The Discrete Log Problem (DLP), that is computing x, given y = alpha(x) and (alpha) = G subset of F-q*, based Public Key Cryptosystem (PKC) have been studied since the late 1970's. Such development of PKC was possible because of the trapdoor function! : Z(l) -> G = (alpha) subset of F-q*, f (m) = alpha(m) is a group homomorphism. Due to this fact we have; Diffie Hellman (DH) type key exchange, EIGamal type message encryption, and Nyberg-Rueppel type digital signature protocols. The cryptosystems based on the trapdoor f (m) = am are well understood and complete. However, there is another trapdoor function f : Z(l) -> G, f (m) > Tr(alpha(m)), where G = subset of F-qk* k >= 2, which needs more attention from researchers from a cryptographic t...
We present an efficient algorithm to compute a discrete logarithm in a finite nilpotent group, or mo...
Groups where the discrete logarithm problem (DLP) is believed to be intractable have proved to be in...
In this paper, we propose novel deterministic and probabilistic public key cryptographic schemes bas...
The discrete logarithm problem is one of the few hard problems on which public-key cryptography can ...
In this chapter we introduce the basic building blocks for cryptography based on the discrete logari...
Abstract. At CRYPTO 2003, Rubin and Silverberg introduced the con-cept of torus-based cryptography o...
Abstract The first practical public key cryptosystem ever published, the Diffie-Hellman key exchange...
We present a key exchange scheme similar to that of Diffie and Hellman using the infrastructure of q...
Due to its use in cryptographic protocols such as the Diffie–Hellman key exchange, the discrete loga...
The field of cryptography (from the Greek kryptos, meaning “hidden ” and graphein, meaning “to write...
Abstract-A new signature scheme is proposed, together with an imple-mentation of the Diffie-Hellman ...
The security of many cryptographic schemes relies on the intractability of the discrete logarithm pr...
In this talk, we present a new algorithm for the computation of discrete logarithms in finite fields...
Abstract:- We propose a new system that is applicable to public key cryptography. The system is a va...
This thesis considers the analysis of two public key cryptosystems that rely on the difficulty of co...
We present an efficient algorithm to compute a discrete logarithm in a finite nilpotent group, or mo...
Groups where the discrete logarithm problem (DLP) is believed to be intractable have proved to be in...
In this paper, we propose novel deterministic and probabilistic public key cryptographic schemes bas...
The discrete logarithm problem is one of the few hard problems on which public-key cryptography can ...
In this chapter we introduce the basic building blocks for cryptography based on the discrete logari...
Abstract. At CRYPTO 2003, Rubin and Silverberg introduced the con-cept of torus-based cryptography o...
Abstract The first practical public key cryptosystem ever published, the Diffie-Hellman key exchange...
We present a key exchange scheme similar to that of Diffie and Hellman using the infrastructure of q...
Due to its use in cryptographic protocols such as the Diffie–Hellman key exchange, the discrete loga...
The field of cryptography (from the Greek kryptos, meaning “hidden ” and graphein, meaning “to write...
Abstract-A new signature scheme is proposed, together with an imple-mentation of the Diffie-Hellman ...
The security of many cryptographic schemes relies on the intractability of the discrete logarithm pr...
In this talk, we present a new algorithm for the computation of discrete logarithms in finite fields...
Abstract:- We propose a new system that is applicable to public key cryptography. The system is a va...
This thesis considers the analysis of two public key cryptosystems that rely on the difficulty of co...
We present an efficient algorithm to compute a discrete logarithm in a finite nilpotent group, or mo...
Groups where the discrete logarithm problem (DLP) is believed to be intractable have proved to be in...
In this paper, we propose novel deterministic and probabilistic public key cryptographic schemes bas...