Updating key size estimations for pairings

R Barbulescu, S Duquesne - Journal of cryptology, 2019 - Springer
Recent progress on NFS imposed a new estimation of the security of pairings. In this work
we study the best attacks against some of the most popular pairings and propose new key …

A general polynomial selection method and new asymptotic complexities for the tower number field sieve algorithm

P Sarkar, S Singh - International Conference on the Theory and …, 2016 - Springer
In a recent work, Kim and Barbulescu had extended the tower number field sieve algorithm
to obtain improved asymptotic complexities in the medium prime case for the discrete …

New complexity trade-offs for the (multiple) number field sieve algorithm in non-prime fields

P Sarkar, S Singh - Advances in Cryptology–EUROCRYPT 2016: 35th …, 2016 - Springer
The selection of polynomials to represent number fields crucially determines the efficiency of
the Number Field Sieve (NFS) algorithm for solving the discrete logarithm in a finite field. An …

A taxonomy of pairings, their security, their complexity

R Barbulescu, N El Mrabet, L Ghammam - 2020 - hal.science
A recent NFS attack against pairings made it necessary to increase the key sizes of the most
popular families of pairings: BN, BLS12, KSS16, KSS18 and BLS24. The attack applies to …

Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields

G De Micheli, P Gaudry, C Pierrot - … 2020, Santa Barbara, CA, USA, August …, 2020 - Springer
We study the discrete logarithm problem at the boundary case between small and medium
characteristic finite fields, which is precisely the area where finite fields used in pairing …

Translog function in government development of low-carbon economy

S Meng, X Zhang - Applied Mathematics and Nonlinear Sciences, 2022 - sciendo.com
With the rapid development of the world economy, some developing countries only pay
attention to the growth rate of GDP, but ignore the importance of sustainable development …

A generalisation of the conjugation method for polynomial selection for the extended tower number field sieve algorithm

P Sarkar, S Singh - Cryptology ePrint Archive, 2016 - eprint.iacr.org
In a recent work, Kim and Barbulescu showed how to combine previous polynomial
selection methods with the extended tower number field sieve algorithm to obtain improved …

[PDF][PDF] Discrete Logarithm Cryptanalyses: Number Field Sieve and Lattice Tools for Side-Channel Attacks

G De Micheli - Theses, Université de Lorraine, 2021 - gmicheli.github.io
Cryptography concerns itself with the problem of exchanging encrypted, meaning
unintelligible, messages that only a legitimate receiver can decrypt, hence read. In order to …

A unified polynomial selection method for the (tower) number field sieve algorithm

P Sarkar, S Singh - Advances in Mathematics of …, 2019 - digitalcommons.isical.ac.in
Abstract At Eurocrypt 2015, Barbulescu et al. introduced two new methods of polynomial
selection, namely the Conjugation and the Generalised Joux-Lercier methods, for the …

New discrete logarithm computation for the medium prime case using the function field sieve

M Mukhopadhyay, P Sarkar, S Singh… - Cryptology ePrint …, 2020 - eprint.iacr.org
The present work reports progress in discrete logarithm computation for the general medium
prime case using the function field sieve algorithm. A new record discrete logarithm …