找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Elliptic Curves and Their Applications to Cryptography; An Introduction Andreas Enge Book 1999 Springer Science+Business Media New York 199

[复制链接]
楼主: Iridescent
发表于 2025-3-23 12:37:27 | 显示全部楼层
Skalarprodukt und orthogonale Abbildungenho could efficiently compute discrete logarithms in the group underlying such a cryptosystem would be able to break the system. So to judge the security of the proposed cryptosystems we must have a closer look at algorithms for solving discrete logarithm problems.
发表于 2025-3-23 15:30:08 | 显示全部楼层
Steffen Goebbels,Jochen Rethmannunless special structures allow more efficient algorithms for breaking the system. If the group order is large enough, then square root attacks like Shanks’s baby-step giant-step or Pollard’s ρ-methods are not applicable. To make the Pohlig-Hellman attack impractical, two different approaches are co
发表于 2025-3-23 21:12:20 | 显示全部楼层
Lineare Abbildungen und Matrizen,evious chapter, as suggested first in [Koblitz, 1987] and [Miller, 1986]. They are particularly appealing because they achieve the same level of security as a finite field based cryptosystem with much shorter key lengths, which results in a faster encryption and decryption process. Our aim in this chapter is to prove the group law.
发表于 2025-3-24 00:48:31 | 显示全部楼层
Skalarprodukt und orthogonale Abbildungenho could efficiently compute discrete logarithms in the group underlying such a cryptosystem would be able to break the system. So to judge the security of the proposed cryptosystems we must have a closer look at algorithms for solving discrete logarithm problems.
发表于 2025-3-24 03:16:53 | 显示全部楼层
Steffen Goebbels,Jochen Rethmannunless special structures allow more efficient algorithms for breaking the system. If the group order is large enough, then square root attacks like Shanks’s baby-step giant-step or Pollard’s ρ-methods are not applicable. To make the Pohlig-Hellman attack impractical, two different approaches are conceivable.
发表于 2025-3-24 08:17:02 | 显示全部楼层
The Group Law On Elliptic Curves,evious chapter, as suggested first in [Koblitz, 1987] and [Miller, 1986]. They are particularly appealing because they achieve the same level of security as a finite field based cryptosystem with much shorter key lengths, which results in a faster encryption and decryption process. Our aim in this chapter is to prove the group law.
发表于 2025-3-24 12:47:37 | 显示全部楼层
发表于 2025-3-24 15:12:36 | 显示全部楼层
发表于 2025-3-24 21:10:18 | 显示全部楼层
发表于 2025-3-25 02:10:31 | 显示全部楼层
http://image.papertrans.cn/e/image/307779.jpg
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-8 10:01
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表