-
1
-
-
85000722592
-
The function field sieve
-
Huang, M.-D.A., Adleman, L.M. (eds.) ANTS 1994 Springer, Heidelberg
-
Adleman, L.M.: The Function Field Sieve. In: Huang, M.-D.A., Adleman, L.M. (eds.) ANTS 1994. LNCS, vol. 877, pp. 108-121. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.877
, pp. 108-121
-
-
Adleman, L.M.1
-
2
-
-
84929727140
-
A subexponential algorithm for discrete logarithms over the rational subgroup of the jacobians of large genus hyperelliptic curves over finite fields
-
Huang, M.-D.A., Adleman, L.M. (eds.) ANTS 1994 Springer, Heidelberg
-
Adleman, L.M., DeMarrais, J., Huang, M.-D.: A Subexponential Algorithm for Discrete Logarithms over the Rational Subgroup of the Jacobians of Large Genus Hyperelliptic Curves over Finite Fields. In: Huang, M.-D.A., Adleman, L.M. (eds.) ANTS 1994. LNCS, vol. 877, pp. 28-40. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.877
, pp. 28-40
-
-
Adleman, L.M.1
Demarrais, J.2
Huang, M.-D.3
-
3
-
-
33646803467
-
A Weil descent attack against elliptic curve cryptosystems over quartic extension fields
-
Arita, S., Matsuo, K., Nagao, K.-I., Shimura, M.: A Weil descent attack against elliptic curve cryptosystems over quartic extension fields. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E89-A, 1246-1254 (2006)
-
(2006)
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
, vol.E89-A
, pp. 1246-1254
-
-
Arita, S.1
Matsuo, K.2
Nagao, K.-I.3
Shimura, M.4
-
4
-
-
0001224411
-
Efficient arithmetic in finite field extensions with application in elliptic curve cryptography
-
Bailey, D.V., Paar, C.: Efficient arithmetic in finite field extensions with application in elliptic curve cryptography. J. Cryptology 14(3), 153-176 (2001)
-
(2001)
J. Cryptology
, vol.14
, Issue.3
, pp. 153-176
-
-
Bailey, D.V.1
Paar, C.2
-
5
-
-
34547358080
-
Advances in elliptic curve cryptography
-
Cambridge University Press, Cambridge
-
Blake, I.F., Seroussi, G., Smart, N.P. (eds.): Advances in elliptic curve cryptography. London Mathematical Society Lecture Note Series, vol. 317. Cambridge University Press, Cambridge (2005)
-
(2005)
London Mathematical Society Lecture Note Series
, vol.317
-
-
Blake, I.F.1
Seroussi, G.2
Smart, N.P.3
-
6
-
-
0031232428
-
The Magma algebra system. I. the user language
-
Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system. I. The user language. J. Symbolic Comput. 24(3-4), 235-265 (1997)
-
(1997)
J. Symbolic Comput.
, vol.24
, Issue.3-4
, pp. 235-265
-
-
Bosma, W.1
Cannon, J.2
Playoust, C.3
-
7
-
-
4544381452
-
The GHS attack in odd characteristic
-
Diem, C.: The GHS attack in odd characteristic. J. Ramanujan Math. Soc. 18(1), 1-32 (2003)
-
(2003)
J. Ramanujan Math. Soc.
, vol.18
, Issue.1
, pp. 1-32
-
-
Diem, C.1
-
8
-
-
33746706217
-
An index calculus algorithm for plane curves of small degree
-
Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006 Springer, Heidelberg
-
Diem, C.: An Index Calculus Algorithm for Plane Curves of Small Degree. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol. 4076, pp. 543-557. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4076
, pp. 543-557
-
-
Diem, C.1
-
9
-
-
79957476584
-
On the discrete logarithm problem in elliptic curves
-
Diem, C.: On the discrete logarithm problem in elliptic curves. Compos. Math. 147(1), 75-104 (2011)
-
(2011)
Compos. Math.
