Extending the GHS Weil Descent Attack
- 29 April 2002
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- Constructive and destructive facets of Weil descent on elliptic curvesJournal of Cryptology, 2002
- A Cryptographic Application of Weil DescentLecture Notes in Computer Science, 1999
- Elliptic Curves in CryptographyPublished by Cambridge University Press (CUP) ,1999
- Analysis of the Weil Descent Attack of Gaudry, Hess and SmartLecture Notes in Computer Science, 1999
- Constructing Isogenies between Elliptic Curves Over Finite FieldsLMS Journal of Computation and Mathematics, 1999
- Computing isogenies in $$\mathbb{F}_{2^n } $$Lecture Notes in Computer Science, 1996
- Computing l-isogenies using the p-torsionLecture Notes in Computer Science, 1996
- A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of CurvesMathematics of Computation, 1994
- Reducing elliptic curve logarithms to logarithms in a finite fieldIEEE Transactions on Information Theory, 1993
- An improved algorithm for computing logarithms overGF(p)and its cryptographic significance (Corresp.)IEEE Transactions on Information Theory, 1978