This project aims to describe Pollard's rho-Algorithm for solving the Discrete Logarithm Problem in a group, and to look at how this algorithm applies to Elliptic Curve Cryptography. We start with a general definition of Elliptic Curves and the Discrete Logarithm Problem, and go on to describe Pollard's rho-algorithm in detail. We prove some of the assumptions used in the algorithm description, and in the final section we look at some of the issues with which one is faced when trying to apply the algorithm to the Elliptic Curve Discrete Logarithm Problem
The discrete logarithm problem is one of the most common trap- door functions in asymmetric cryptogr...
Abstract. Cryptographic protocols often make use of the inherent hardness of the classical discrete ...
L'usage des courbes elliptiques en cryptographie s'est largement répandu pour assurer la sécurité de...
Cryptosystems based on elliptic curves are in wide-spread use, they are considered secure becaus...
Elliptic Curve cryptosystems appear to be more secure and efficient when requiring small key size to...
Abstract. Since the introduction of public-key cryptography by Diffie and Hellman in 1976, the poten...
The Diffie - Hellman problem may be used securely over the multiplicative group F*p, (Z/nZ)* and the...
This paper begins by describing basic properties of finite field and elliptic curve cryptography ove...
Cheon first proposed a novel algorithm for solving discrete logarithm problem with auxiliary inputs....
Elliptic curve discrete logarithm problem(ECDLP) is one of problems on which the security of pairing...
This paper examines the cryptographic security of fixed versus random elliptic curves over GF(p). It...
International audienceThe discrete logarithm problem based on elliptic and hyperelliptic curves has ...
elliptic curves, cryptography © Copyright Hewlett-Packard Company 1997 In this short note we describ...
Abstract. The negation map can be used to speed up the computation of elliptic curve discrete logari...
Due to the intractability of the Discrete Logarithm Problem (DLP), it has been widely used in the fi...
The discrete logarithm problem is one of the most common trap- door functions in asymmetric cryptogr...
Abstract. Cryptographic protocols often make use of the inherent hardness of the classical discrete ...
L'usage des courbes elliptiques en cryptographie s'est largement répandu pour assurer la sécurité de...
Cryptosystems based on elliptic curves are in wide-spread use, they are considered secure becaus...
Elliptic Curve cryptosystems appear to be more secure and efficient when requiring small key size to...
Abstract. Since the introduction of public-key cryptography by Diffie and Hellman in 1976, the poten...
The Diffie - Hellman problem may be used securely over the multiplicative group F*p, (Z/nZ)* and the...
This paper begins by describing basic properties of finite field and elliptic curve cryptography ove...
Cheon first proposed a novel algorithm for solving discrete logarithm problem with auxiliary inputs....
Elliptic curve discrete logarithm problem(ECDLP) is one of problems on which the security of pairing...
This paper examines the cryptographic security of fixed versus random elliptic curves over GF(p). It...
International audienceThe discrete logarithm problem based on elliptic and hyperelliptic curves has ...
elliptic curves, cryptography © Copyright Hewlett-Packard Company 1997 In this short note we describ...
Abstract. The negation map can be used to speed up the computation of elliptic curve discrete logari...
Due to the intractability of the Discrete Logarithm Problem (DLP), it has been widely used in the fi...
The discrete logarithm problem is one of the most common trap- door functions in asymmetric cryptogr...
Abstract. Cryptographic protocols often make use of the inherent hardness of the classical discrete ...
L'usage des courbes elliptiques en cryptographie s'est largement répandu pour assurer la sécurité de...