Removable weak keys for discrete logarithm-based cryptography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Weakness of F36·509 for Discrete Logarithm Cryptography

In 2013, Joux, and then Barbulescu, Gaudry, Joux and Thomé, presented new algorithms for computing discrete logarithms in finite fields of small and medium characteristic. We show that these new algorithms render the finite field F36·509 = F33054 weak for discrete logarithm cryptography in the sense that discrete logarithms in this field can be computed significantly faster than with the previo...

متن کامل

Weakness of 𝔽36·509 for Discrete Logarithm Cryptography

In 2013, Joux, and then Barbulescu, Gaudry, Joux and Thomé, presented new algorithms for computing discrete logarithms in finite fields of small and medium characteristic. We show that these new algorithms render the finite field F36·509 = F33054 weak for discrete logarithm cryptography in the sense that discrete logarithms in this field can be computed significantly faster than with the previo...

متن کامل

Compressing and Disguising Elements in Discrete Logarithm Cryptography

In the modern world, the ubiquity of digital communication is driven by the constantly evolving world of cryptography. Consequently one must efficiently implement asymmetric cryptography in environments which have limited resources at their disposal, such as smart–cards, ID cards, vehicular microchips and many more. It is the primary purpose of this thesis to investigate methods for reducing th...

متن کامل

Attacks on Elliptic Curve Cryptography Discrete Logarithm Problem ( EC - DLP )

This paper provides an overview of elliptic curves and their use in cryptography. The purpose of this paper is an in-depth examination of the Elliptic Curve Discrete Logarithm (ECDLP) including techniques in attacking cryptosystems dependent on the ECDLP. The paper includes properties of elliptic curve and methods for various attacks.

متن کامل

Protecting Secret Keys with Blind Computation Service Based on Discrete Logarithm

Normally computer users use a passphrase or a password to encrypt secret values in computer systems. In this case, to prevent the brute–force attack, the password should be long enough and difficult to guess. But, such kind of passwords are also difficult for the human beings to remember. In this paper, we propose a method for protecting secret keys. A secret key means secret value like the pas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cryptographic Engineering

سال: 2020

ISSN: 2190-8508,2190-8516

DOI: 10.1007/s13389-020-00250-7