Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Reducing elliptic curve logarithms to logarithms in a finite field
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
Mathematics of Computation
Computational methods in commutative algebra and algebraic geometry
Computational methods in commutative algebra and algebraic geometry
Mathematics of Computation
An algorithm for computing the integral closure
Journal of Symbolic Computation
On the discrete logarithm in the divisor class group of curves
Mathematics of Computation
Gaudry's Variant against Cab Curves
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Construction of Secure CabCurves Using Modular Curves
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
An Extension of Kedlaya's Point-Counting Algorithm to Superelliptic Curves
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Algebraic curves and cryptography
Finite Fields and Their Applications
Hi-index | 0.00 |
The paper shows that some of elliptic curves over finite fields of characteristic three of composite degree are attacked by a more effective algorithm than Pollard's ρ method. For such an elliptic curve E, we construct a Cab curve D on its Weil restriction in order to reduce the discrete logarithm problem on E to that on D. And we show that the genus of D is small enough so that D is attacked by a modified form of Gaudry's variant for a suitable E. We also see such a weak elliptic curve is easily constructed.