Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Discrete logarithms in GF(P) using the number field sieve

Published: 01 February 1993 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2024)Cryptanalysis of Algebraic Verifiable Delay FunctionsAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68382-4_14(457-490)Online publication date: 18-Aug-2024
  • (2023)A provable secure group key management scheme based on the Chinese remainder theorem and Pohlig-Hellman Exponential CipherProceedings of the 2023 4th International Conference on Computer Science and Management Technology10.1145/3644523.3644633(602-608)Online publication date: 13-Oct-2023
  • (2022)Democratizing CryptographyundefinedOnline publication date: 24-Aug-2022
  • Show More Cited By

Index Terms

  1. Discrete logarithms in GF(P) using the number field sieve

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      Publisher

      Society for Industrial and Applied Mathematics

      United States

      Publication History

      Published: 01 February 1993

      Author Tags

      1. discrete logarithms
      2. number field sieve

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 03 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Cryptanalysis of Algebraic Verifiable Delay FunctionsAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68382-4_14(457-490)Online publication date: 18-Aug-2024
      • (2023)A provable secure group key management scheme based on the Chinese remainder theorem and Pohlig-Hellman Exponential CipherProceedings of the 2023 4th International Conference on Computer Science and Management Technology10.1145/3644523.3644633(602-608)Online publication date: 13-Oct-2023
      • (2022)Democratizing CryptographyundefinedOnline publication date: 24-Aug-2022
      • (2021)Identity-based Encryption from the Diffie-Hellman AssumptionJournal of the ACM10.1145/342237068:3(1-46)Online publication date: 22-Mar-2021
      • (2021)A Privacy-Preserving Logistics Information System with TraceabilityCyberspace Safety and Security10.1007/978-3-030-94029-4_11(145-163)Online publication date: 9-Nov-2021
      • (2020)An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret SharingJournal of Cryptology10.1007/s00145-019-09330-233:3(824-873)Online publication date: 1-Jul-2020
      • (2020)Asymptotic Complexities of Discrete Logarithm Algorithms in Pairing-Relevant Finite FieldsAdvances in Cryptology – CRYPTO 202010.1007/978-3-030-56880-1_2(32-61)Online publication date: 17-Aug-2020
      • (2019)Short Paper: The Proof is in the PuddingFinancial Cryptography and Data Security10.1007/978-3-030-32101-7_24(396-404)Online publication date: 18-Feb-2019
      • (2019)Tight Reductions for Diffie-Hellman Variants in the Algebraic Group ModelTopics in Cryptology – CT-RSA 201910.1007/978-3-030-12612-4_9(169-188)Online publication date: 4-Mar-2019
      • (2018)Imperfect forward secrecyCommunications of the ACM10.1145/329203562:1(106-114)Online publication date: 19-Dec-2018
      • Show More Cited By

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media