军事学 >>> 军事学
搜索结果: 1-13 共查到军事学 ECDLP相关记录13条 . 查询时间(0.078 秒)
Can we Beat the Square Root Bound for ECDLP over Fp2 via Representations?     ECDLP  Square Root Bound       font style='font-size:12px;'> 2019/7/15
We give a 4-list algorithm for solving the Elliptic Curve Discrete Logarithm (ECDLP) over some quadratic field Fp2Fp2. Using the representation technique, we reduce ECDLP to a multivariate polynomial ...
Solving ECDLP via List Decoding     elliptic curve cryptosystem  ECDLP  list decoding       font style='font-size:12px;'> 2018/9/6
We provide a new approach to the elliptic curve discrete logarithm problem (ECDLP). First, we construct Elliptic Codes (EC codes) from the ECDLP. Then we propose an algorithm of finding the minimum we...
On the Feasibility of an ECDLP Algorithm     elliptic curves  discrete logarithm problem  multiplicative orders       font style='font-size:12px;'> 2018/5/3
We study the properties of an algorithm for solving the elliptic curve discrete logarithm problem presented by A.~Yu.~Nesterenko at the CTCrypt 2015 session. We show that for practically important ins...
The introduction of summation polynomials for elliptic curves by Semaev has opened up new avenues of investigation in index calculus type algorithms for the elliptic curve discrete logarithm problem, ...
Last fall degree, HFE, and Weil descent attacks on ECDLP     ECDLP  Weil descent  solving equations       font style='font-size:12px;'> 2015/12/29
Weil descent methods have recently been applied to attack the Hidden Field Equation (HFE) public key systems and solve the elliptic curve discrete logarithm problem (ECDLP) in small characteristic. ...
Semaev [14] shows that under the first fall degree assumption, the complexity of ECDLP over F2n , where n is the input size, is O(2n 1/2+o(1) ). In his manuscript, the cost for solving equations sy...
The Fault Attack ECDLP Revisited     foundations       font style='font-size:12px;'> 2012/3/28
Biehl et al.\cite{BMM} proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. An elliptic curve $E$ is defined over prime field $\mathbb{F}_p$...
The Fault Attack ECDLP Revisited     Discrete logarithm   Subexponential  Smooth integer  Kroneck class number       font style='font-size:12px;'> 2011/6/9
Biehl et al.\cite{BMM} proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. An elliptic curve $E$ is defined over prime field $\mathbb{F}_p$...
ECDLP on GPU     implementation / discrete logarithm problem  GPU       font style='font-size:12px;'> 2012/3/29
Elliptic curve discrete logarithm problem (ECDLP) is one of the most important hard problems that modern cryptography, especially public key cryptography, relies on. And many efforts are dedicate to s...
This paper presents an efficient identity-based key exchange protocol based on the difficulty of computing a Elliptic Curve Discrete Logarithm Problem. As compared with the previously proposed proto...
This paper presents an efficient identity-based key exchange protocol based on the difficulty of computing a Elliptic Curve Discrete Logarithm Problem. As compared with the previously proposed proto...
In this paper we have proposed an efficient password security of Three- Party Key Exchange Protocol based on Elliptic Curve Discrete Logarithm Problem. Key exchange protocols allow two parties commu...
PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP     PRIME POINTS  ELLIPTIC CURVES  ECDLP       font style='font-size:12px;'> 2008/9/10
PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP.

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...