Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
74 | Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson |
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves.  |
Int. J. Inf. Sec.  |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve discrete logarithm problem (ecdlp), Baby-step giant-step method (bsgs), Pollards rho method, Fixed elliptic curve, Precomputation |
67 | Qingshui Xue, Fengying Li, Yuan Zhou 0008, Jiping Zhang 0001, Zhenfu Cao, Haifeng Qian |
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.  |
MobiSec  |
2009 |
DBLP DOI BibTeX RDF |
|
67 | Markus Maurer, Alfred Menezes, Edlyn Teske |
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree.  |
INDOCRYPT  |
2001 |
DBLP DOI BibTeX RDF |
|
62 | Chong Hee Kim, Philippe Bulens, Christophe Petit 0001, Jean-Jacques Quisquater |
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes.  |
EuroPKI  |
2008 |
DBLP DOI BibTeX RDF |
Smart cards, fault injection, faults attacks, DSA, ElGamal, side channel |
52 | Michal Wronski, Tomasz Kijko |
On the Possibility of Transformation of Multidimensional ECDLP into 1-Dimensional ECDLP.  |
NuTMiC  |
2017 |
DBLP DOI BibTeX RDF |
|
47 | Runhua Shi, Hong Zhong 0001, Liusheng Huang |
A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP.  |
SNPD (2)  |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Alfred Menezes |
The Elliptic Curve Discrete Logarithm Problem: State of the Art.  |
IWSEC  |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Edlyn Teske |
An Elliptic Curve Trapdoor System.  |
J. Cryptol.  |
2006 |
DBLP DOI BibTeX RDF |
Weil descent, Elliptic curve cryptography, Key escrow, Isogenies, Trapdoor functions |
41 | Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson |
The Security of Fixed versus Random Elliptic Curves in Cryptography.  |
ACISP  |
2003 |
DBLP DOI BibTeX RDF |
|
41 | Nigel P. Smart |
How Secure Are Elliptic Curves over Composite Extension Fields?  |
EUROCRYPT  |
2001 |
DBLP DOI BibTeX RDF |
|
41 | Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano |
Characterization of Elliptic Curve Traces under FR-Reduction.  |
ICISC  |
2000 |
DBLP DOI BibTeX RDF |
FR-reduction, trace, elliptic curve cryptosystems, number theory |
33 | David J. Malan, Matt Welsh, Michael D. Smith 0001 |
Implementing public-key infrastructure for sensor networks.  |
ACM Trans. Sens. Networks  |
2008 |
DBLP DOI BibTeX RDF |
ECDLP, MICA2, TinySec, sensor networks, ECC, elliptic curve cryptography, TinyOS, motes, Diffie-Hellman, DLP |
26 | Fei Tang, Guowei Ling, Chaochao Cai, Jinyong Shan, Xuanqi Liu, Peng Tang, Weidong Qiu |
Solving Small Exponential ECDLP in EC-Based Additively Homomorphic Encryption and Applications.  |
IEEE Trans. Inf. Forensics Secur.  |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Xia Liu, Huan Yang, Li Yang |
Minimizing CNOT-count in quantum circuit of the extended Shor's algorithm for ECDLP.  |
Cybersecur.  |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Takuro Manabe, Ken Ikuta, Sho Joichi, Hiromasa Miura, Shota Kanzawa, Yasuyuki Nogami, Yuta Kodera, Takuya Kusaka |
An Attack for a 116bit ECDLP for a Barreto-Naehrig Curve.  |
ICCE-Taiwan  |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Bimal Kumar Meher, Ruhul Amin 0001, Ashok Kumar Das, Muhammad Khurram Khan |
KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System.  |
IEEE Trans. Netw. Sci. Eng.  |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Virendra Sule |
Local inversion of maps: A new attack on Symmetric encryption, RSA and ECDLP.  |
CoRR  |
2022 |
DBLP BibTeX RDF |
|
26 | Fei Tang, Guowei Ling, Chaochao Cai, Jinyong Shan, Xuanqi Liu, Peng Tang, Weidong Qiu |
Solving Small Exponential ECDLP in EC-based Additively Homomorphic Encryption and Applications.  |
IACR Cryptol. ePrint Arch.  |
2022 |
DBLP BibTeX RDF |
|
26 | Kazuhiro Yokoyama, Masaya Yasuda, Yasushi Takahashi, Jun Kogure |
Complexity bounds on Semaev's naive index calculus method for ECDLP.  |
J. Math. Cryptol.  |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Claire Delaplace, Alexander May 0001 |
Can we Beat the Square Root Bound for ECDLP over p2 via Representation?  |
