메뉴 건너뛰기




Volumn 209 LNCS, Issue , 1985, Pages 224-314

Discrete logarithms in finite fields and their cryptographic significance

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY;

EID: 84957014368     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-39757-4_20     Document Type: Conference Paper
Times cited : (219)

References (72)
  • 1
    • 0018724062 scopus 로고
    • A subexponential algorithm for the discrete logarithm problem with applications to cryptography
    • L. M. Adleman, A subexponential algorithm for the discrete logarithm problem with applications to cryptography, Proc. 20th IEEE Found, Comp. Sci. Symp. (1979), 55-60.
    • (1979) Proc. 20Th IEEE Found, Comp. Sci. Symp , pp. 55-60
    • Adleman, L.M.1
  • 2
    • 0001671902 scopus 로고
    • On distinguishing prime numbers from composite numbers
    • L. M. Adleman, C. Pomerance and R. S. Rumely, On distinguishing prime numbers from composite numbers, Annals Math. 117 (1983), 173-206.
    • (1983) Annals Math , vol.117 , pp. 173-206
    • Adleman, L.M.1    Pomerance, C.2    Rumely, R.S.3
  • 4
    • 0020720875 scopus 로고
    • An efficient parallel algorithm for the solution of large sparse linear matrix equations
    • C. P. Arnold, M. I. Parr, and M. B. Dewe, An efficient parallel algorithm for the solution of large sparse linear matrix equations, IEEE Trans, on Computers, C-32 (1983), 265-272.
    • (1983) IEEE Trans, on Computers , vol.C-32 , pp. 265-272
    • Arnold, C.P.1    Parr, M.I.2    Dewe, M.B.3
  • 6
    • 27844515919 scopus 로고
    • Lecture Notes in Mathematics #572, Springer-Verlag
    • V. A. Barker, ed., Sparse Matrix Techniques, Lecture Notes in Mathematics #572, Springer-Verlag, 1977.
    • (1977) Sparse Matrix Techniques
    • Barker, V.A.1
  • 7
    • 84968518238 scopus 로고
    • Factoring polynomials over large finite fields
    • E. R. Berlekamp, Factoring polynomials over large finite fields, Math. Comp. 24 (1970), 713-735.
    • (1970) Math. Comp. , vol.24 , pp. 713-735
    • Berlekamp, E.R.1
  • 9
    • 85034440316 scopus 로고    scopus 로고
    • How to generate cryptographically strong sequences of pseudo random bits
    • to appear
    • M. Blum and S. Micali, How to generate cryptographically strong sequences of pseudo random bits, SIAM J. Comp., to appear.
    • SIAM J. Comp
    • Blum, M.1    Micali, S.2
  • 12
    • 0020900943 scopus 로고
    • A fast modular multiplication algorithm with applications to two key crytography
    • D. Chaum, R. Rivest, and A. Sherman, eds., Plenum Press
    • E. F. Brickell, A fast modular multiplication algorithm with applications to two key crytography, pp. 51-60 in Advances in Cryptology: Proceedings of CRYPTO '82, D. Chaum, R. Rivest, and A. Sherman, eds., Plenum Press, 1983.
    • (1983) In Advances in Cryptology: Proceedings of CRYPTO '82 , pp. 51-60
    • Brickell, E.F.1
  • 13
    • 0020920822 scopus 로고
    • Some remarks on the Herlestam-Johannesson algorithm for computing logarithms over GF(2n)
    • D. Chaum, R. Rivest and A. Sherman, eds., Plenum Press
    • n), pp. 15-20, in Advances in Cryptology: Proceedings of CRYPTO’82, D. Chaum, R. Rivest and A. Sherman, eds., Plenum Press, 1983.
    • (1983) Advances in Cryptology: Proceedings of CRYPTO’82 , pp. 15-20
    • Brickell, E.F.1    Moore, J.H.2
  • 16
    • 84966220369 scopus 로고
    • A new algorithm for factoring polynomials over finite fields
    • D. G. Cantor and H. Zassenhaus, A new algorithm for factoring polynomials over finite fields. Math. Comp. 36 (1981), 587-592.
    • (1981) Math. Comp. , vol.36 , pp. 587-592
    • Cantor, D.G.1    Zassenhaus, H.2
  • 17
    • 84968518187 scopus 로고
    • Primality testing and Jacobi sums
    • H. Cohen and H. W. Lenstra, Jr., Primality testing and Jacobi sums. Math. Comp., 42 (1984), 297-330.
    • (1984) Math. Comp. , vol.42 , pp. 297-330
    • Cohen, H.1    Lenstra, H.W.2
  • 19
    • 0021468777 scopus 로고
    • Fast evaluation of logarithms in fields of characteristic two
    • D. Coppersmith, Fast evaluation of logarithms in fields of characteristic two, IEEE Trans. Inform. Theory IT-30 (1984), 587-594.
    • (1984) IEEE Trans. Inform. Theory , vol.IT-30 , pp. 587-594
