نتایج جستجو برای: discrete logarithm

تعداد نتایج: 167391  

Journal: :CoRR 2006
H. Gopalkrishna Gadiyar K. M. Sangeeta Maini R. Padma Mario Romsy

It is well known that the repeated square and multiply algorithm is an efficient way of modular exponentiation. The obvious question to ask is if this algorithm has an inverse which would calculate the discrete logarithm and what is its time compexity. The technical hitch is in fixing the right sign of the square root and this is the heart of the discrete logarithm problem over finite fields of...

2012
Antoine Joux Vanessa Vitse

We present a new “cover and decomposition” attack on the elliptic curve discrete logarithm problem, that combines Weil descent and decomposition-based index calculus into a single discrete logarithm algorithm. This attack applies, at least theoretically, to all composite degree extension fields, and is particularly well-suited for curves defined over Fp6 . We give a real-size example of discret...

2000
Noboru KUNIHIRO Kenji KOYAMA

Z/nZ (n = ∏k i=1 pi ei ) are defined by extending anomalous elliptic curves over a prime filed Fp. They have n points over a ring Z/nZ and pi points over Fpi for all pi. We generalize Satoh-Araki-Smart algorithm [10], [11] and Rück algorithm [9], which solve a discrete logarithm problem over anomalous elliptic curves. We prove that a “discrete logarithm problem over super-anomalous elliptic cur...

2007
Sangeeta Maini Mario Romsy

It is well known that the repeated square and multiply algorithm is an efficient way of modular exponentiation. The obvious question to ask is if this algorithm has an inverse which would calculate the discrete logarithm and what is its time compexity. The technical hitch is in fixing the right sign of the square root and this is the heart of the discrete logarithm problem over finite fields of...

2007
Sangeeta Maini

It is well known that the repeated square and multiply algorithm is an efficient way of modular exponentiation. The obvious question to ask is if this algorithm has an inverse which would calculate the discrete logarithm and what is its time compexity. The technical hitch is in fixing the right sign of the square root and this is the heart of the discrete logarithm problem over finite fields of...

2012
Florian Hess

The use of generalised Jacobians in discrete logarithm based cryptosystems has so far been rather limited since they offer no advantage over traditional discrete logarithm based systems. In this paper we continue the search for possible applications in two directions. Firstly, we investigate pairings on generalised Jacobians and show that these are insecure. Secondly, generalising and extending...

Journal: :J. Mathematical Cryptology 2012
Matan Banin Boaz Tsaban

Bergman’s ring Ep , parameterized by a prime number p, is a ring with p elements that cannot be embedded in a ring of matrices over any commutative ring. This ring was discovered in 1974. In 2011, Climent, Navarro and Tortosa described an efficient implementation of Ep using simple modular arithmetic, and suggested that this ring may be a useful source for intractable cryptographic problems. We...

2006
Sangeeta Maini

It is well known that the repeated square and multiply algorithm is an efficient way of modular exponentiation. The obvious question to ask is if this algorithm has an inverse which would calculate the discrete logarithm efficiently. The technical hitch is in fixing the right sign of the square root and this is the heart of the discrete logarithm problem over finite fields of characteristic not...

Journal: :IACR Cryptology ePrint Archive 2011
Antoine Joux Vanessa Vitse

We present a new “cover and decomposition” attack on the elliptic curve discrete logarithm problem, that combines Weil descent and decomposition-based index calculus into a single discrete logarithm algorithm. This attack applies, at least theoretically, to all composite degree extension fields, and is particularly well-suited for curves defined over Fp6 . We give a real-size example of discret...

Journal: :IACR Cryptology ePrint Archive 2006
Joan-Josep Climent Elisa Gorla Joachim Rosenthal

The paper analyzes CFVZ, a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the complexity of solving the underlying problem for the proposed system is dominated by the complexity of solving a fixed number of discrete logarithm problems in the group of an elliptic curve. Using an adapted Pollard rh...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید