메뉴 건너뛰기




Volumn 131, Issue 5, 2011, Pages 781-814

Elliptic curve cryptography: The serpentine course of a paradigm shift

Author keywords

01A80; 11T71; 14G50; 68P25; 94A60; Cryptography; Elliptic curve; Public key; Social construction of science; Social construction of technology

Indexed keywords


EID: 79551608946     PISSN: 0022314X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jnt.2009.01.006     Document Type: Article
Times cited : (57)

References (109)
  • 1
    • 84929727140 scopus 로고
    • A subexponential algorithm for discrete logarithms over the rational subgroup of the jacobians of large genus hyperelliptic curves over finite fields
    • Springer-Verlag, Algorithmic Number Theory: First International Symposium
    • Adleman L., DeMarrais J., Huang M. A subexponential algorithm for discrete logarithms over the rational subgroup of the jacobians of large genus hyperelliptic curves over finite fields. Lecture Notes in Comput. Sci. 1994, vol. 877:28-40. Springer-Verlag.
    • (1994) Lecture Notes in Comput. Sci. , vol.877 , pp. 28-40
    • Adleman, L.1    DeMarrais, J.2    Huang, M.3
  • 3
    • 79551597862 scopus 로고    scopus 로고
    • American National Standards Institute (ANSI) X9.62, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)
    • American National Standards Institute (ANSI) X9.62, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), 1999.
    • (1999)
  • 4
    • 0343736058 scopus 로고    scopus 로고
    • The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm
    • Balasubramanian R., Koblitz N. The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm. J. Cryptology 1998, 11:141-145.
    • (1998) J. Cryptology , vol.11 , pp. 141-145
    • Balasubramanian, R.1    Koblitz, N.2
  • 6
    • 84947928286 scopus 로고    scopus 로고
    • Practice-oriented provable-security
    • Proc. First International Workshop on Information Security (ISW '97)
    • Bellare M. Practice-oriented provable-security. Lecture Notes in Comput. Sci. 1998, vol. 1396:221-231.
    • (1998) Lecture Notes in Comput. Sci. , vol.1396 , pp. 221-231
    • Bellare, M.1
  • 7
    • 5044240231 scopus 로고    scopus 로고
    • A gendered socio-technical construction: The smart house
    • Open Univ. Press
    • Berg A.-J. A gendered socio-technical construction: The smart house. The Social Shaping of Technology 1999, 301-313. Open Univ. Press. second ed.
    • (1999) The Social Shaping of Technology , pp. 301-313
    • Berg, A.-J.1
  • 8
    • 38149009170 scopus 로고    scopus 로고
    • Short signatures without random oracles and the SDH assumption on bilinear groups
    • Boneh D., Boyen X. Short signatures without random oracles and the SDH assumption on bilinear groups. J. Cryptology 2008, 21:149-177.
    • (2008) J. Cryptology , vol.21 , pp. 149-177
    • Boneh, D.1    Boyen, X.2
  • 9
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • Advances in Cryptology - EUROCRYPT '97
    • Boneh D., DeMillo R., Lipton R. On the importance of checking cryptographic protocols for faults. Lecture Notes in Comput. Sci. 1997, vol. 1233:37-51.
    • (1997) Lecture Notes in Comput. Sci. , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.2    Lipton, R.3
  • 10
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Boneh D., Franklin M. Identity-based encryption from the Weil pairing. SIAM J. Comput. 2003, 32:586-615.
    • (2003) SIAM J. Comput. , vol.32 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 11
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Progress in Cryptology - ASIACRYPT 2001
    • Boneh D., Lynn B., Shacham H. Short signatures from the Weil pairing. Lecture Notes in Comput. Sci. 2001, vol. 2248:514-532.
    • (2001) Lecture Notes in Comput. Sci. , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 15
    • 52149109140 scopus 로고    scopus 로고
    • Evaluating large degree isogenies and applications to pairing based cryptography
    • Pairing-Based Cryptography - Pairing 2008
    • Bröker R., Charles D., Lauter K. Evaluating large degree isogenies and applications to pairing based cryptography. Lecture Notes in Comput. Sci. 2008, vol. 5209:100-112.
