J. Math. 48 1041 1052 1072.11094 2114268
-
(2004)
Ill. J. Math.
, vol.48
, pp. 1041-1052
-
-
Luca, F.1
Mireles, D.2
Shparlinski, I.3
-
58
-
-
33746751937
-
2=N, D>0
-
0976.11016 1788328
-
2=N, D>0 Expo. Math. 18 323 331 0976.11016 1788328
-
(2000)
Expo. Math.
, vol.18
, pp. 323-331
-
-
Matthews, K.1
-
60
-
-
70349373534
-
An introduction to pairing-based cryptography
-
Spain Available at
-
A. Menezes, An introduction to pairing-based cryptography. Notes from lectures given in Santander, Spain, 2005. Available at: http://www.cacr.math. uwaterloo.ca/~ajmeneze/publications/pairings.pdf
-
(2005)
Notes from Lectures Given in Santander
-
-
Menezes, A.1
-
61
-
-
0010763167
-
Isomorphism classes of elliptic curves over finite fields of characteristic 2
-
0727.14021 1093882
-
A. Menezes S. Vanstone 1990 Isomorphism classes of elliptic curves over finite fields of characteristic 2 Util. Math. 38 135 153 0727.14021 1093882
-
(1990)
Util. Math.
, vol.38
, pp. 135-153
-
-
Menezes, A.1
Vanstone, S.2
-
62
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
0801.94011 10.1109/18.259647 1281712
-
A. Menezes T. Okamoto S. Vanstone 1993 Reducing elliptic curve logarithms to logarithms in a finite field IEEE Trans. Inf. Theory 39 1639 1646 0801.94011 10.1109/18.259647 1281712
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
63
-
-
22144445920
-
The weil pairing, and its efficient calculation
-
DOI 10.1007/s00145-004-0315-8
-
V. Miller 2004 The Weil pairing, and its efficient calculation J. Cryptol. 17 235 261 1078.14043 10.1007/s00145-004-0315-8 (Pubitemid 41201458)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 235-261
-
-
Miller, V.S.1
-
65
-
-
0031283694
-
Classes d'isomorphismes des courbes elliptiques supersingulières en caracteristique ≥3
-
0898.11023 1605751
-
F. Morain 1997 Classes d'isomorphismes des courbes elliptiques supersingulières en caracteristique ≥3 Util. Math. 52 241 253 0898.11023 1605751
-
(1997)
Util. Math.
, vol.52
, pp. 241-253
-
-
Morain, F.1
-
67
-
-
45449092547
-
On compressible pairings and their computation
-
Springer Berlin. 10.1007/978-3-540-68164-9-25
-
M. Naehrig, P.S.L.M. Barreto, P. Schwabe, On compressible pairings and their computation, in Progress in Cryptology-Africacrypt 2008. Lecture Notes in Computer Science, vol. 5023 (Springer, Berlin, 2008), pp. 371-388
-
(2008)
Progress in Cryptology-Africacrypt 2008 Lecture Notes in Computer Science
, vol.5023
, pp. 371-388
-
-
Naehrig, M.1
Barreto, P.S.L.M.2
Schwabe, P.3
-
68
-
-
84957014368
-
Discrete logarithms in finite fields and their cryptographic significance
-
Springer Berlin
-
A. Odlyzko, Discrete logarithms in finite fields and their cryptographic significance, in Advances in Cryptology-Eurocrypt 1984. Lecture Notes in Computer Science, vol. 209 (Springer, Berlin, 1985), pp. 224-314
-
(1985)
Advances in Cryptology-Eurocrypt 1984 Lecture Notes in Computer Science
, vol.209
, pp. 224-314
-
-
Odlyzko, A.1
-
70
-
-
0037194815
-
ID-based signatures from pairings on elliptic curves
-
DOI 10.1049/el:20020682
-
K. Paterson 2002 ID-based signatures from pairings on elliptic curves Electron. Lett. 38 1025 1026 10.1049/el:20020682 (Pubitemid 35046824)
-
(2002)
Electronics Letters
, vol.38
, Issue.18
, pp. 1025-1026
-
-
Paterson, K.G.1
-
71
-
-
84919085619
-
An improved algorithm for computing discrete logarithms over GF(p) and its cryptographic significance
-
0375.68023 10.1109/TIT.1978.1055817 484737
-
S. Pohlig M. Hellman 1978 An improved algorithm for computing discrete logarithms over GF(p) and its cryptographic significance IEEE Trans. Inf. Theory 24 106 110 0375.68023 10.1109/TIT.1978.1055817 484737
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
72
-
-
84966238549
-
Monte Carlo methods for index computation (mod p)
-
0382.10001 10.2307/2006496 491431
-
J. Pollard 1978 Monte Carlo methods for index computation (mod p) Math. Comput. 32 918 924 0382.10001 10.2307/2006496 491431
-
(1978)
Math. Comput.
