Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1221897 - MaRDI portal

scientific article; zbMATH DE number 1221897

From MaRDI portal
Publication:4217446

zbMath1044.11591MaRDI QIDQ4217446

Kiyomichi Araki, Takakazu Satoh

Publication date: 1998


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (23)

Multiplication polynomials for elliptic curves over finite local ringsScalable zero knowledge via cycles of elliptic curvesDiSSECT: distinguisher of standard and simulated elliptic curves via traitsWeak instances of class group action based cryptography via self-pairingsElliptic loopsAcceleration of Index Calculus for Solving ECDLP over Prime Fields and Its LimitationGroup structure of elliptic curves over \(\mathbb{Z}/N\mathbb{Z}\)Elliptic curve discrete logarithm problem over small degree extension fieldsFault-based attack on Montgomery's ladder algorithmElliptic curve lifting problem and its applicationsComputational hardness of IFP and ECDLPAlgebraic curves and cryptographyOn Cycles of Pairing-Friendly Elliptic CurvesCan we beat the square root bound for ECDLP over \(\mathbb{F}_p^2\) via representation?Cryptographic implications of Hess' generalized GHS attackRamanujan's class invariants and their use in elliptic curve cryptographyComplexity bounds on Semaev's naive index calculus method for ECDLPSolving the multi-discrete logarithm problems over a group of elliptic curves with prime orderOn the efficient generation of prime-order elliptic curvesIndex calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problemConstruction of strong elliptic curves suitable for cryptographic applicationsLifting and Elliptic Curve Discrete LogarithmsBitcoin security with a twisted Edwards curve






This page was built for publication: