In late 2012 and early 2013 the discrete logarithm problem (DLP) in finite fields of small characteristic underwent a dramatic series of breakthroughs, culminating in a heuristic quasi-polynomial time algorithm, due to Barbulescu, Gaudry, Joux and Thomé. Using these developments, Adj, Menezes, Oliveira and Rodríguez-Henríquez analysed the concrete security of the DLP, as it arises from pairings on (the Jacobians of) various genus one and two supersingular curves in the literature, which were originally thought to be 128-bit secure. In particular, they suggested that the new algorithms have no impact on the security of a genus one curve over F21223 , and reduce the security of a genus two curve over F2367 to 94.6 bits. In this paper we propo...
Abstract. Motivated by the advantages of using elliptic curves for discrete logarithm-based public-k...
The discrete logarithm problem is one of the few hard problems on which public-key cryptography can ...
The security of many cryptographic schemes relies on the intractability of the discrete logarithm pr...
In late 2012 and early 2013 the discrete logarithm problem (DLP) in finite fields of small character...
Abstract. In late 2012 and early 2013 the discrete logarithm problem (DLP) in finite fields of small...
Abstract. In 2013, Joux and then Barbulescu et al. presented new algorithms for computing discrete l...
The discrete logarithm problem (DLP) in finite fields of small characteristic recently enjoyed a dra...
Abstract. Pairings on elliptic curves over finite fields are crucial for con-structing various crypt...
new algorithms for computing discrete logarithms in finite fields of small and medium characteristic...
Abstract. Frey and Rück gave a method to transform the discrete logarithm problem in the divisor cl...
International audienceThere have been recent advances in solving the finite extension field discrete...
Recent progress in number field sieve (NFS) has shaken the security of Pairing-based Cryptography. F...
https://www.iacr.org/docs/pub_2013-16.htmlThis paper is the IACR version. It can be made freely avai...
International audienceFollowing the emergence of Kim and Barbulescu's new number field sieve (exTNFS...
The Discrete Logarithm Problem (DLP) in the abelian group $E(\mathbb{F}_p)$ of $\mathbb{F}_p$-valued...
Abstract. Motivated by the advantages of using elliptic curves for discrete logarithm-based public-k...
The discrete logarithm problem is one of the few hard problems on which public-key cryptography can ...
The security of many cryptographic schemes relies on the intractability of the discrete logarithm pr...
In late 2012 and early 2013 the discrete logarithm problem (DLP) in finite fields of small character...
Abstract. In late 2012 and early 2013 the discrete logarithm problem (DLP) in finite fields of small...
Abstract. In 2013, Joux and then Barbulescu et al. presented new algorithms for computing discrete l...
The discrete logarithm problem (DLP) in finite fields of small characteristic recently enjoyed a dra...
Abstract. Pairings on elliptic curves over finite fields are crucial for con-structing various crypt...
new algorithms for computing discrete logarithms in finite fields of small and medium characteristic...
Abstract. Frey and Rück gave a method to transform the discrete logarithm problem in the divisor cl...
International audienceThere have been recent advances in solving the finite extension field discrete...
Recent progress in number field sieve (NFS) has shaken the security of Pairing-based Cryptography. F...
https://www.iacr.org/docs/pub_2013-16.htmlThis paper is the IACR version. It can be made freely avai...
International audienceFollowing the emergence of Kim and Barbulescu's new number field sieve (exTNFS...
The Discrete Logarithm Problem (DLP) in the abelian group $E(\mathbb{F}_p)$ of $\mathbb{F}_p$-valued...
Abstract. Motivated by the advantages of using elliptic curves for discrete logarithm-based public-k...
The discrete logarithm problem is one of the few hard problems on which public-key cryptography can ...
The security of many cryptographic schemes relies on the intractability of the discrete logarithm pr...