, vol.32
, pp. 918-924
-
-
Pollard, J.1
-
73
-
-
84859431939
-
-
Unpublished manuscript Available at
-
2=N. Unpublished manuscript, 2004. Available at: http://hometown.aol. com/jpr2718/pell.pdf
-
(2004)
2=N
-
-
Robertson, J.1
-
75
-
-
2642549675
-
Cryptosystems based on pairings
-
Okinawa, Japan
-
R. Sakai, K. Ohgishi, M. Kasahara, Cryptosystems based on pairings, in 2000 Symposium on Cryptography and Information Security-SCIS 2000, Okinawa, Japan, 2000
-
(2000)
2000 Symposium on Cryptography and Information Security-SCIS 2000
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
76
-
-
85115686118
-
A new proof for the non-degeneracy of the Frey-Rück pairing and a connection to isogenies over the base field
-
World Scientific Singapore. 10.1142/9789812701640-0001
-
E. Schaefer, A new proof for the non-degeneracy of the Frey-Rück pairing and a connection to isogenies over the base field, in Computational Aspects of Algebraic Curves. Lecture Notes Ser. Comput., vol. 13 (World Scientific, Singapore, 2005), pp. 1-12
-
(2005)
Computational Aspects of Algebraic Curves Lecture Notes Ser. Comput.
, vol.13
, pp. 1-12
-
-
Schaefer, E.1
-
77
-
-
77952827169
-
The number field sieve for integers of low weight
-
to appear. Preprint available at
-
O. Schirokauer, The number field sieve for integers of low weight. Math. Comput. to appear. Preprint available at: http://eprint.iacr.org/2006/107/
-
Math. Comput.
-
-
Schirokauer, O.1
-
80
-
-
35048849890
-
Compressed pairings
-
Springer Berlin
-
M. Scott, P.S.L.M. Barreto, Compressed pairings, in Advances in Cryptology-Crypto 2004. Lecture Notes in Computer Science, vol. 3152 (Springer, Berlin, 2004), pp. 140-156
-
(2004)
Advances in Cryptology-Crypto 2004 Lecture Notes in Computer Science
, vol.3152
, pp. 140-156
-
-
Scott, M.1
Barreto, P.S.L.M.2
-
81
-
-
30744451685
-
Generating more MNT elliptic curves
-
DOI 10.1007/s10623-005-0538-1
-
M. Scott P.S.L.M. Barreto 2006 Generating more MNT elliptic curves Des. Codes Cryptogr. 38 209 217 1172.14309 10.1007/s10623-005-0538-1 2197469 (Pubitemid 43099493)
-
(2006)
Designs, Codes, and Cryptography
, vol.38
, Issue.2
, pp. 209-217
-
-
Scott, M.1
Barreto, P.S.L.M.2
-
84
-
-
52149123940
-
Constructing pairing-friendly elliptic curves using factorization of cyclotomic polynomials
-
Springer Berlin. 10.1007/978-3-540-85538-5-10
-
S. Tanaka, K. Nakamula, Constructing pairing-friendly elliptic curves using factorization of cyclotomic polynomials, in Pairing-Based Cryptography-Pairing 2008. Lecture Notes in Computer Science, vol. 5209 (Springer, Berlin, 2008), pp. 136-145
-
(2008)
Pairing-Based Cryptography-Pairing 2008 Lecture Notes in Computer Science
, vol.5209
, pp. 136-145
-
-
Tanaka, S.1
Nakamula, K.2
-
85
-
-
34250541896
-
Endomorphisms of abelian varieties over finite fields
-
0147.20303 10.1007/BF01404549 206004
-
J. Tate 1966 Endomorphisms of abelian varieties over finite fields Invent. Math. 2 134 144 0147.20303 10.1007/BF01404549 206004
-
(1966)
Invent. Math.
, vol.2
, pp. 134-144
-
-
Tate, J.1
-
86
-
-
17444376558
-
Parallel collision search with cryptanalytic applications
-
0992.94028 10.1007/PL00003816
-
P.C. van Oorschot M.J. Wiener 1999 Parallel collision search with cryptanalytic applications J. Cryptol. 12 1 18 0992.94028 10.1007/PL00003816
-
(1999)
J. Cryptol.
, vol.12
, pp. 1-18
-
-
Van Oorschot, P.C.1
Wiener, M.J.2
-
87
-
-
23044474013
-
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
-
DOI 10.1007/s00145-004-0313-x
-
E. Verheul 2004 Evidence that XTR is more secure than supersingular elliptic curve cryptosystems J. Cryptol. 17 277 296 1075.94011 10.1007/s00145-004-0313-x 2090558 (Pubitemid 41201460)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 277-296
-
-
Verheul, E.R.1
-
88
-
-
0001556633
-
Abelian varieties over finite fields
-
0188.53001 265369
-
W. Waterhouse 1969 Abelian varieties over finite fields Ann. Sci. École Norm. Sup. (IV) 2 521 560 0188.53001 265369
-
(1969)
Ann. Sci. École Norm. Sup. (IV)
, vol.2
, pp. 521-560
-
-
Waterhouse, W.1
|