Analysis of the Xedni Calculus Attack
نویسندگان
چکیده
The xedni calculus attack on the elliptic curve discrete logarithm problem (ECDLP) involves lifting points from the finite field Fp to the rational numbersQ and then constructing an elliptic curve overQ that passes through them. If the lifted points are linearly dependent, then the ECDLP is solved. Our purpose is to analyze the practicality of this algorithm. We find that asymptotically the algorithm is virtually certain to fail, because of an absolute bound on the size of the coefficients of a relation satisfied by the lifted points. Moreover, even for smaller values of p experiments show that the odds against finding a suitable lifting are prohibitively high.
منابع مشابه
The Xedni Calculus and the Elliptic Curve Discrete Logarithm Problem
Let E=F p be an elliptic curve deened over a nite eld, and let S;T 2 E(F p) be two points on E. The Elliptic Curve Discrete Logarithm Problem (ECDLP) asks to nd an integer m so that S = mT in E(F p). In this note we give a new algorithm, dubbed the Xedni Calculus, which might be used to solve the ECDLP. As remarked by Neal Koblitz, the Xedni method is also applicable to the classical discrete l...
متن کاملNON-POLYNOMIAL SPLINE FOR THE NUMERICAL SOLUTION OF PROBLEMS IN CALCULUS OF VARIATIONS
A Class of new methods based on a septic non-polynomial spline function for the numerical solution of problems in calculus of variations is presented. The local truncation errors and the methods of order 2th, 4th, 6th, 8th, 10th, and 12th, are obtained. The inverse of some band matrixes are obtained which are required in proving the convergence analysis of the presented method. Convergence anal...
متن کاملOn certain fractional calculus operators involving generalized Mittag-Leffler function
The object of this paper is to establish certain generalized fractional integration and differentiation involving generalized Mittag-Leffler function defined by Salim and Faraj [25]. The considered generalized fractional calculus operators contain the Appell's function $F_3$ [2, p.224] as kernel and are introduced by Saigo and Maeda [23]. The Marichev-Saigo-Maeda fractional calculus operators a...
متن کاملCertain subclass of $p$-valent meromorphic Bazilevi'{c} functions defined by fractional $q$-calculus operators
The aim of the present paper is to introduce and investigate a new subclass of Bazilevi'{c} functions in the punctured unit disk $mathcal{U}^*$ which have been described through using of the well-known fractional $q$-calculus operators, Hadamard product and a linear operator. In addition, we obtain some sufficient conditions for the func...
متن کاملAn Ant Colony Optimization Algorithm for Network Vulnerability Analysis
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Des. Codes Cryptography
دوره 20 شماره
صفحات -
تاریخ انتشار 2000