J. Math. Cryptol.  |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Alessio Meneghetti, Massimiliano Sala, Daniele Taufer |
A Note on an ECDLP-based PoW Model.  |
DLT@ITASEC  |
2020 |
DBLP BibTeX RDF |
|
26 | Alessio Meneghetti, Massimiliano Sala, Daniele Taufer |
A new ECDLP-based PoW model.  |
CoRR  |
2019 |
DBLP BibTeX RDF |
|
26 | Claire Delaplace, Alexander May 0001 |
Can we Beat the Square Root Bound for ECDLP over Fp2 via Representations?  |
IACR Cryptol. ePrint Arch.  |
2019 |
DBLP BibTeX RDF |
|
26 | Fangguo Zhang, Zhijie Liu, Ping Wang, Haibo Tian |
Improving ECDLP Computation in Characteristic 2.  |
Inscrypt  |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Hiromasa Miura, Rikuya Matsumura, Ken Ikuta, Sho Joichi, Takuya Kusaka, Yasuyuki Nogami |
A Preliminary Study on Methods to Eliminate Short Fruitless Cycles for Pollard's Rho Method for ECDLP over BN Curves.  |
CANDAR Workshops  |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Fangguo Zhang, Shengli Liu 0001 |
Solving ECDLP via List Decoding.  |
ProvSec  |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Sergey Grebnev |
On the Feasibility of an ECDLP Algorithm.  |
IACR Cryptol. ePrint Arch.  |
2018 |
DBLP BibTeX RDF |
|
26 | Fangguo Zhang, Shengli Liu 0001 |
Solving ECDLP via List Decoding.  |
IACR Cryptol. ePrint Arch.  |
2018 |
DBLP BibTeX RDF |
|
26 | Ken Ikuta, Sho Joichi, Kazuya Kobayashi, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami |
A Study on the Parameter Size of the Montgomery Trick for ECDLP.  |
ISITA  |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Ken Ikuta, Sho Joichi, Kazuya Kobayashi, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami |
A Study on the Parameter of the Distinguished Point Method in Pollard's Rho Method for ECDLP.  |
ISITA  |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Momonari Kudo, Yuki Yokota, Yasushi Takahashi, Masaya Yasuda |
Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation.  |
CANS  |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Gary McGuire, Daniela Müller |
A few more index calculus algorithms for the ECDLP.  |
IACR Cryptol. ePrint Arch.  |
2017 |
DBLP BibTeX RDF |
|
26 | Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji |
On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus.  |
ICISC  |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Takuya Kusaka, Sho Joichi, Ken Ikuta, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara, Nariyoshi Yamai, Sylvain Duquesne |
Solving 114-Bit ECDLP for a Barreto-Naehrig Curve.  |
ICISC  |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Tetsuya Izu |
Computational hardness of IFP and ECDLP.  |
Appl. Algebra Eng. Commun. Comput.  |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Sahadeo Padhye, Namita Tiwari |
ECDLP-based certificateless proxy signature scheme with message recovery.  |
Trans. Emerg. Telecommun. Technol.  |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Koh-ichi Nagao |
Complexity of ECDLP under the First Fall Degree Assumption.  |
IACR Cryptol. ePrint Arch.  |
2015 |
DBLP BibTeX RDF |
|
26 | Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo |
Last fall degree, HFE, and Weil descent attacks on ECDLP.  |
IACR Cryptol. ePrint Arch.  |
2015 |
DBLP BibTeX RDF |
|
26 | Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo |
Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP.  |
CRYPTO (1)  |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Yuki Kono, Yasuyuki Nogami, Takuya Kusaka |
Experimental evaluation of the efficiency of associative rational points for random walks on ECDLP.  |
ISCIT  |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Yun-Ju Huang, Christophe Petit 0001, Naoyuki Shinohara, Tsuyoshi Takagi |
Improvement of Faugère et al.'s Method to Solve ECDLP.  |
IWSEC  |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Lyndon Judge, Suvarna Mane, Patrick Schaumont |
A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication.  |
Int. J. Reconfigurable Comput.  |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Ramanuj Chouksey, R. Sivashankari, Piyush Singhai |
ECDLP Based Proxy Multi-signature Scheme.  |