    • (2008) Lecture Notes in Comput. Sci. , vol.5209 , pp. 100-112
    • Bröker, R.1    Charles, D.2    Lauter, K.3
  • 17
    • 33746042561 scopus 로고    scopus 로고
    • Security analysis of the strong Diffie-Hellman problem
    • Advances in Cryptology - EUROCRYPT 2006
    • Cheon J. Security analysis of the strong Diffie-Hellman problem. Lecture Notes in Comput. Sci. 2006, vol. 4004:1-11.
    • (2006) Lecture Notes in Comput. Sci. , vol.4004 , pp. 1-11
    • Cheon, J.1
  • 18
    • 0021468777 scopus 로고
    • Fast evaluation of logarithms in fields of characteristic two
    • Coppersmith D. Fast evaluation of logarithms in fields of characteristic two. IEEE Trans. Inform. Theory 1984, 30:587-594.
    • (1984) IEEE Trans. Inform. Theory , vol.30 , pp. 587-594
    • Coppersmith, D.1
  • 20
    • 33746706217 scopus 로고    scopus 로고
    • An index calculus algorithm for plane curves of small degree
    • Algorithmic Number Theory: Seventh International Conference
    • Diem C. An index calculus algorithm for plane curves of small degree. Lecture Notes in Comput. Sci. 2006, vol. 4076:543-557.
    • (2006) Lecture Notes in Comput. Sci. , vol.4076 , pp. 543-557
    • Diem, C.1
  • 21
    • 79551584033 scopus 로고    scopus 로고
    • On arithmetic and the discrete logarithm problem in class groups of curves, Habilitationsschrift, Universität Leipzig, available from .
    • C. Diem, On arithmetic and the discrete logarithm problem in class groups of curves, Habilitationsschrift, Universität Leipzig, available from http://www.math.uni-leipzig.de/~diem/preprints/habil.pdf.
    • Diem, C.1
  • 22
    • 38049124867 scopus 로고    scopus 로고
    • A double large prime variation for small genus hyperelliptic index calculus
    • Diem C., Gaudry P., Thériault N., Thomé E. A double large prime variation for small genus hyperelliptic index calculus. Math. Comp. 2007, 76:475-492.
    • (2007) Math. Comp. , vol.76 , pp. 475-492
    • Diem, C.1    Gaudry, P.2    Thériault, N.3    Thomé, E.4
  • 23
    • 51249084603 scopus 로고    scopus 로고
    • Index calculus in class groups of non-hyperelliptic curves of genus three
    • Diem C., Thomé E. Index calculus in class groups of non-hyperelliptic curves of genus three. J. Cryptology 2008, 21:593-611.
    • (2008) J. Cryptology , vol.21 , pp. 593-611
    • Diem, C.1    Thomé, E.2
  • 28
    • 84968502759 scopus 로고
    • A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
    • Frey G., Rück H. A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Math. Comp. 1994, 62:865-874.
    • (1994) Math. Comp. , vol.62 , pp. 865-874
    • Frey, G.1    Rück, H.2
  • 29
    • 23044503196 scopus 로고    scopus 로고
    • Constructing isogenies between elliptic curves over finite fields
    • Galbraith S. Constructing isogenies between elliptic curves over finite fields. LMS J. Comput. Math. 1999, 2:118-138.
    • (1999) LMS J. Comput. Math. , vol.2 , pp. 118-138
    • Galbraith, S.1
  • 30
    • 17844407999 scopus 로고    scopus 로고
    • Easy decision Diffie-Hellman groups
    • Galbraith S., Rotger V. Easy decision Diffie-Hellman groups. LMS J. Comput. Math. 2004, 7:201-218.
