Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Improving the parallelized Pollard lambda search on anomalous binary curves - MaRDI portal

Improving the parallelized Pollard lambda search on anomalous binary curves

From MaRDI portal
Publication:4501048

DOI10.1090/S0025-5718-99-01119-9zbMath1101.14325MaRDI QIDQ4501048

Scott A. Vanstone, Robert P. Gallant, Robert J. Lambert

Publication date: 3 September 2000

Published in: Mathematics of Computation (Search for Journal in Brave)




Related Items

Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite DegreeImproved algorithm for the isogeny problem for ordinary elliptic curvesComputing elliptic curve discrete logarithms with improved baby-step giant-step algorithmRédei Actions on Finite Fields and Multiplication Map in Cyclic GroupA variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexityGuest editorial: Special issue in honor of Scott A. VanstoneAn efficient collision detection method for computing discrete logarithms with Pollard's rhoSpeeding up elliptic curve discrete logarithm computations with point halvingElliptic curve cryptography: the serpentine course of a paradigm shiftAccelerating Pollard's rho algorithm on finite fieldsRecent progress on the elliptic curve discrete logarithm problemImproved Pollard rho method for computing discrete logarithms over finite extension fieldsOn random walks for Pollard's rho methodEndomorphisms for faster elliptic curve cryptography on a large class of curvesComputing elliptic curve discrete logarithms with the negation mapFault-based attack on Montgomery's ladder algorithmComputational hardness of IFP and ECDLPSpeeding Up the Pollard Rho Method on Prime FieldsExponentiation in Pairing-Friendly Groups Using HomomorphismsA Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve CryptographyEndomorphisms for Faster Elliptic Curve Cryptography on a Large Class of CurvesKoblitz curves over quadratic fieldsA note on the \(x\)-coordinate of points on an elliptic curve in characteristic two



Cites Work