A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
Mathematics of Computation
Designs, Codes and Cryptography
ANTS-I Proceedings of the First International Symposium on Algorithmic Number Theory
How Secure Are Elliptic Curves over Composite Extension Fields?
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
Designs, Codes and Cryptography
Journal of Symbolic Computation
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Redundant trinomials for finite fields of characteristic 2
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
On partial lifting and the elliptic curve discrete logarithm problem
ISAAC'04 Proceedings of the 15th international conference on Algorithms and Computation
Algebraic curves and cryptography
Finite Fields and Their Applications
Hi-index | 0.00 |
We analyze the Weil descent attack of Gaudry, Hess and Smart [11] on the elliptic curve discrete logarithm problem for elliptic curves defined over finite fields of characteristic two.