    • (2004) LMS J. Comput. Math. , vol.7 , pp. 201-218
    • Galbraith, S.1    Rotger, V.2
  • 31
    • 0034409205 scopus 로고    scopus 로고
    • Improving the parallelized Pollard lambda search on an anomalous binary curve
    • Gallant R., Lambert R., Vanstone S. Improving the parallelized Pollard lambda search on an anomalous binary curve. Math. Comp. 2000, 69:1699-1705.
    • (2000) Math. Comp. , vol.69 , pp. 1699-1705
    • Gallant, R.1    Lambert, R.2    Vanstone, S.3
  • 32
    • 79551589789 scopus 로고    scopus 로고
    • Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem, J. Symbolic Comput., in press, available from .
    • P. Gaudry, Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem, J. Symbolic Comput., in press, available from http://www.loria.fr/~gaudry/papers.en.html.
    • Gaudry, P.1
  • 33
    • 0001788567 scopus 로고    scopus 로고
    • Constructive and destructive facets of Weil descent on elliptic curves
    • Gaudry P., Hess F., Smart N. Constructive and destructive facets of Weil descent on elliptic curves. J. Cryptology 2002, 15:19-34.
    • (2002) J. Cryptology , vol.15 , pp. 19-34
    • Gaudry, P.1    Hess, F.2    Smart, N.3
  • 36
    • 0000303380 scopus 로고
    • Discrete logarithms in GF(p) using the number field sieve
    • Gordon D. Discrete logarithms in GF(p) using the number field sieve. SIAM J. Discrete Math. 1993, 6:124-138.
    • (1993) SIAM J. Discrete Math. , vol.6 , pp. 124-138
    • Gordon, D.1
  • 39
    • 79952678925 scopus 로고    scopus 로고
    • Race: Universal Donors in a Vampire Culture
    • Routledge.
    • Haraway D. Race: Universal Donors in a Vampire Culture. The Haraway Reader 2003, Routledge, pp. 251-293.
    • (2003) The Haraway Reader , pp. 251-293
    • Haraway, D.1
  • 40
    • 23044512900 scopus 로고    scopus 로고
    • Generalizing the GHS attack on the elliptic curve discrete logarithm problem
    • Hess F. Generalizing the GHS attack on the elliptic curve discrete logarithm problem. LMS J. Comput. Math. 2004, 7:167-192.
    • (2004) LMS J. Comput. Math. , vol.7 , pp. 167-192
    • Hess, F.1
  • 43
    • 0343792080 scopus 로고
    • The seamless web: Technology, science, et cetera, et cetera
    • Edinburgh Univ. Press
    • Hughes T. The seamless web: Technology, science, et cetera, et cetera. Technology and Social Processes 1988, 9-19. Edinburgh Univ. Press.
    • (1988) Technology and Social Processes , pp. 9-19
    • Hughes, T.1
  • 44
    • 0242316628 scopus 로고    scopus 로고
    • Edison and electric light
    • Open Univ. Press
    • Hughes T. Edison and electric light. The Social Shaping of Technology 1999, 50-63. Open Univ. Press. second ed.
    • (1999) The Social Shaping of Technology , pp. 50-63
    • Hughes, T.1
  • 47
    • 33646781591 scopus 로고    scopus 로고
    • Do all elliptic curves of the same order have the same difficulty of discrete log?
    • Advances in Cryptology - ASIACRYPT 2005
    • Jao D., Miller S., Venkatesan R. Do all elliptic curves of the same order have the same difficulty of discrete log?. Lecture Notes in Comput. Sci. 2005, vol. 3788:21-40.
    • (2005) Lecture Notes in Comput. Sci. , vol.3788 , pp. 21-40
    • Jao, D.1    Miller, S.2    Venkatesan, R.3
  • 48
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • Algorithmic Number Theory: Fourth International Symposium
    • Joux A. A one round protocol for tripartite Diffie-Hellman. Lecture Notes in Comput. Sci. 2000, vol. 1838:385-393.
    • (2000) Lecture Notes in Comput. Sci. , vol.1838 , pp. 385-393
    • Joux, A.1
  • 50
    • 0002261720 scopus 로고    scopus 로고
    • The social construction of technology
    • Open Univ. Press
    • Kline R., Pinch T. The social construction of technology. The Social Shaping of Technology 1999, 113-115. Open Univ. Press. second ed.
