Index calculus algorithm

Results: 26



#Item
1A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups Alexander May? and Ilya Ozerov?? Horst G¨ ortz Institute for IT-Security Ruhr-University Bochum, Germany

A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups Alexander May? and Ilya Ozerov?? Horst G¨ ortz Institute for IT-Security Ruhr-University Bochum, Germany

Add to Reading List

Source URL: www.cits.rub.de

Language: English - Date: 2014-11-18 10:03:56
2On the Function Field Sieve and the Impact of Higher Splitting Probabilities Robert Granger  Joint work with Faruk Gölo§lu, Gary McGuire and Jens Zumbrägel

On the Function Field Sieve and the Impact of Higher Splitting Probabilities Robert Granger Joint work with Faruk Gölo§lu, Gary McGuire and Jens Zumbrägel

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-19 13:56:00
3Revisiting discrete logarithms in medium/small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6

Revisiting discrete logarithms in medium/small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-21 07:48:03
4Master’s thesis in Mathematics  The use of elliptic curves in cryptography by  Gijsbert van Vliet

Master’s thesis in Mathematics The use of elliptic curves in cryptography by Gijsbert van Vliet

Add to Reading List

Source URL: www.math.ru.nl

Language: English - Date: 2016-04-18 16:34:53
5Public Key Cryptography Using Discrete Logarithms in Finite Fields: Algorithms, Efficient Implementation and Attacks  L. Maurits)

Public Key Cryptography Using Discrete Logarithms in Finite Fields: Algorithms, Efficient Implementation and Attacks L. Maurits)

Add to Reading List

Source URL: www.luke.maurits.id.au

Language: English - Date: 2016-04-23 00:53:29
6Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: aaspring.com

Language: English - Date: 2015-08-21 16:58:21
7Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: weakdh.org

Language: English - Date: 2015-10-15 14:53:20
8E-th roots and static Diffie-Hellman using index calculus Antoine Joux1 Joint work with Reynald Lercier2 , David Naccache3 , Emmanuel Thome´ 4  Elliptic Curve Cryptography 2008

E-th roots and static Diffie-Hellman using index calculus Antoine Joux1 Joint work with Reynald Lercier2 , David Naccache3 , Emmanuel Thome´ 4 Elliptic Curve Cryptography 2008

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-10-04 13:47:14
9Constructing abelian varieties for cryptographic use Peter Stevenhagen ECC, Utrecht September 22, 2008

Constructing abelian varieties for cryptographic use Peter Stevenhagen ECC, Utrecht September 22, 2008

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-10-05 20:16:07
10Discrete logarithms: Recent progress in small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6

Discrete logarithms: Recent progress in small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6

Add to Reading List

Source URL: www-fourier.ujf-grenoble.fr

Language: English - Date: 2014-03-31 03:20:36