This thesis studies the implications of using public key cryptographic primitives that are based in, or map to, the multiplicative group of finite fields with small extension degree. A central observation is that the multiplicative group of extension fields essentially decomposes as a product of algebraic tori, whose properties allow for improved communication efficiency. Part I of this thesis is concerned with the constructive implications of this idea. Firstly, algorithms are developed for the efficient implementation of torus-based cryptosystems and their performance compared with previous work. It is then shown how to apply these methods to operations required in low characteristic pairing-based cryptography. Finally, practical schemes ...
The integer factorization and discrete logarithm problems are cornerstones of several public-key cry...
Public-key cryptosystems are constructed using one-way functions which ensure both the security and ...
Computing discrete logarithms is a long-standing algorithmic problem, whose hardness forms the basis...
... \ud that are based in, or map to, the multiplicative group of finite fields with small extension...
Discrete logarithm-based cryptography has sustained many studies in the last decade. Lenstra and Ver...
International audienceThe security of torus-based and pairing-based cryptography relies on the diffi...
The security of many cryptographic schemes relies on the intractability of the discrete logarithm pr...
Abstract. At CRYPTO 2003, Rubin and Silverberg introduced the con-cept of torus-based cryptography o...
Post-Quantum Cryptography studies cryptographic algorithms that quantum computers cannot break. Rece...
The discrete logarithm problem is one of the few hard problems on which public-key cryptography can ...
International audienceIn this paper, we study the application of the function field sievealgorithm f...
International audienceWe study the discrete logarithm problem at the boundary case between small and...
Due to its use in cryptographic protocols such as the Diffie–Hellman key exchange, the discrete loga...
International audienceComputing discrete logarithms in finite fields is a main concern in cryptograp...
Given a group G and two elements g,h ∈ G, solving the discrete logarithm problem consists of finding...
The integer factorization and discrete logarithm problems are cornerstones of several public-key cry...
Public-key cryptosystems are constructed using one-way functions which ensure both the security and ...
Computing discrete logarithms is a long-standing algorithmic problem, whose hardness forms the basis...
... \ud that are based in, or map to, the multiplicative group of finite fields with small extension...
Discrete logarithm-based cryptography has sustained many studies in the last decade. Lenstra and Ver...
International audienceThe security of torus-based and pairing-based cryptography relies on the diffi...
The security of many cryptographic schemes relies on the intractability of the discrete logarithm pr...
Abstract. At CRYPTO 2003, Rubin and Silverberg introduced the con-cept of torus-based cryptography o...
Post-Quantum Cryptography studies cryptographic algorithms that quantum computers cannot break. Rece...
The discrete logarithm problem is one of the few hard problems on which public-key cryptography can ...
International audienceIn this paper, we study the application of the function field sievealgorithm f...
International audienceWe study the discrete logarithm problem at the boundary case between small and...
Due to its use in cryptographic protocols such as the Diffie–Hellman key exchange, the discrete loga...
International audienceComputing discrete logarithms in finite fields is a main concern in cryptograp...
Given a group G and two elements g,h ∈ G, solving the discrete logarithm problem consists of finding...
The integer factorization and discrete logarithm problems are cornerstones of several public-key cry...
Public-key cryptosystems are constructed using one-way functions which ensure both the security and ...
Computing discrete logarithms is a long-standing algorithmic problem, whose hardness forms the basis...