    • (1999) The Social Shaping of Technology , pp. 113-115
    • Kline, R.1    Pinch, T.2
  • 51
    • 26444471639 scopus 로고
    • A historian looks at gender and science
    • Koblitz A.H. A historian looks at gender and science. Internat. J. Sci. Ed. 1987, 9:399-407.
    • (1987) Internat. J. Sci. Ed. , vol.9 , pp. 399-407
    • Koblitz, A.H.1
  • 52
    • 33744931948 scopus 로고    scopus 로고
    • Male bonding around the campfire: Constructing myths of Hohokam militarism
    • Koblitz A.H. Male bonding around the campfire: Constructing myths of Hohokam militarism. Men Masculinities 2006, 9:95-107.
    • (2006) Men Masculinities , vol.9 , pp. 95-107
    • Koblitz, A.H.1
  • 53
    • 79551575779 scopus 로고    scopus 로고
    • Warriors, campfires, and a big stick: Modern male fantasies of Hohokam militarism
    • Koblitz A.H. Warriors, campfires, and a big stick: Modern male fantasies of Hohokam militarism. Bull. Old Pueblo Archaeology Center 2008, 53:2-5.
    • (2008) Bull. Old Pueblo Archaeology Center , vol.53 , pp. 2-5
    • Koblitz, A.H.1
  • 54
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz N. Elliptic curve cryptosystems. Math. Comp. 1987, 48:203-209.
    • (1987) Math. Comp. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 55
    • 0024864204 scopus 로고
    • Hyperelliptic cryptosystems
    • Koblitz N. Hyperelliptic cryptosystems. J. Cryptology 1989, 1:139-150.
    • (1989) J. Cryptology , vol.1 , pp. 139-150
    • Koblitz, N.1
  • 56
    • 85024567680 scopus 로고
    • CM-curves with good cryptographic properties
    • Advances in Cryptology - CRYPTO '91
    • Koblitz N. CM-curves with good cryptographic properties. Lecture Notes in Comput. Sci. 1992, vol. 576:279-287.
    • (1992) Lecture Notes in Comput. Sci. , vol.576 , pp. 279-287
    • Koblitz, N.1
  • 57
    • 84957705004 scopus 로고    scopus 로고
    • An elliptic curve implementation of the finite field Digital Signature Algorithm
    • Advances in Cryptology - CRYPTO '98
    • Koblitz N. An elliptic curve implementation of the finite field Digital Signature Algorithm. Lecture Notes in Comput. Sci. 1998, vol. 1462:327-337.
    • (1998) Lecture Notes in Comput. Sci. , vol.1462 , pp. 327-337
    • Koblitz, N.1
  • 58
    • 31344437951 scopus 로고    scopus 로고
    • Pairing-based cryptography at high security levels
    • Proceedings of the Tenth IMA International Conference on Cryptography and Coding
    • Koblitz N., Menezes A. Pairing-based cryptography at high security levels. Lecture Notes in Comput. Sci. 2005, vol. 3796:13-36.
    • (2005) Lecture Notes in Comput. Sci. , vol.3796 , pp. 13-36
    • Koblitz, N.1    Menezes, A.2
  • 59
    • 38149025069 scopus 로고    scopus 로고
    • Another look at 'provable security'. II
    • Progress in Cryptology - INDOCRYPT 2006
    • Koblitz N., Menezes A. Another look at 'provable security'. II. Lecture Notes in Comput. Sci. 2006, vol. 4329:148-175.
    • (2006) Lecture Notes in Comput. Sci. , vol.4329 , pp. 148-175
    • Koblitz, N.1    Menezes, A.2
  • 60
    • 33846856917 scopus 로고    scopus 로고
    • Another look at 'provable security'
    • Koblitz N., Menezes A. Another look at 'provable security'. J. Cryptology 2007, 3-37.
