Sciweavers

126 search results - page 9 / 26
» On the Use of Weber Polynomials in Elliptic Curve Cryptograp...
Sort
View
EUROCRYPT
2003
Springer
14 years 18 days ago
The GHS Attack Revisited
Abstract. We generalize the Weil descent construction of the GHS attack to arbitrary Artin-Schreier extensions. We give a formula for the characteristic polynomial of Frobenius of ...
Florian Hess
IJNSEC
2010
104views more  IJNSEC 2010»
13 years 2 months ago
Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves
Pseudo-random subsets of the set {1, 2, . . . , N} have many applications in the fields of network security, cryptography and other security issues. Recently, Dartyge and S
Zhixiong Chen, Li Xu, Chenhuang Wu
EUROCRYPT
2012
Springer
11 years 9 months ago
Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields
Abstract. The goal of this paper is to further study the index calculus method that was first introduced by Semaev for solving the ECDLP and later developed by Gaudry and Diem. In...
Jean-Charles Faugère, Ludovic Perret, Chris...
IMA
2005
Springer
162views Cryptology» more  IMA 2005»
14 years 26 days ago
Pairing-Based Cryptography at High Security Levels
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solutio...
Neal Koblitz, Alfred Menezes
DATE
2009
IEEE
91views Hardware» more  DATE 2009»
13 years 11 months ago
Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage
Abstract--Hardware/Software codesign of Elliptic Curve Cryptography has been extensively studied in recent years. However, most of these designs have focused on the computational a...
Xu Guo, Patrick Schaumont