Recent progress on the elliptic curve discrete logarithm problem

SD Galbraith, P Gaudry - Designs, Codes and Cryptography, 2016 - Springer
Recent progress on the elliptic curve discrete logarithm problem | SpringerLink Skip to main
content Advertisement SpringerLink Log in Menu Find a journal Publish with us Search Cart …

Hasse-Witt and Cartier-Manin matrices: a warning and a request

JD Achter, EW Howe - Arithmetic geometry: computation and …, 2019 - books.google.com
Let x be a curve in positive characteristic. A Hasse–Witt matrix for x is a matrix that
represents the action of the Frobenius operator on the cohomology group H1 (x, OX) with …

Faster individual discrete logarithms in finite fields of composite extension degree

A Guillevic - Mathematics of computation, 2019 - ams.org
Computing discrete logarithms in finite fields is a main concern in cryptography. The best
algorithms in large and medium characteristic fields (eg, $\rm {GF}(p^ 2) $, $\rm {GF}(p^{12}) …

Attacking a binary GLS elliptic curve with magma

JJ Chi, T Oliveira - Progress in Cryptology--LATINCRYPT 2015: 4th …, 2015 - Springer
In this paper we present a complete Magma implementation for solving the discrete
logarithm problem (DLP) on a binary GLS curve defined over the field F _ 2^ 62 F 2 62. For …

Faster individual discrete logarithms in non-prime finite fields with the NFS and FFS algorithms

A Guillevic - 2016 - hal.univ-lorraine.fr
Computing discrete logarithms in finite fields is a main concern in cryptography. The best
algorithms known are the Number Field Sieve and its variants in large and medium …

Physical attacks

N El Mrabet, L Goubin, S Guilley… - Guide to Pairing …, 2017 - taylorfrancis.com
In this chapter, the author shall see to what extent physical attacks have been successful so
far in attacking implementations of pairing calculations. Both side-channel and fault attacks …

Nadia El Mrabet

L Goubin, S Guilley, J Fournier, D Jauvart… - Guide to Pairing …, 2017 - books.google.com
The security of modern cryptography is based on the impossibility of breaking the
implemented algorithms in practice. In order to reach such a goal, the algorithms are built in …

A new construction method of factor basis elements for special elliptic curves over cubic extension field

J Zhu, Y Hou, M Xu - 2017 IEEE 9th International Conference …, 2017 - ieeexplore.ieee.org
The security of elliptic curve cryptography, which is based on the computational hardness of
ECDLP, has been extensively studied for decades. Index calculus algorithm has been paid …

A simple method to obtain relations among factor basis elements for special hyperelliptic curves

J Zhu, M Xu - 2017 International Conference on Computer …, 2017 - ieeexplore.ieee.org
The main approach to solve hyperelliptic curve DLP is index calculus algorithm. One of the
most important steps is to obtain relations among the factor basis elements. Although Nagao …

[PDF][PDF] Cryptography in small-characteristic finite fields= Criptografía en campos finitos de característica chica

TE Figueiredo Oliveira - 2016 - repositorio.cinvestav.mx
Desde el inicio de la criptografıa de llave pública, los campos finitos de caracterıstica chica
han sido propuestos como estructuras matemáticas en implementación de protocolos de …