    • (2007) J. Cryptology , pp. 3-37
    • Koblitz, N.1    Menezes, A.2
  • 62
    • 69949147833 scopus 로고    scopus 로고
    • Another look at non-standard discrete log and Diffie-Hellman problems
    • Koblitz N., Menezes A. Another look at non-standard discrete log and Diffie-Hellman problems. J. Math. Cryptol. 2008, 2:311-326.
    • (2008) J. Math. Cryptol. , vol.2 , pp. 311-326
    • Koblitz, N.1    Menezes, A.2
  • 63
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Advances in Cryptology - CRYPTO '96
    • Kocher P. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Lecture Notes in Comput. Sci. 1996, vol. 1109:104-113.
    • (1996) Lecture Notes in Comput. Sci. , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 64
  • 65
    • 79551603984 scopus 로고    scopus 로고
    • Endomorphism rings of elliptic curves over finite fields, PhD thesis, Univ. of California at Berkeley
    • D. Kohel, Endomorphism rings of elliptic curves over finite fields, PhD thesis, Univ. of California at Berkeley, 1996.
    • (1996)
    • Kohel, D.1
  • 69
    • 1442350122 scopus 로고    scopus 로고
    • Communications security for the twenty-first century: The Advanced Encryption Standard
    • Landau S. Communications security for the twenty-first century: The Advanced Encryption Standard. Notices Amer. Math. Soc. 2000, 47:450-459.
    • (2000) Notices Amer. Math. Soc. , vol.47 , pp. 450-459
    • Landau, S.1
  • 70
    • 0001258323 scopus 로고
    • Factoring integers with elliptic curves
    • Lenstra H.W. Factoring integers with elliptic curves. Ann. of Math. 1987, 126:649-673.
    • (1987) Ann. of Math. , vol.126 , pp. 649-673
    • Lenstra, H.W.1
  • 73
    • 79551590191 scopus 로고    scopus 로고
    • ECC Brainpool standard curves and curve generation, IETF Internet-Draft, February 18
    • M. Lochter, J. Merkle, ECC Brainpool standard curves and curve generation, IETF Internet-Draft, February 18, 2008.
    • (2008)
    • Lochter, M.1    Merkle, J.2
  • 74
    • 0002371174 scopus 로고    scopus 로고
    • Preface to the second edition, and Introductory essay: The social shaping of technology
    • Open Univ. Press, pp. xiv-xvi.
    • MacKenzie D., Wajcman J. Preface to the second edition, and Introductory essay: The social shaping of technology. The Social Shaping of Technology 1999, Open Univ. Press, pp. xiv-xvi and 3-27. second ed.
    • (1999) The Social Shaping of Technology , pp. 3-27
    • MacKenzie, D.1    Wajcman, J.2
  • 75
    • 79551592345 scopus 로고    scopus 로고
    • A closer look at pairings, presentation at the NIST workshop "Applications of Pairing Based Cryptography: Identity Based Encryption and Beyond", June 3-4, available from .
    • L. Martin, A closer look at pairings, presentation at the NIST workshop "Applications of Pairing Based Cryptography: Identity Based Encryption and Beyond", June 3-4, 2008, available from http://csrc.nist.gov/groups/ST/IBE/documents/June08.
    • (2008)
    • Martin, L.1
  • 76
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • Menezes A., Okamoto T., Vanstone S. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inform. Theory 1993, 39:1639-1646.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , pp. 1639-1646
    • Menezes, A.1    Okamoto, T.2    Vanstone, S.3
  • 77
    • 33847320580 scopus 로고    scopus 로고
    • Analysis of the Weil descent attack of Gaudry, Hess and Smart
    • Topics in Cryptology - CT-RSA 2001
    • Menezes A., Qu M. Analysis of the Weil descent attack of Gaudry, Hess and Smart. Lecture Notes in Comput. Sci. 2001, vol. 2020:308-318.
    • (2001) Lecture Notes in Comput. Sci. , vol.2020 , pp. 308-318
    • Menezes, A.1    Qu, M.2
  • 78
    • 31444432696 scopus 로고    scopus 로고
    • Cryptographic implications of Hess' generalized GHS attack
    • Menezes A., Teske E. Cryptographic implications of Hess' generalized GHS attack. Appl. Algebra Engrg. Comm. Comput. 2006, 16:439-460.
