International audienceThe aim of this work is to investigate the hardness of the discrete logarithm problem in fields GF$(p^n)$ where $n$ is a small integer greater than 1. Though less studied than the small characteristic case or the prime field case, the difficulty of this problem is at the heart of security evaluations for torus-based and pairing-based cryptography. The best known method for solving this problem is the Number Field Sieve (NFS). A key ingredient in this algorithm is the ability to find good polynomials that define the extension fields used in NFS. We design two new methods for this task, modifying the asymptotic complexity and paving the way for record-breaking computations. We exemplify these results with the computation...
This unpublished version contains some inexact statements. Please refer to the version published at ...
2Institut national de recherche en informatique et en automatique (INRIA) 3Centre national de la rec...
This unpublished version contains some inexact statements. Please refer to the version published at ...
International audienceThe aim of this work is to investigate the hardness of the discrete logarithm ...
International audienceThe aim of this work is to investigate the hardness of the discrete logarithm ...
International audienceThe Number Field Sieve (NFS) algorithm is the best known method to compute dis...
International audienceThe Number Field Sieve (NFS) algorithm is the best known method to compute dis...
International audienceThe Number Field Sieve (NFS) algorithm is the best known method to compute dis...
We propose various strategies for improving the computation of discrete logarithms in non-prime fiel...
International audienceThe security of torus-based and pairing-based cryptography relies on the diffi...
International audienceThe year 2013 has seen several major complexity advances for the discrete loga...
International audienceComputing discrete logarithms in finite fields is a main concern in cryptograp...
This unpublished version contains some inexact statements. Please refer to the version published at ...
We propose various strategies for improving the computation of discrete logarithms in non-prime fiel...
International audienceThe Number Field Sieve (NFS) algorithm is the best known method to compute dis...
This unpublished version contains some inexact statements. Please refer to the version published at ...
2Institut national de recherche en informatique et en automatique (INRIA) 3Centre national de la rec...
This unpublished version contains some inexact statements. Please refer to the version published at ...
International audienceThe aim of this work is to investigate the hardness of the discrete logarithm ...
International audienceThe aim of this work is to investigate the hardness of the discrete logarithm ...
International audienceThe Number Field Sieve (NFS) algorithm is the best known method to compute dis...
International audienceThe Number Field Sieve (NFS) algorithm is the best known method to compute dis...
International audienceThe Number Field Sieve (NFS) algorithm is the best known method to compute dis...
We propose various strategies for improving the computation of discrete logarithms in non-prime fiel...
International audienceThe security of torus-based and pairing-based cryptography relies on the diffi...
International audienceThe year 2013 has seen several major complexity advances for the discrete loga...
International audienceComputing discrete logarithms in finite fields is a main concern in cryptograp...
This unpublished version contains some inexact statements. Please refer to the version published at ...
We propose various strategies for improving the computation of discrete logarithms in non-prime fiel...
International audienceThe Number Field Sieve (NFS) algorithm is the best known method to compute dis...
This unpublished version contains some inexact statements. Please refer to the version published at ...
2Institut national de recherche en informatique et en automatique (INRIA) 3Centre national de la rec...
This unpublished version contains some inexact statements. Please refer to the version published at ...