International audienceWe describe implementations for solving the discrete logarithm problem in the class group of an imaginary quadratic field and in the infrastructure of a real quadratic field. The algorithms used incorporate improvements over previously-used algorithms, and extensive numerical results are presented demonstrating their efficiency. This data is used as the basis for extrapolations, used to provide recommendations for parameter sizes providing approximately the same level of security as block ciphers with $80,$ $112,$ $128,$ $192,$ and $256$-bit symmetric keys
Since nobody can guarantee that the computation of discrete logarithms in elliptic curves or IF p...
Computing discrete logarithms is a long-standing algorithmic problem, whose hardness forms the basis...
This paper reports on the computation of a discrete logarithm in the finite field $\mathbb{F}_{2^{30...
International audienceWe describe implementations for solving the discrete logarithm problem in the ...
Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 20...
The purpose of this thesis is to study the complexity of the discrete logarithm problem (DLP) and re...
peer reviewedWe describe a public key cryptosystem which works in quadratic function fields of chara...
Imaginary quadratic fields were first suggested as a setting for public-key cryptography by Buchmann...
new algorithms for computing discrete logarithms in finite fields of small and medium characteristic...
The security of many cryptographic schemes relies on the intractability of the discrete logarithm pr...
International audienceWe describe in this article how we have been able to extend the record for com...
Abstract. In 2013, Joux and then Barbulescu et al. presented new algorithms for computing discrete l...
Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles ...
International audienceWe report on two new records: the factorization of RSA-240, a 795-bit number, ...
Public key cryptography aims at providing efficient, versatile, and secure solutions to protect comp...
Since nobody can guarantee that the computation of discrete logarithms in elliptic curves or IF p...
Computing discrete logarithms is a long-standing algorithmic problem, whose hardness forms the basis...
This paper reports on the computation of a discrete logarithm in the finite field $\mathbb{F}_{2^{30...
International audienceWe describe implementations for solving the discrete logarithm problem in the ...
Treballs Finals de Grau de Matemàtiques, Facultat de Matemàtiques, Universitat de Barcelona, Any: 20...
The purpose of this thesis is to study the complexity of the discrete logarithm problem (DLP) and re...
peer reviewedWe describe a public key cryptosystem which works in quadratic function fields of chara...
Imaginary quadratic fields were first suggested as a setting for public-key cryptography by Buchmann...
new algorithms for computing discrete logarithms in finite fields of small and medium characteristic...
The security of many cryptographic schemes relies on the intractability of the discrete logarithm pr...
International audienceWe describe in this article how we have been able to extend the record for com...
Abstract. In 2013, Joux and then Barbulescu et al. presented new algorithms for computing discrete l...
Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles ...
International audienceWe report on two new records: the factorization of RSA-240, a 795-bit number, ...
Public key cryptography aims at providing efficient, versatile, and secure solutions to protect comp...
Since nobody can guarantee that the computation of discrete logarithms in elliptic curves or IF p...
Computing discrete logarithms is a long-standing algorithmic problem, whose hardness forms the basis...
This paper reports on the computation of a discrete logarithm in the finite field $\mathbb{F}_{2^{30...