<--- Back to Details
First PageDocument Content
Finite fields / Computational hardness assumptions / Algebraic number theory / Cryptographic protocols / Field theory / Diffie–Hellman problem / Quadratic field / Discrete logarithm / XTR / Abstract algebra / Mathematics / Algebra
Date: 2004-02-18 05:25:39
Finite fields
Computational hardness assumptions
Algebraic number theory
Cryptographic protocols
Field theory
Diffie–Hellman problem
Quadratic field
Discrete logarithm
XTR
Abstract algebra
Mathematics
Algebra

Number field cryptography Johannes Buchmann

Add to Reading List

Source URL: www.cdc.informatik.tu-darmstadt.de

Download Document from Source Website

File Size: 181,83 KB

Share Document on Facebook

Similar Documents

Abstract algebra / Algebra / Cryptography / Finite fields / Group theory / Logarithms / Computational hardness assumptions / Binary operations / Discrete logarithm / Elliptic curve cryptography / Prime number / Elliptic curve

Computing discrete logarithms in fields of small characteristic Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN Joint work with:

DocID: 1r2Hf - View Document

Abstract algebra / Algebra / Group theory / Mathematics / Logarithms / Computational hardness assumptions / Finite fields / Modular arithmetic / Index calculus algorithm / Discrete logarithm / Baby-step giant-step / Elliptic curve

Revisiting discrete logarithms in medium/small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6

DocID: 1qjra - View Document

Computational complexity theory / Theory of computation / Complexity classes / Approximation algorithms / Computational hardness assumptions / Polynomial-time approximation scheme / Time complexity / NC / Reduction / Exponential time hypothesis / NP-hardness / NP

Approximating the least hypervolume contributor: NP-hard in general, but fast in practice Karl Bringmann1 and Tobias Friedrich2 1

DocID: 1q2Qr - View Document

Cryptography / Integer factorization algorithms / Computational hardness assumptions / E-commerce / RSA / Quadratic sieve / Lattice / Integer factorization

Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint ∗ Alexander May, Maike Ritzenhofen Horst Görtz Institute for IT-security Faculty of Mathematics Ruhr-University of Bochum, 44780 Bochum, Ger

DocID: 1pMu4 - View Document

Cryptography / Finite fields / Computational hardness assumptions / Password-authenticated key agreement / Password Authenticated Key Exchange by Juggling / SPEKE / DiffieHellman problem / Zero-knowledge proof / XTR / Digital signature / Proof of knowledge

Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

DocID: 1mJoe - View Document