, vol.147
, Issue.1
, pp. 75-104
-
-
Diem, C.1
-
11
-
-
84947261826
-
Extending the ghs weil descent attack
-
Knudsen, L.R. (ed.) EUROCRYPT 2002 Springer, Heidelberg
-
Galbraith, S.D., Hess, F., Smart, N.P.: Extending the GHS Weil Descent Attack. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 29-44. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 29-44
-
-
Galbraith, S.D.1
Hess, F.2
Smart, N.P.3
-
12
-
-
84948978775
-
An algorithm for solving the discrete log problem on hyperelliptic curves
-
Preneel, B. (ed.) EUROCRYPT 2000 Springer, Heidelberg
-
Gaudry, P.: An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 19-34. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 19-34
-
-
Gaudry, P.1
-
13
-
-
69849107700
-
Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem
-
Gaudry, P.: Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem. J. Symbolic Comput. 44(12), 1690-1702 (2008)
-
(2008)
J. Symbolic Comput.
, vol.44
, Issue.12
, pp. 1690-1702
-
-
Gaudry, P.1
-
14
-
-
0001788567
-
Constructive and destructive facets of Weil descent on elliptic curves
-
Gaudry, P., Hess, F., Smart, N.P.: Constructive and destructive facets of Weil descent on elliptic curves. J. Cryptology 15(1), 19-46 (2002)
-
(2002)
J. Cryptology
, vol.15
, Issue.1
, pp. 19-46
-
-
Gaudry, P.1
Hess, F.2
Smart, N.P.3
-
15
-
-
38049124867
-
-
Gaudry, P., Thoḿe, E., Th́eriault, N., Diem, C.: A double large prime variation for small genus hyperelliptic index calculus. Math. Comp. 76, 475-492 (2007)
-
(2007)
A Double Large Prime Variation for Small Genus Hyperelliptic Index Calculus. Math. Comp.
, vol.76
, pp. 475-492
-
-
Gaudry, P.1
Thoḿe, E.2
Th́eriault, N.3
Diem, C.4
-
16
-
-
23044512900
-
Generalising the GHS attack on the elliptic curve discrete logarithm problem
-
electronic
-
Hess, F.: Generalising the GHS attack on the elliptic curve discrete logarithm problem. LMS J. Comput. Math. 7, 167-192 (2004) (electronic)
-
(2004)
LMS J. Comput. Math.
, vol.7
, pp. 167-192
-
-
Hess, F.1
-
17
-
-
31444453853
-
Weil descent attacks
-
Advances in Elliptic Curve Cryptography Cambridge Univ. Press, Cambridge
-
Hess, F.: Weil descent attacks. In: Advances in Elliptic Curve Cryptography. London Math. Soc. Lecture Note Ser, vol. 317, pp. 151-180. Cambridge Univ. Press, Cambridge (2005)
-
(2005)
London Math. Soc. Lecture Note ser
, vol.317
, pp. 151-180
-
-
Hess, F.1
-
18
-
-
84878520685
-
Elliptic curve discrete logarithm problem over small degree extension fields
-
doi:10.1007/s00145-011-9116-z
-
Joux, A., Vitse, V.: Elliptic curve discrete logarithm problem over small degree extension fields. J. Cryptology, 1-25 (2011), doi:10.1007/s00145-011- 9116-z
-
(2011)
J. Cryptology
, vol.1-25
-
-
Joux, A.1
Vitse, V.2
-
19
-
-
79951788742
-
A Variant of the F4 Algorithm
-
Kiayias, A. (ed.) CT-RSA 2011 Springer, Heidelberg
-
Joux, A., Vitse, V.: A Variant of the F4 Algorithm. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 356-375. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6558
, pp. 356-375
-
-
Joux, A.1
Vitse, V.2
-
20
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N.: Elliptic curve cryptosystems. Math. Comp. 48(177), 203-209 (1987)
-
(1987)
Math. Comp.
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
21
-
-
0012438383
-
Computation of discrete logarithms in prime fields
-
LaMacchia, B.A., Odlyzko, A.M.: Computation of discrete logarithms in prime fields. Des. Codes Cryptogr. 1(1), 47-62 (1991)
-
(1991)
Des. Codes Cryptogr.