ACITY (1)  |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Tetsuya Izu |
On the Strength Comparison of the ECDLP and the IFP.  |
SCN  |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Mingqiang Wang, Tao Zhan |
Analysis of the Fault Attack ECDLP over Prime Field.  |
J. Appl. Math.  |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Lei Xu 0012, Dongdai Lin, Jing Zou |
ECDLP on GPU.  |
IACR Cryptol. ePrint Arch.  |
2011 |
DBLP BibTeX RDF |
|
26 | Mingqiang Wang, Xiaoyun Wang 0001, Tao Zhan |
The Fault Attack ECDLP Revisited.  |
IACR Cryptol. ePrint Arch.  |
2011 |
DBLP BibTeX RDF |
|
26 | Suvarna Mane, Lyndon Judge, Patrick Schaumont |
An Integrated Prime-Field ECDLP Hardware Accelerator with High-Performance Modular Arithmetic Units.  |
ReConFig  |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Manoj Kumar |
On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP.  |
IACR Cryptol. ePrint Arch.  |
2010 |
DBLP BibTeX RDF |
|
26 | Ju-Sung Kang, Okyeon Yi |
On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP.  |
FGIT-SecTech/DRBC  |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Manoj Kumar, Aayushi Balyan |
Security Vulnerabilities of a Novel Remote User Authentication Scheme Using Smart Card Based on ECDLP.  |
IC3 (2)  |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Fengying Li, Qingshui Xue, Zhenfu Cao |
Some basic principles for proxy signature schemes based on ECDLP.  |
CollaborateCom  |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Jayaprakash Kar, Banshidhar Majhi |
An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP.  |
IACR Cryptol. ePrint Arch.  |
2009 |
DBLP BibTeX RDF |
|
26 | Jayaprakash Kar, Banshidhar Majhi |
An Efficient Password Security of Key Exchange Protocol based on ECDLP.  |
IACR Cryptol. ePrint Arch.  |
2009 |
DBLP BibTeX RDF |
|
26 | Chengming Qi, Xusheng Chen |
A New Digital Proxy Signature Scheme Based on ECDLP.  |
CIS (1)  |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Debasish Jena, Saroj Kumar Panigrahy, Pradip Kumar Biswal, Sanjay Kumar Jena |
A Novel Protocol for Smart Card Using ECDLP.  |
ICETET  |
2008 |
DBLP DOI BibTeX RDF |
|
26 | K. P. Vidya |
Pollard's rho attack on ECDLP and Threshold Schemes.  |
Monte Carlo Methods Appl.  |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Grzegorz Wojtenko |
PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP.  |
IACR Cryptol. ePrint Arch.  |
2007 |
DBLP BibTeX RDF |
|
26 | Markus Maurer, Alfred Menezes, Edlyn Teske |
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree.  |
LMS J. Comput. Math.  |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Markus Maurer, Alfred Menezes, Edlyn Teske |
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree.  |
IACR Cryptol. ePrint Arch.  |
2001 |
DBLP BibTeX RDF |
|
21 | Jun Yang, Xianze Yang |
Implementing Multi-party Key Exchange by Linear Combination of Elliptic Curve Points.  |
ISECS  |
2008 |
DBLP DOI BibTeX RDF |
tripartite key agreement protocol, public key cryptography, elliptic curve, matrix, discrete logarithm problem, optimal extension field |
21 | Nouha Oualha, Melek Önen, Yves Roudier |
A Security Protocol for Self-Organizing Data Storage.  |
SEC  |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Debasish Jena, Sanjay Kumar Jena, Banshidhar Majhi |
A Novel Blind Signature Scheme Based on Nyberg-Rueppel Signature Scheme and Applying in Off-Line Digital Cash.  |
ICIT  |
2007 |
DBLP DOI BibTeX RDF |
RSA, Elliptic Curve, Blind signature, ElGamal, Digital Cash |
21 | Xiaoming Hu, Shangteng Huang |
A Provably Secure Blind Signature Scheme.  |
TAMC  |
2007 |
DBLP DOI BibTeX RDF |
Polynomial reduction, Security arguments, Provably secure, Blind signature |
21 | Eun-Jun Yoon, Kee-Young Yoo |
New Efficient Simple Authenticated Key Agreement Protocol.  |
COCOON  |
2005 |
DBLP DOI BibTeX RDF |
Modification attack, Elliptic curve discrete logarithm problem, Authenticated key agreement, Password guessing attack |
21 | Kiyomichi Araki, Takakazu Satoh, Shinji Miura |
Overview of Elliptic Curve Cryptography.  |
Public Key Cryptography  |
1998 |
DBLP DOI BibTeX RDF |
|