MOV attack in various subgroups on elliptic curves
From MaRDI portal
Publication:1766871
zbMath1072.11094MaRDI QIDQ1766871
Florian Luca, Igor E. Shparlinski, David Jose Mireles
Publication date: 1 March 2005
Published in: Illinois Journal of Mathematics (Search for Journal in Brave)
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Elliptic curves (14H52) Distribution of integers with specified multiplicative constraints (11N25)
Related Items
Efficient hash maps to \(\mathbb{G}_2\) on BLS curves, Isolated elliptic curves and the MOV attack, On the number of isogeny classes of pairing-friendly elliptic curves and statistics of MNT curves, A taxonomy of pairing-friendly elliptic curves, Image cipher applications using the elliptical curve and chaos, On the embedding degree of reductions of an elliptic curve, Still wrong use of pairings in cryptography, Asymptotic stability of solutions to a class of linear time-delay systems with periodic coefficients and a large parameter