메뉴 건너뛰기




Volumn 839 LNCS, Issue , 1994, Pages 50-55

Design of elliptic curves with controllable lower boundary of extension degree for reduction attacks

Author keywords

[No Author keywords available]

Indexed keywords

GEOMETRY;

EID: 84957382777     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48658-5_6     Document Type: Conference Paper
Times cited : (12)

References (18)
  • 1
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography. Advances in Cryptology-CRYPTO’85
    • Miller, V. S.: Use of elliptic curves in cryptography. Advances in Cryptology-CRYPTO’85, Lecture Notes in Computer Science, 218 (1986) 417–426
    • (1986) Lecture Notes in Computer Science , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 2
    • 84968503742 scopus 로고
    • Elliptic Curve Cryptosystems
    • Koblitz, N.: Elliptic Curve Cryptosystems. Math. Comp. 48 (1987) 203–209
    • (1987) Math. Comp , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 5
    • 85030330304 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • Menezes, A. J., Vanstone, S., Okamoto T.: Reducing elliptic curve logarithms to logarithms in a finite field. Proc. of STOC’91 (1991) 80–89
    • (1991) Proc. of STOC’91 , pp. 80-89
    • Menezes, A.J.1    Vanstone, S.2    Okamoto, T.3
  • 6
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithm over GF(P)and its cryptographic significance
    • Pohlig, S. C., Hellman, M. E.: An improved algorithm for computing logarithm over GF(p)and its cryptographic significance. IEEE Trans. Information Theory, IT-24,1 (1978) 106–110
    • (1978) IEEE Trans. Information Theory , vol.24 , Issue.1 , pp. 106-110
    • Pohlig, S.C.1    Hellman, M.E.2
  • 7
    • 0018724062 scopus 로고
    • A subexponential algorithm for the discrete logarithm problem with applications to cryptography
    • Adleman, L. M.: A subexponential algorithm for the discrete logarithm problem with applications to cryptography. Proc. of IEEE 20th Symp. on Foundations of Comp. Sci. (1979) 55–60
    • (1979) Proc. of IEEE 20Th Symp. on Foundations of Comp. Sci , pp. 55-60
    • Adleman, L.M.1
  • 8
    • 0348022988 scopus 로고
    • Elliptic curve implementation of zero-knowledge blobs
    • Koblitz, N.: Elliptic curve implementation of zero-knowledge blobs. Journal of Cryptology, vol. 4, No. 3 (1991) 207–213
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 207-213
    • Koblitz, N.1
  • 10
    • 84889062986 scopus 로고
    • Building cyclic elliptic curves modulo large primes. Advances in Cryptology-EUROCRYPT’91
    • Morain, F., Building cyclic elliptic curves modulo large primes. Advances in Cryptology-EUROCRYPT’91, Lecture Notes in Computer Science, 547 (1991) 328–336
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 328-336
    • Morain, F.1
  • 11
    • 84947703281 scopus 로고
    • On secure elliptic curves against the “reduction attack” and their design strategy
    • 10A, IEICE Tech. Report, ISEC93-100
    • Chao, J., Tanada, K., Tsujii S.: On secure elliptic curves against the “reduction attack” and their design strategy. Proc. of SCIS’94 (1994) 10A, IEICE Tech. Report, ISEC93-100, 29–37
    • (1994) Proc. of SCIS’94 , pp. 29-37
    • Chao, J.1    Tanada, K.2    Tsujii, S.3
  • 12
    • 84966233278 scopus 로고
    • Elliptic curves over finite fields and the computation of square roots mod p
    • Schoof, R.: Elliptic curves over finite fields and the computation of square roots mod p. Math. Comp. 44 (1985) 483–494
    • (1985) Math. Comp , vol.44 , pp. 483-494
    • Schoof, R.1
  • 14
    • 0001262977 scopus 로고
    • Probabilistic algorithm in finite fields
    • Robin, M. O.: Probabilistic algorithm in finite fields. SIAM J. on Comput., Vol.9, No.2 (1980) 273–280
    • (1980) SIAM J. on Comput. , vol.9 , Issue.2 , pp. 273-280
    • Robin, M.O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.