-
1
-
-
84929727140
-
A Subexponential Algorithm for Discrete Logarithm over the Rational Subgroup of the Jacobians of Large Genus Hyperelliptic Curves over Finite Fields
-
Springer-Verlag
-
L.M. adleman, J. DeMarrais and M. huang, "A Subexponential Algorithm for Discrete Logarithm over the Rational Subgroup of the Jacobians of Large Genus Hyperelliptic Curves over Finite Fields", Proc. of ANTS1, LNCS, vol. 877, Springer-Verlag, (1994), 28-40
-
(1994)
Proc. Of ANTS1, LNCS
, vol.877
, pp. 28-40
-
-
Adleman, L.M.1
Demarrais, J.2
Huang, M.3
-
2
-
-
0032147416
-
-
Jacobi sums and hyperelliptic cryptosystems,", Bull. Austral. Math.Soc
-
J. BUHLER, N. KOBLITZ, Joe Buhler and Neal Koblitz, "Lattice basis reduction, Jacobi sums and hyperelliptic cryptosystems,", Bull. Austral. Math.Soc. (1998)
-
(1998)
"Lattice Basis Reduction
-
-
Buhler, J.1
Koblitz, N.2
Buhler, J.3
Koblitz, N.4
-
3
-
-
84955587760
-
Non supersingular elliptic curves for public key cryptosystems
-
T. Beth and F. SCAEFER, "Non supersingular elliptic curves for public key cryptosystems", Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science, 547, pp.316-327 (1991).
-
(1991)
Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science
, vol.547
, pp. 316-327
-
-
Beth, T.1
Scaefer, F.2
-
4
-
-
84968494137
-
Computing in the Jacobian of a Hyperelliptic Curve
-
D.G. Cantor, "Computing in the Jacobian of a Hyperelliptic Curve", Math. Comp, 48, No.177 (1987), 95-101.
-
(1987)
Math. Comp
, vol.48
, Issue.177
, pp. 95-101
-
-
Cantor, D.G.1
-
5
-
-
0141879191
-
Efficient construction of secure hyperelliptic discrete logarithms
-
Springer-Verlag, LNCS
-
J. Chao, N. Matsuda, and S. TSUJII, "Efficient construction of secure hyperelliptic discrete logarithms", Information and Communications Security, Springer-Verlag, LNCS 1334 (1997), 292-301.
-
(1997)
Information and Communications Security
, vol.1334
, pp. 292-301
-
-
Chao, J.1
Matsuda, N.2
Tsujii, S.3
-
6
-
-
84957382777
-
Design of elliptic curves with controllable lower boundary of extension degree for reduction attacks
-
Springer-Verlag
-
J. Chao, K. Tanaka, and S. Tsujii, "Design of elliptic curves with controllable lower boundary of extension degree for reduction attacks", Advances in Cryptology Crypto'94, Springer-Verlag, (1994), 50-55.
-
(1994)
Advances in Cryptology Crypto'94
, pp. 50-55
-
-
Chao, J.1
Tanaka, K.2
Tsujii, S.3
-
8
-
-
84968502759
-
A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves
-
G. Frey and H.G. Ruck, "A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves", Math. Comp, 62,No.206 (1994), 865-874
-
(1994)
Math. Comp
, vol.62
, Issue.206
-
-
Frey, G.1
Ruck, H.G.2
-
10
-
-
85031798246
-
A Family of Jacobians Suitable for Discrete Log Cryptosystems
-
Springer-Verlag
-
N. KOBLITZ, "A Family of Jacobians Suitable for Discrete Log Cryptosystems", Advances in Cryptology Crypto'88, Springer-Verlag, (1990), 94-99.
-
(1990)
Advances in Cryptology Crypto'88
, pp. 94-99
-
-
Koblitz, N.1
-
11
-
-
0024864204
-
Hyperelliptic Cryptosystems
-
N. KOBLITZ, "Hyperelliptic Cryptosystems", J.Cryptology, 1 (1989), 139-150.
-
(1989)
J.Cryptology
, vol.1
, pp. 139-150
-
-
Koblitz, N.1
-
13
-
-
2142786147
-
Efficient Elliptic curve Exponentiation
-
Springer-Verlag
-
A. Miyaji, T. Ono and H. Cohen, "Efficient Elliptic curve Exponentiation", Information and Communications Security, Springer-Verlag, (1997), 282-290.
-
(1997)
Information and Communications Security
, pp. 282-290
-
-
Miyaji, A.1
Ono, T.2
Cohen, H.3
-
14
-
-
0027662341
-
Reducing elliptic curve logarithm to logarithm in a finite field
-
A.J. Menezes, T. Okamoto and S.A. Vanstone, "Reducing elliptic curve logarithm to logarithm in a finite field", IEEE Trans. on IT, 39, (1993), 1639-1646.
-
(1993)
IEEE Trans. On IT
, vol.39
, pp. 1639-1646
-
-
Menezes, A.J.1
Okamoto, T.2
Vanstone, S.A.3
-
15
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(P) and its cryptographic significance
-
S.C. POHLIG and M.E. HELLMAN, "An improved algorithm for computing logarithms over GF(p) and its cryptographic significance", IEEE Trans. on IT, 24, (1978), 106-110
-
(1978)
IEEE Trans. On IT
, vol.24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
18
-
-
0032352723
-
Evaluation of discrete logarithms in a group of p-torsion pointsof an elliptic curve in characteristic p
-
I.A. Semaev, "Evaluation of discrete logarithms in a group of p-torsion pointsof an elliptic curve in characteristic p", Math. Comp, Vol.76 (1998), 353-356.
-
(1998)
Math. Comp
, vol.76
, pp. 353-356
-
-
Semaev, I.A.1
-
20
-
-
84947788992
-
Secure hyperelliptic cryptosystemsand their performance
-
Y. Sakai, K. Sakurai and H. Ishizuka, "Secure hyperelliptic cryptosystemsand their performance", Pre-Proc. PKC 98 (1998)
-
(1998)
Pre-Proc. PKC
, vol.98
-
-
Sakai, Y.1
Sakurai, K.2
Ishizuka, H.3
-
22
-
-
84955600081
-
"A Fase Software Implementation for Arithmetic Operations in GF(2n)
-
Springer-Verlag
-
E.D. Win, A. BOSSELAERS, and S. VANDENBERGHE, "A Fase Software Implementation for Arithmetic Operations in GF(2n)" Advances in Cryptology Asiacrypt'96, Springer-Verlag, (1996), 65-76.
-
(1996)
Advances in Cryptology Asiacrypt'96
, pp. 65-76
-
-
Win, E.D.1
Bosselaers, A.2
Vandenberghe, S.3
|