現今許多密碼系統的安全性, 是以橢圓曲線離散對數問題(ECDLP) 的困難度為基礎。這些密碼系統的安全性, 通常取決於曲線的選擇。在這篇論文中, 我們對現在針對橢圓曲線離散對數問題的攻擊法做一個整理, 找出弱曲線的條件, 也提出一些安全曲線應該有的條件。另外, 我們也會討論一些其他的攻擊法, 這些攻擊法對ECDLP 是失敗的。The elliptic curve discrete logarithm problem (ECDLP) forms the basis of numerous cryptosystems today. The security of these cryptosystems usually depends on the choice of curves. In this thesis, we give a summary of recent attacks on the ECDLP, find the criteria of weak curves, and suggest the conditions that a secure curve should have. We will also discuss some attacks which works on the DLP but may fail to the ECDLP.Contents試委員會審定書i謝iibstract in Chinese iiibstract in English iv Introduction 1 General Attacks on the ECDLP 4.1 Baby Step, Giant Step . . . . . . . . . . . . . . . ...
Elliptic curves have become widespread in cryptographic applications since they offer the same crypt...
The use of elliptic curves in cryptography has become widespread to ensure the security of communica...
Digitalization of sensitive information such as bankaccounts enforces privacy to be ensured. Mathema...
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of ...
Elliptic curves (EC) are widely studied due to their mathematical and cryptographic properties. Cryp...
More than 25 years ago, elliptic curves over finite fields were suggested as a group in which the Di...
Problém diskrétního logaritmu je základem pro množství kryptografických systémů současnosti. Není to...
13 páginas, 2 tablasElliptic Curve Cryptography (ECC) is a branch of public-key cryptography based ...
L'usage des courbes elliptiques en cryptographie s'est largement répandu pour assurer la sécurité de...
Yüksek Lisans Tezi1980'li yılların ortalarında, Miller ve Koblitz eliptik eğrilerin kriptolojide kul...
In the recent years, the need of information security has rapidly increased due to an enormous growt...
The crux of elliptic curve cryptography, a popular mechanism for securing data, is an asymmetric pro...
Short Weierstrass's elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problems ...
In cryptography, the aim is to achieve security through encryption and this involves transforming a ...
The crux of elliptic curve cryptography, a popular mechanism for securing data, is an asymmetric pro...
Elliptic curves have become widespread in cryptographic applications since they offer the same crypt...
The use of elliptic curves in cryptography has become widespread to ensure the security of communica...
Digitalization of sensitive information such as bankaccounts enforces privacy to be ensured. Mathema...
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of ...
Elliptic curves (EC) are widely studied due to their mathematical and cryptographic properties. Cryp...
More than 25 years ago, elliptic curves over finite fields were suggested as a group in which the Di...
Problém diskrétního logaritmu je základem pro množství kryptografických systémů současnosti. Není to...
13 páginas, 2 tablasElliptic Curve Cryptography (ECC) is a branch of public-key cryptography based ...
L'usage des courbes elliptiques en cryptographie s'est largement répandu pour assurer la sécurité de...
Yüksek Lisans Tezi1980'li yılların ortalarında, Miller ve Koblitz eliptik eğrilerin kriptolojide kul...
In the recent years, the need of information security has rapidly increased due to an enormous growt...
The crux of elliptic curve cryptography, a popular mechanism for securing data, is an asymmetric pro...
Short Weierstrass's elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problems ...
In cryptography, the aim is to achieve security through encryption and this involves transforming a ...
The crux of elliptic curve cryptography, a popular mechanism for securing data, is an asymmetric pro...
Elliptic curves have become widespread in cryptographic applications since they offer the same crypt...
The use of elliptic curves in cryptography has become widespread to ensure the security of communica...
Digitalization of sensitive information such as bankaccounts enforces privacy to be ensured. Mathema...