    • (2006) Appl. Algebra Engrg. Comm. Comput. , vol.16 , pp. 439-460
    • Menezes, A.1    Teske, E.2
  • 80
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography
    • Advances in Cryptology - CRYPTO '85
    • Miller V. Uses of elliptic curves in cryptography. Lecture Notes in Comput. Sci. 1986, vol. 218:417-426.
    • (1986) Lecture Notes in Comput. Sci. , vol.218 , pp. 417-426
    • Miller, V.1
  • 81
    • 79551583816 scopus 로고
    • Short programs for functions on curves, unpublished manuscript
    • V. Miller, Short programs for functions on curves, unpublished manuscript, 1986.
    • (1986)
    • Miller, V.1
  • 82
    • 22144445920 scopus 로고    scopus 로고
    • The Weil pairing, and its efficient calculation
    • Miller V. The Weil pairing, and its efficient calculation. J. Cryptology 2004, 17:235-261.
    • (2004) J. Cryptology , vol.17 , pp. 235-261
    • Miller, V.1
  • 83
    • 0035336179 scopus 로고    scopus 로고
    • New explicit conditions of elliptic curve traces for FR-reduction
    • Miyaji A., Nakabayashi M., Takano S. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundamentals 2001, E84-A:1234-1243.
    • (2001) IEICE Trans. Fundamentals , vol.84 , pp. 1234-1243
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3
  • 84
    • 79551576437 scopus 로고    scopus 로고
    • The Diffie-Hellman problem and generalization of Verheul's theorem, PhD thesis, Univ. of Washington
    • D. Moody, The Diffie-Hellman problem and generalization of Verheul's theorem, PhD thesis, Univ. of Washington, 2009.
    • (2009)
    • Moody, D.1
  • 85
    • 0011918550 scopus 로고    scopus 로고
    • Fast multiplication on elliptic curves over small fields of characteristic two
    • Müller V. Fast multiplication on elliptic curves over small fields of characteristic two. J. Cryptology 1998, 11:219-234.
    • (1998) J. Cryptology , vol.11 , pp. 219-234
    • Müller, V.1
  • 86
    • 79551581187 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Digital Signature Standard, Federal Information Processing Standards Publication 186-2
    • National Institute of Standards and Technology, Digital Signature Standard, Federal Information Processing Standards Publication 186-2, 2000.
    • (2000)
  • 87
    • 79551606945 scopus 로고    scopus 로고
    • National Security Agency, The case for elliptic curve cryptography
    • National Security Agency, The case for elliptic curve cryptography, http://www.nsa.gov/ia/industry/crypto_elliptic_curve.cfm.
  • 88
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • Pohlig S., Hellman M. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory 1978, 24:106-110.
    • (1978) IEEE Trans. Inform. Theory , vol.24 , pp. 106-110
    • Pohlig, S.1    Hellman, M.2
  • 89
    • 84966238549 scopus 로고
    • Monte Carlo methods for index computation mod p
    • Pollard J. Monte Carlo methods for index computation mod p. Math. Comp. 1978, 32:918-924.
    • (1978) Math. Comp. , vol.32 , pp. 918-924
    • Pollard, J.1
  • 92
    • 84966233278 scopus 로고
    • Elliptic curves over finite fields and the computation of square roots mod p
    • Schoof R. Elliptic curves over finite fields and the computation of square roots mod p. Math. Comp. 1985, 44:483-494.
    • (1985) Math. Comp. , vol.44 , pp. 483-494
    • Schoof, R.1
  • 94
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology - CRYPTO '84
    • Shamir A. Identity-based cryptosystems and signature schemes. Lecture Notes in Comput. Sci. 1985, vol. 196:277-296.
    • (1985) Lecture Notes in Comput. Sci. , vol.196 , pp. 277-296
    • Shamir, A.1
  • 95
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • Shor P.W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 1997, 26:1484-1509.
