메뉴 건너뛰기




Volumn 6168 LNCS, Issue , 2010, Pages 233-247

Security estimates for quadratic field based cryptosystems

Author keywords

[No Author keywords available]

Indexed keywords

BLOCK CIPHERS; CLASS GROUP; CRYPTOSYSTEMS; DISCRETE LOGARITHM PROBLEMS; NUMERICAL RESULTS; QUADRATIC FIELDS; SYMMETRIC KEYS;

EID: 78649824788     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14081-5_15     Document Type: Conference Paper
Times cited : (17)

References (28)
  • 1
    • 84966198660 scopus 로고
    • Explicit bounds for primality testing and related problems
    • Bach, E.: Explicit bounds for primality testing and related problems. Math. Comp. 55(191), 355-380 (1990)
    • (1990) Math. Comp. , vol.55 , Issue.191 , pp. 355-380
    • Bach, E.1
  • 3
    • 77953041787 scopus 로고    scopus 로고
    • Improvements in the computation of ideal class groups of imaginary quadratic number fields
    • To appear in
    • Biasse, J.-F.: Improvements in the computation of ideal class groups of imaginary quadratic number fields. To appear in Advances in Mathematics of Communications, http://www.lix.polytechnique.fr/~biasse/papers/biasseCHILE.pdf
    • Advances in Mathematics of Communications
    • Biasse, J.-F.1
  • 4
    • 78649887064 scopus 로고    scopus 로고
    • Practical improvements to class group and regulator computation of real quadratic fields
    • To appear in
    • Biasse, J.-F., Jacobson Jr., M.J.: Practical improvements to class group and regulator computation of real quadratic fields. To appear in ANTS 9 (2010)
    • (2010) ANTS , vol.9
    • Biasse, J.-F.1    Jacobson Jr., M.J.2
  • 5
    • 0011491022 scopus 로고
    • A subexponential algorithm for the determination of class groups and regulators of algebraic number fields
    • Buchmann, J.: A subexponential algorithm for the determination of class groups and regulators of algebraic number fields. Séminaire de Théorie des Nombres (Paris), pp. 27-41 (1988-1989)
    • (1988) Séminaire de Théorie des Nombres (Paris) , pp. 27-41
    • Buchmann, J.1
  • 7
    • 0024139987 scopus 로고
    • A key-exchange system based on imaginary quadratic fields
    • Buchmann, J., Williams, H.C.: A key-exchange system based on imaginary quadratic fields. Journal of Cryptology 1, 107-118 (1988)
    • (1988) Journal of Cryptology , vol.1 , pp. 107-118
    • Buchmann, J.1    Williams, H.C.2
  • 8
    • 0042258460 scopus 로고
    • A key-exchange system based on real quadratic fields
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Buchmann, J., Williams, H.C.: A key-exchange system based on real quadratic fields. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 335-343. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 335-343
    • Buchmann, J.1    Williams, H.C.2
  • 9
    • 84946832616 scopus 로고    scopus 로고
    • Strategies in filtering in the number field sieve
    • Bosma, W. (ed.) ANTS 2000. Springer, Heidelberg
    • Cavallar, S.: Strategies in filtering in the number field sieve. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 209-232. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1838 , pp. 209-232
    • Cavallar, S.1
  • 11
    • 0003049266 scopus 로고
    • Heuristics on class groups of number fields
    • Number Theory. Springer, New York
    • Cohen, H., Lenstra Jr., H.W.: Heuristics on class groups of number fields. In: Number Theory. Lecture Notes in Math., vol. 1068, pp. 33-62. Springer, New York (1983)
    • (1983) Lecture Notes in Math , vol.1068 , pp. 33-62
    • Cohen, H.1    Lenstra Jr., H.W.2
  • 12
    • 84968519059 scopus 로고
    • A rigorous subexponential algorithm for computation of class groups
    • Hafner, J.L., McCurley, K.S.: A rigorous subexponential algorithm for computation of class groups. J. Amer. Math. Soc. 2, 837-850 (1989)
    • (1989) J. Amer. Math. Soc. , vol.2 , pp. 837-850
    • Hafner, J.L.1    McCurley, K.S.2
  • 14
    • 84937401446 scopus 로고    scopus 로고
    • Security of cryptosystems based on class groups of imaginary quadratic orders
    • Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
    • Hamdy, S., Möller, B.: Security of cryptosystems based on class groups of imaginary quadratic orders. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 234-247. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976 , pp. 234-247
    • Hamdy, S.1    Möller, B.2
  • 15
    • 17644440160 scopus 로고    scopus 로고
    • Towards practical non-interactive public-key cryptosystems using non-maximal imaginary quadratic orders
    • Hühnlein, D., Jacobson Jr., M.J., Weber, D.: Towards practical non-interactive public-key cryptosystems using non-maximal imaginary quadratic orders. Designs, Codes and Cryptography 30(3), 281-299 (2003)
    • (2003) Designs, Codes and Cryptography , vol.30 , Issue.3 , pp. 281-299
    • Hühnlein, D.1    Jacobson Jr., M.J.2    Weber, D.3
  • 17
    • 0242324505 scopus 로고    scopus 로고
    • Computing discrete logarithms in quadratic orders
    • Jacobson Jr., M.J.: Computing discrete logarithms in quadratic orders. Journal of Cryptology 13, 473-492 (2000)
    • (2000) Journal of Cryptology , vol.13 , pp. 473-492
    • Jacobson Jr., M.J.1
  • 20
    • 76749103511 scopus 로고    scopus 로고
    • Solving the Pell equation
    • Springer, Heidelberg ISBN 978-0-387-84922-5
    • Jacobson Jr., M.J., Williams, H.C.: Solving the Pell equation. CMS Books in Mathematics. Springer, Heidelberg (2009) ISBN 978-0-387-84922-5
    • (2009) CMS Books in Mathematics
    • Jacobson Jr., M.J.1    Williams, H.C.2
  • 23
    • 84957812088 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • Imai, H., Zheng, Y. (eds.) PKC 2000. Springer, Heidelberg
    • Lenstra, A.K., Verheul, E.: Selecting cryptographic key sizes. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 446-465. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1751 , pp. 446-465
    • Lenstra, A.K.1    Verheul, E.2
  • 25
    • 77953904148 scopus 로고    scopus 로고
    • Recommendation for Key Management - Part 1: General
    • (Revised) March
    • National Institute of Standards and Technology (NIST), Recommendation for Key Management - Part 1: General (Revised), NIST Special Publication 800-57 (March 2007), http://csrc.nist.gov/groups/ST/toolkit/documents/ SP800-57Part1 3-8-07.pdf
    • (2007) NIST Special Publication 800-57
  • 26
    • 84946819289 scopus 로고    scopus 로고
    • Asymptotically fast discrete logarithms in quadratic number fields
    • Bosma, W. (ed.) ANTS 2000. Springer, Heidelberg
    • Vollmer, U.: Asymptotically fast discrete logarithms in quadratic number fields. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 581-594. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1838 , pp. 581-594
    • Vollmer, U.1
  • 27
    • 84958554059 scopus 로고    scopus 로고
    • An accelerated Buchmann algorithm for regulator computation in real quadratic fields
    • Fieker, C., Kohel, D.R. (eds.) ANTS 2002. Springer, Heidelberg
    • Vollmer, U.: An accelerated Buchmann algorithm for regulator computation in real quadratic fields. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 148-162. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2369 , pp. 148-162
    • Vollmer, U.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.