    • Coppersmith, D.1
  • 21
    • 0010999635 scopus 로고
    • On the asymptotic complexity of matrix multiplication
    • D. Coppersmith and S. Winograd, On the asymptotic complexity of matrix multiplication, SIAM J. Comp. 11 (1982), 472-492.
    • (1982) SIAM J. Comp. , vol.11 , pp. 472-492
    • Coppersmith, D.1    Winograd, S.2
  • 24
    • 0017501281 scopus 로고
    • Exhaustive cryptanalysis of the NBS Data Encryption Standard
    • W. Diffie and M. E. Heilman, Exhaustive cryptanalysis of the NBS Data Encryption Standard, Computer 10 (1977), 74-84.
    • (1977) Computer , vol.10 , pp. 74-84
    • Diffie, W.1    Heilman, M.E.2
  • 26
    • 85034444754 scopus 로고    scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • to appear
    • T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory, to appear.
    • IEEE Trans. Inform. Theory
    • Elgamal, T.1
  • 29
    • 0009032814 scopus 로고
    • Analysis of the Berlekamp-Massey feedback shift-register synthesis algorithm
    • F. G. Gustavson, Analysis of the Berlekamp-Massey feedback shift-register synthesis algorithm, IBM J. Res. Dev. 20 (1976), 204-212.
    • (1976) IBM J. Res. Dev. , vol.20 , pp. 204-212
    • Gustavson, F.G.1
  • 33
    • 0000135303 scopus 로고
    • Methods of conjugate gradients for solving linear systems
    • M. R. Hestenes and E. Stiefel, Methods of conjugate gradients for solving linear systems, J. Res. Nat. Bureau of Standards 49 (1952), 409-436.
    • (1952) J. Res. Nat. Bureau of Standards , vol.49 , pp. 409-436
    • Hestenes, M.R.1    Stiefel, E.2
  • 36
    • 85034434904 scopus 로고
    • Seminumerical Algorithms, 2nd ed., Addison-Wesley
    • D. E. Knuth, The Art of Computer Programming: Vol. 2, Seminumerical Algorithms, 2nd ed., Addison-Wesley 1981.
    • (1981) The Art of Computer Programming , vol.2
    • Knuth, D.E.1
  • 38
    • 0019341155 scopus 로고
    • Communication privacy: Integration of public and secret key cryptography
    • Dec
    • J. Kowalchuk, B. P. Schanning, and S. Powers, Communication privacy: Integration of public and secret key cryptography, NTC Conference Record, Vol. 3, pp. 49.1.1-49.1.5, Dec. 1980.
    • (1980) NTC Conference Record , vol.3 , pp. 1-49
    • Kowalchuk, J.1    Schanning, B.P.2    Powers, S.3
  • 39
    • 0002814189 scopus 로고
    • Solution of systems of linear equations by minimized iterations
    • C. Lanczos, Solution of systems of linear equations by minimized iterations. Res. Nat. Bureau of Standards 49 (1952), 33-53.
    • (1952) Res. Nat. Bureau of Standards , vol.49 , pp. 33-53
    • Lanczos, C.1
  • 40
    • 85034423731 scopus 로고    scopus 로고
    • Random equivalence of factorization and computation of orders
    • to appear
    • D. L. Long, Random equivalence of factorization and computation of orders, Theoretical Comp. Sci., to appear.
    • Theoretical Comp. Sci
    • Long, D.L.1
  • 44
    • 84937740421 scopus 로고
    • Shift-register synthesis and BCH decoding
    • J. L. Massey, Shift-register synthesis and BCH decoding, IEEE Trans. Inform. Theory IT-15 (1969), 122-127.
    • (1969) IEEE Trans. Inform. Theory IT-15 , pp. 122-127
    • Massey, J.L.1
  • 45
    • 84925442066 scopus 로고
    • Logarithms in finite cyclic groups - cryptographic issues
    • Leuven, Belgium, May
    • J. L. Massey, Logarithms in finite cyclic groups - cryptographic issues, pp. 17-25 in Proc. 4th Benelux Symp. On Inform. Theory, Leuven, Belgium, May 1983.
    • (1983) Proc. 4Th Benelux Symp. On Inform. Theory , pp. 17-25
    • Massey, J.L.1
  • 47
    • 84966223197 scopus 로고
    • On factorization, with a suggested new approach
    • J. C. P. Miller, On factorization, with a suggested new approach, Math. Comp. 29 (1975), 155-172.
    • (1975) Math. Comp. , vol.29 , pp. 155-172
    • Miller, J.C.P.1
  • 51
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(P) and its cryptographic significance
    • S. C. Pohlig and M. Heilman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Trans. Inform. Theory IT-24 (1978), 106-110.
    • (1978) IEEE Trans. Inform. Theory , vol.IT-24 , pp. 106-110
    • Pohlig, S.C.1    Heilman, M.2
  • 52
    • 84966238549 scopus 로고
    • Monte Carlo methods for index computations (Mod p)