, vol.1
, Issue.1
, pp. 47-62
-
-
Lamacchia, B.A.1
Odlyzko, A.M.2
-
22
-
-
0003291192
-
The development of the number field sieve
-
Springer, Berlin
-
Lenstra, A.K., Lenstra Jr., H.W. (eds.): The development of the number field sieve. Lecture Notes in Math., vol. 1554. Springer, Berlin (1993)
-
(1993)
Lecture Notes in Math.
, vol.1554
-
-
Lenstra, A.K.1
Lenstra Jr., H.W.2
-
23
-
-
35048833769
-
Weak fields for ECC
-
Okamoto, T. (ed.) CT-RSA 2004 Springer, Heidelberg
-
Menezes, A., Teske, E., Weng, A.: Weak Fields for ECC. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 366-386. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2964
, pp. 366-386
-
-
Menezes, A.1
Teske, E.2
Weng, A.3
-
24
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Williams, H.C. (ed.) CRYPTO 1985 Springer, Heidelberg
-
Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417-426. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
25
-
-
84860002178
-
Scholten forms and elliptic/hyperelliptic curves with weak Weil restrictions
-
Momose, F., Chao, J.: Scholten forms and elliptic/hyperelliptic curves with weak Weil restrictions. Cryptology ePrint Archive, Report 2005/277 (2005)
-
(2005)
Cryptology EPrint Archive, Report 2005/277
-
-
Momose, F.1
Chao, J.2
-
26
-
-
77955333479
-
Decomposition attack for the jacobian of a hyperelliptic curve over an extension field
-
Hanrot, G., Morain, F., Thoḿe, E. (eds.) ANTS-IX Springer, Heidelberg
-
Nagao, K.-i.: Decomposition Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field. In: Hanrot, G., Morain, F., Thoḿe, E. (eds.) ANTS-IX. LNCS, vol. 6197, pp. 285-300. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6197
, pp. 285-300
-
-
Nagao K., .-I.1
-
27
-
-
84859986550
-
Genus 3 curves with many involutions and application to maximal curves in characteristic 2
-
Arithmetic, Geometry, Cryptography and Coding Theory 2009 Amer. Math. Soc., Providence
-
Nart, E., Ritzenthaler, C.: Genus 3 curves with many involutions and application to maximal curves in characteristic 2. In: Arithmetic, Geometry, Cryptography and Coding Theory 2009. Contemp. Math., vol. 521, pp. 71-85. Amer. Math. Soc., Providence (2010)
-
(2010)
Contemp. Math.
, vol.521
, pp. 71-85
-
-
Nart, E.1
Ritzenthaler, C.2
-
28
-
-
84966238549
-
Monte Carlo methods for index computation (mod p)
-
Pollard, J.M.: Monte Carlo methods for index computation (mod p). Math. Comp. 32(143), 918-924 (1978)
-
(1978)
Math. Comp.
, vol.32
, Issue.143
, pp. 918-924
-
-
Pollard, J.M.1
-
30
-
-
23044515783
-
Summation polynomials and the discrete logarithm problem on elliptic curves
-
Semaev, I.A.: Summation polynomials and the discrete logarithm problem on elliptic curves. Cryptology ePrint Archive, Report 2004/031 (2004)
-
(2004)
Cryptology EPrint Archive, Report 2004/031
-
-
Semaev, I.A.1
-
31
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
Fumy, W. (ed.) EUROCRYPT 1997 Springer, Heidelberg
-
Shoup, V.: Lower Bounds for Discrete Logarithms and Related Problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256-266. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 256-266
-
-
Shoup, V.1
-
32
-
-
23044510745
-
Weil descent attack for Kummer extensions
-
Th́eriault, N.: Weil descent attack for Kummer extensions. J. Ramanujan Math. Soc. 18(3), 281-312 (2003)
-
(2003)
J. Ramanujan Math. Soc.
, vol.18
, Issue.3
, pp. 281-312
-
-
Th́eriault, N.1
|