Discrete logarithms: The effectiveness of the index calculus method

被引:0
|
作者
Schirokauer, O [1 ]
Weber, D [1 ]
Denny, T [1 ]
机构
[1] UNIV SAARLAND, FB INFORMAT 14, D-66041 SAARBRUCKEN, GERMANY
来源
ALGORITHMIC NUMBER THEORY | 1996年 / 1122卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this article we survey recent developments concerning the discrete logarithm problem. Both theoretical and practical results are discussed. We emphasize the case of finite fields, and in particular, recent modifications of the index calculus method, including the number field sieve and the function field sieve. We also provide a sketch of some of the cryptographic schemes whose security depends on the intractibility of the discrete logarithm problem.
引用
收藏
页码:337 / 361
页数:25
相关论文
共 50 条
  • [41] Lifting and Elliptic Curve Discrete Logarithms
    Silverman, Joseph H.
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 82 - 102
  • [42] The Effectiveness of Collaborative Teaching Method in Teaching Calculus I
    Yusri, Muhammad Yassar
    Ahmad, Shamsatun Nahar
    Ong, Mohd Hanafi Azman
    Khalil, Nosiah
    ENVIRONMENT-BEHAVIOUR PROCEEDINGS JOURNAL, 2020, 5 : 187 - 191
  • [43] On Computing Discrete Logarithms in Bulk and Randomness Extractors
    Durnoga, Konrad
    Zralek, Bartosz
    FUNDAMENTA INFORMATICAE, 2015, 141 (04) : 343 - 364
  • [44] Improved Pollard rho method for computing discrete logarithms over finite extension fields
    Wang, Ping
    Zhang, Fangguo
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2012, 236 (17) : 4336 - 4343
  • [45] Ephemeral key recovery using index calculus method
    Padmavathy, R.
    Bhagvati, Chakravarthy
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (01): : 29 - 43
  • [46] Factor base discrete logarithms in Kummer extensions
    Xiao, Dianyan
    Zhuang, Jincheng
    Cheng, Qi
    FINITE FIELDS AND THEIR APPLICATIONS, 2018, 53 : 205 - 225
  • [47] ON THE COMPUTATION OF DISCRETE LOGARITHMS IN CLASS-GROUPS
    BUCHMANN, J
    DULLMANN, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 537 : 134 - 139
  • [48] Signature schemes based on factoring and discrete logarithms
    Shao, Z
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (01): : 33 - 36
  • [49] A PASSWORD AUTHENTICATION SCHEME BASED ON DISCRETE LOGARITHMS
    WU, TC
    CHANG, CC
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1991, 41 (1-2) : 31 - 38