Improvements on the Individual Logarithm Computation for Finite Fields with Composite Extension Degrees (original) (raw)

A Survey of Discrete Logarithm Algorithms in Finite Fields

Ali M Shuaibu

2019

View PDFchevron_right

Finite fields and cryptology

Ennio Cortellini

2003

View PDFchevron_right

A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography -Extended Abstract

Francesco Sica

Proceedings of the Second International Conference on Cryptology in India Progress in Cryptology, 2001

View PDFchevron_right

A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography

Jean-jacques Quisquater

Lecture Notes in Computer Science, 2001

View PDFchevron_right

New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve

Madhurima Mukhopadhyay

Advances in Mathematics of Communications, 2022

View PDFchevron_right

A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field 2017 waset

Ni Ni Hla, Dr. Tun Myat Aung

View PDFchevron_right

On the cubic sieve method for computing discrete logarithms over prime fields

Abhijit Abhik Das

International Journal of Computer Mathematics, 2005

View PDFchevron_right

A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field 2017

Ni Ni Hla, Dr. Tun Myat Aung

View PDFchevron_right

Finite Field Arithmetic for Cryptography

Beste Koc

IEEE Circuits and Systems Magazine, 2010

View PDFchevron_right

Weakness of mathbbF36cdot509\mathbb{F}_{3^{6 \cdot 509}}mathbbF36cdot509 for Discrete Logarithm Cryptography

Francisco Henríquez

Lecture Notes in Computer Science, 2014

View PDFchevron_right

Comparative Analysis of Calculations in Cryptographic Protocols Using a Combination of Different Bases of Finite Fields

Alexander Frolov, Sergey Gashkov

View PDFchevron_right

THE DISCRETE LOG PROBLEM AND ELLIPTIC CURVE CRYPTOGRAPHY

Nolan Winkler

View PDFchevron_right

Efficient Software-Implementation of Finite Fields with Applications to Cryptography

sandeep kumar

Acta Applicandae Mathematicae, 2006

View PDFchevron_right

New Discrete Logarithm Problem over Finite Field by applying One Way Hash Function and Public Key Cryptography

SUNIL KUMAR KASHYAP

2010

View PDFchevron_right

EFFICIENT OPERATIONS IN LARGE FINITE FIELDS FOR ELLIPTIC CURVE CRYPTOGRAPHIC

INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH I J E T M R JOURNAL, Chien-Hsing Huang

International Journal of Engineering Technologies and Management Research, 2020

View PDFchevron_right

Cryptanalysis and improvement of an encryption scheme that uses elliptic curves over finite fields

malik zia

Kuwait Journal of Science, 2021

View PDFchevron_right

Construction of logarithm tables for Galois Fields

Himer Avila-George

… Education in Science …, 2011

View PDFchevron_right

A New Cryptosystem Based on Factoring and Discrete Logarithm Problems

Mohammad Hijazi

2011

View PDFchevron_right

Primeless factoring-based cryptography

Ioana Boureanu

View PDFchevron_right

A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm

SHASHANK SINGH (RA2132241030020)

Advances in Cryptology – ASIACRYPT 2016, 2016

View PDFchevron_right

Attack Experiments on Elliptic Curves of Prime and Binary Fields

Dr. Tun Myat Aung

Emerging Technologies in Data Mining and Information Security, 2018

View PDFchevron_right

Galois Fields Elements Processing Units for Cryptographic Data Protection in Cyber-Physical Systems

Valerii Hlukhov

Advances in Cyber-Physical Systems, 2017

View PDFchevron_right

Reducing elliptic curve logarithms to logarithms in a finite field

Tatsuaki Okamoto

IEEE Transactions on Information Theory, 1993

View PDFchevron_right

Comparison of the complexity of Diffie–Hellman and discrete logarithm problems

Михаил Черепнев

Journal of Computer Virology and Hacking Techniques, 2020

View PDFchevron_right

A cryptosystem based on double generalized discrete logarithm problem

Chandrashekhar Meshram

Int. J. Contemp. Math. Sciences, 2011

View PDFchevron_right

Performance Comparism Of Finite Fields Arithmetic In Elliptic Curve Based Cryptographic

Dr. Aliyu Danladi Hina

2013

View PDFchevron_right

Efficient Hardware Implementation of Finite Fields with Applications to Cryptography

sandeep kumar

Acta Applicandae Mathematicae, 2006

View PDFchevron_right

An alternative practical public-key cryptosystems based on the Dependent RSA Discrete Logarithm Problems

Soundra Pandian

Expert Systems with Applications, 2021

View PDFchevron_right

A Generalisation of the Conjugation Method for Polynomial Selection for the Extended Tower Number Field Sieve Algorithm

SHASHANK SINGH (RA2132241030020)

IACR Cryptol. ePrint Arch., 2016

View PDFchevron_right

Fast evaluation of logarithms in fields of characteristic two

Don Coppersmith

IEEE Transactions on Information Theory, 1984

View PDFchevron_right

Implementation of Finite Field Arithmetic Operations for Large Prime and Binary Fields using java BigInteger class

Ni Ni Hla, Dr. Tun Myat Aung

IJERT.ORG, 2017

View PDFchevron_right

A public key cryptosystem and a signature scheme based on discrete logarithms

Khaled Nagaty

IEEE Transactions on Information Theory, 1985

View PDFchevron_right

Analysis of the GHS Weil descent attack on the ECDLP over characteristic two finite fields of composite degree

Edlyn Teske

2001

View PDFchevron_right

Efficient software implementations of large finite fields GF (2 n ) for secure storage applications

Lihao Xu

ACM Transactions on Storage, 2012

View PDFchevron_right