    • (1997) SIAM J. Comput. , vol.26 , pp. 1484-1509
    • Shor, P.W.1
  • 97
    • 0012234171 scopus 로고    scopus 로고
    • The xedni calculus and the elliptic curve discrete logarithm problem
    • Silverman J. The xedni calculus and the elliptic curve discrete logarithm problem. Des. Codes Cryptogr. 2000, 20:5-40.
    • (2000) Des. Codes Cryptogr. , vol.20 , pp. 5-40
    • Silverman, J.1
  • 98
    • 79551581574 scopus 로고    scopus 로고
    • The four faces of lifting for the elliptic curve discrete logarithm problem, in: 11th Workshop on Elliptic Curve Cryptography, Univ. College Dublin, September 5,available from .
    • J. Silverman, The four faces of lifting for the elliptic curve discrete logarithm problem, in: 11th Workshop on Elliptic Curve Cryptography, Univ. College Dublin, September 5, 2007, available from http://mathsci.ucd.ie/~gmg/ECC2007Talks.
    • (2007)
    • Silverman, J.1
  • 99
    • 84947727672 scopus 로고    scopus 로고
    • Elliptic curve discrete logarithms and the index calculus
    • Advances in Cryptology - ASIACRYPT '98
    • Silverman J., Suzuki J. Elliptic curve discrete logarithms and the index calculus. Lecture Notes in Comput. Sci. 1998, vol. 1514:110-125.
    • (1998) Lecture Notes in Comput. Sci. , vol.1514 , pp. 110-125
    • Silverman, J.1    Suzuki, J.2
  • 100
    • 44449086875 scopus 로고    scopus 로고
    • Isogenies and the discrete logarithm problem in jacobians of genus 3 hyperelliptic curves
    • Advances in Cryptology - EUROCRYPT 2008
    • Smith B. Isogenies and the discrete logarithm problem in jacobians of genus 3 hyperelliptic curves. Lecture Notes in Comput. Sci. 2008, vol. 4965:163-180.
    • (2008) Lecture Notes in Comput. Sci. , vol.4965 , pp. 163-180
    • Smith, B.1
  • 101
    • 84917299385 scopus 로고    scopus 로고
    • Transgressing the boundaries: Toward a transformative hermeneutics of quantum gravity
    • Sokal A. Transgressing the boundaries: Toward a transformative hermeneutics of quantum gravity. Social Text 1996, 46/47:217-252.
    • (1996) Social Text , pp. 217-252
    • Sokal, A.1
  • 103
    • 0010029876 scopus 로고    scopus 로고
    • Efficient arithmetic on Koblitz curves
    • Solinas J. Efficient arithmetic on Koblitz curves. Des. Codes Cryptogr. 2000, 19:195-249.
    • (2000) Des. Codes Cryptogr. , vol.19 , pp. 195-249
    • Solinas, J.1
  • 105
    • 84945129491 scopus 로고    scopus 로고
    • Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
    • Advances in Cryptology - EUROCRYPT 2001
    • Verheul E. Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. Lecture Notes in Comput. Sci. 2001, vol. 2045:195-210.
    • (2001) Lecture Notes in Comput. Sci. , vol.2045 , pp. 195-210
    • Verheul, E.1
  • 106
    • 23044474013 scopus 로고    scopus 로고
    • Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
    • Verheul E. Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. J. Cryptology 2004, 17:277-296.
    • (2004) J. Cryptology , vol.17 , pp. 277-296
    • Verheul, E.1
  • 108
    • 84949189974 scopus 로고    scopus 로고
    • Faster attacks on elliptic curve cryptosystems
    • Selected Areas in Cryptography - SAC '98
    • Wiener M., Zuccherato R. Faster attacks on elliptic curve cryptosystems. Lecture Notes in Comput. Sci. 1999, vol. 1556:190-200.
    • (1999) Lecture Notes in Comput. Sci. , vol.1556 , pp. 190-200
    • Wiener, M.1    Zuccherato, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.