Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A key-exchange system based on imaginary quadratic fields
Journal of Cryptology
Quadratic fields and cryptography
Number theory and cryptography
A course in computational algebraic number theory
A course in computational algebraic number theory
Approximating the number of integers free of large prime factors
Mathematics of Computation
Exposing the Mythical MIPS Year
Computer
A One Way Function Based on Ideal Arithmetic in Number Fields
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields
ASIACRYPT '99 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Selecting Cryptographic Key Sizes
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Asymptotically Fast Discrete Logarithms in Quadratic Number Fields
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Security estimates for quadratic field based cryptosystems
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Secure accumulators from euclidean rings without trusted setup
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Hi-index | 0.00 |
In this work we investigate the difficulty of the discrete logarithm problem in class groups of imaginary quadratic orders. In particular, we discuss several strategies to compute discrete logarithms in those class groups. Based on heuristic reasoning, we give advice for selecting the cryptographic parameter, i.e. the discriminant, such that cryptosystems based on class groups of imaginary quadratic orders would offer a similar security as commonly used cryptosystems.