元音 发表于 2025-3-23 12:37:27

Skalarprodukt und orthogonale Abbildungenho could efficiently compute discrete logarithms in the group underlying such a cryptosystem would be able to break the system. So to judge the security of the proposed cryptosystems we must have a closer look at algorithms for solving discrete logarithm problems.

maroon 发表于 2025-3-23 15:30:08

Steffen Goebbels,Jochen Rethmannunless special structures allow more efficient algorithms for breaking the system. If the group order is large enough, then square root attacks like Shanks’s baby-step giant-step or Pollard’s ρ-methods are not applicable. To make the Pohlig-Hellman attack impractical, two different approaches are co

caldron 发表于 2025-3-23 21:12:20

Lineare Abbildungen und Matrizen,evious chapter, as suggested first in and . They are particularly appealing because they achieve the same level of security as a finite field based cryptosystem with much shorter key lengths, which results in a faster encryption and decryption process. Our aim in this chapter is to prove the group law.

群居男女 发表于 2025-3-24 00:48:31

Skalarprodukt und orthogonale Abbildungenho could efficiently compute discrete logarithms in the group underlying such a cryptosystem would be able to break the system. So to judge the security of the proposed cryptosystems we must have a closer look at algorithms for solving discrete logarithm problems.

羊栏 发表于 2025-3-24 03:16:53

Steffen Goebbels,Jochen Rethmannunless special structures allow more efficient algorithms for breaking the system. If the group order is large enough, then square root attacks like Shanks’s baby-step giant-step or Pollard’s ρ-methods are not applicable. To make the Pohlig-Hellman attack impractical, two different approaches are conceivable.

EPT 发表于 2025-3-24 08:17:02

The Group Law On Elliptic Curves,evious chapter, as suggested first in and . They are particularly appealing because they achieve the same level of security as a finite field based cryptosystem with much shorter key lengths, which results in a faster encryption and decryption process. Our aim in this chapter is to prove the group law.

forecast 发表于 2025-3-24 12:47:37

http://reply.papertrans.cn/31/3078/307779/307779_17.png

立即 发表于 2025-3-24 15:12:36

http://reply.papertrans.cn/31/3078/307779/307779_18.png

开始没有 发表于 2025-3-24 21:10:18

http://reply.papertrans.cn/31/3078/307779/307779_19.png

fodlder 发表于 2025-3-25 02:10:31

http://image.papertrans.cn/e/image/307779.jpg
页: 1 [2] 3 4
查看完整版本: Titlebook: Elliptic Curves and Their Applications to Cryptography; An Introduction Andreas Enge Book 1999 Springer Science+Business Media New York 199