Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Implementation of a key exchange protocol using real quadratic fields (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
The digital signature standard
Communications of the ACM
Discrete logarithms in GF(P) using the number field sieve
SIAM Journal on Discrete Mathematics
An implementation of the general number field sieve
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
A Key Exchange System Based on Real Quadratic Fields
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Number Theoretic Algorithms and Cryptology
FCT '91 Proceedings of the 8th International Symposium on Fundamentals of Computation Theory
Cryptography in Quadratic Function Fields
Designs, Codes and Cryptography
On the Implementation of Cryptosystems Based on Real Quadratic Number Fields
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Hi-index | 0.00 |
We generalize and improve the schemes of [4]. We introduce analogues of exponentiation and discrete logarithms in the principle cycle of real quadratic orders. This enables us to implement many cryptographic protocols based on discrete logarithms, e.g. a variant of the signature scheme of ElGamal [8].