    • J. Pollard, Monte Carlo methods for index computations (mod p), Math. Comp. 32 (1978), 918-924.
    • (1978) Math. Comp. , vol.32 , pp. 918-924
    • Pollard, J.1
  • 53
    • 0005599967 scopus 로고
    • Analysis and comparison of some integer factoring algorithms
    • H. W. Lenstra, Jr., and R. Tijdeman, eds., Math. Centre Tract 154, Math. Centre Amsterdam
    • C. Pomerance, Analysis and comparison of some integer factoring algorithms, pp. 89-139 in Computational Methods in Number Theory: Part 1, H. W. Lenstra, Jr., and R. Tijdeman, eds., Math. Centre Tract 154, Math. Centre Amsterdam, 1982.
    • (1982) Computational Methods in Number Theory: Part 1 , pp. 89-139
    • Pomerance, C.1
  • 54
    • 0016090968 scopus 로고
    • A high security log-in procedure
    • G. B. Purdy, A high security log-in procedure, Comm. ACM 17 (1974), 442-445.
    • (1974) Comm. ACM , vol.17 , pp. 442-445
    • Purdy, G.B.1
  • 55
    • 0001262977 scopus 로고
    • Probabilistic algorithms in finite fields
    • M. O. Rabin, Probabilistic algorithms in finite fields, SIAM J. Comp. 9 (1980), 273-280.
    • (1980) SIAM J. Comp. , vol.9 , pp. 273-280
    • Rabin, M.O.1
  • 56
  • 59
    • 0018205963 scopus 로고
    • Data encryption with public key distribution
    • Washington, D.C., Oct
    • B. P. Schanning, Data encryption with public key distribution, EASCON Conf. Rec., Washington, D.C., Oct. 1979, pp. 653-660.
    • (1979) EASCON Conf. Rec. , pp. 653-660
    • Schanning, B.P.1
  • 60
    • 84966241531 scopus 로고
    • A Monte Carlo factoring algorithm with linear storage
    • C. P. Schnorr and H. W. Lenstra, Jr., A Monte Carlo factoring algorithm with linear storage, Math. Comp. 43 (1984), 289-311.
    • (1984) Math. Comp. , vol.43 , pp. 289-311
    • Schnorr, C.P.1    Lenstra, H.W.2
  • 61
    • 0020179268 scopus 로고
    • A new implementation of sparse gaussian elimination
    • R. Schreiber, A new implementation of sparse gaussian elimination, ACM Trans. Math. Software 8 (1982), 256-276.
    • (1982) ACM Trans. Math. Software , vol.8 , pp. 256-276
    • Schreiber, R.1
  • 63
    • 0021124584 scopus 로고
    • Realization and application of the Massey-Omura lock
    • March 6-8
    • P. K. S. Wah and M. Z. Wang, Realization and application of the Massey-Omura lock, pp. 175-182 in Proc. Intern. Zurich Seminar, March 6-8, 1984.
    • (1984) In Proc. Intern. Zurich Seminar , pp. 175-182
    • Wah, P.K.S.1    Wang, M.Z.2
  • 64
    • 85034449100 scopus 로고    scopus 로고
    • A polynomial form for logarithms modulo a prime
    • to appear
    • A. L. Wells, Jr., A polynomial form for logarithms modulo a prime, IEEE Trans. Inform. Theory, to appear.
    • IEEE Trans. Inform. Theory
    • Wells, A.L.1
  • 68
    • 0347818260 scopus 로고
    • Some remarks concerning the M.I.T. Public-key system
    • H. C. Williams and B. Schmid, Some remarks concerning the M.I.T. public-key system, BIT 19 (1979), 525-538.
    • (1979) BIT , vol.19 , pp. 525-538
    • Williams, H.C.1    Schmid, B.2
  • 69
    • 0020265467 scopus 로고
    • A single-chip VLSI implementation of the discrete exponential public key distribution system
    • K. Yiu and K. Peterson, A single-chip VLSI implementation of the discrete exponential public key distribution system, Proc. GLOBCOM-82, IEEE 1982, pp. 173-179.
    • (1982) Proc. GLOBCOM-82, IEEE , pp. 173-179
    • Yiu, K.1    Peterson, K.2
  • 70
    • 49549158800 scopus 로고
    • A conversion algorithm for logarithms on GF(2n)
    • n), J. Pure Appl. Algebra 4 (1974), 353-356.
    • (1974) J. Pure Appl. Algebra , vol.4 , pp. 353-356
    • Zierler, N.1
  • 71
    • 49949120525 scopus 로고
    • On primitive trinomials (Mod 2)
    • N. Zierler and J. Brillhart, On primitive trinomials (mod 2), Inform. Control 13 (1968), 541-554.
    • (1968) Inform. Control , vol.13 , pp. 541-554
    • Zierler, N.1    Brillhart, J.2
  • 72
    • 0001159015 scopus 로고
    • On primitive trinomials (Mod 2), II
    • N. Zierler and J. Brillhart, On primitive trinomials (mod 2), II., Inform. Control 14 (1969), 566-569.
    • (1969) Inform. Control , vol.14 , pp. 566-569
    • Zierler, N.1    Brillhart, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.