The GHS Attack Revisited
- 13 May 2003
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 374-387
- https://doi.org/10.1007/3-540-39200-9_23
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Extending the GHS Weil Descent AttackLecture Notes in Computer Science, 2002
- Computing Riemann–Roch Spaces in Algebraic Function Fields and Related TopicsJournal of Symbolic Computation, 2002
- Constructive and destructive facets of Weil descent on elliptic curvesJournal of Cryptology, 2002
- A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve CryptographyLecture Notes in Computer Science, 2001
- Identity-Based Encryption from the Weil PairingLecture Notes in Computer Science, 2001
- Weil Descent Of JacobiansElectronic Notes in Discrete Mathematics, 2001
- Weil Descent of Elliptic Curves over Finite Fields of Characteristic ThreeLecture Notes in Computer Science, 2000
- A Cryptographic Application of Weil DescentLecture Notes in Computer Science, 1999
- Elliptic Curves in CryptographyPublished by Cambridge University Press (CUP) ,1999
- A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of CurvesMathematics of Computation, 1994