Due to the intractability of the Discrete Logarithm Problem (DLP), it has been widely used in the field of cryptography and the security of several cryptosystems is based on the hardness of computation of DLP. In this paper, we start with the topics on Number Theory and Abstract Algebra as it will enable one to study the nature of discrete logarithms in a comprehensive way, and then, we concentrate on the application and computation of discrete logarithms. Application of discrete logarithms such as Diffie Hellman key exchange, ElGamal signature scheme, and several attacks over the DLP such as Baby-step Giant-step method, Silver Pohlig Hellman algorithm, etc have been analyzed. We also focus on the elliptic curve along with the discrete loga...
In this paper we analyze the application of a formal proof system to the discrete logarithm problem ...
Abstract. Since the introduction of public-key cryptography by Diffie and Hellman in 1976, the poten...
The discrete logarithm problem is one of the few hard problems on which public-key cryptography can ...
This paper begins by describing basic properties of finite field and elliptic curve cryptography ove...
This paper begins by describing basic properties of finite field and elliptic curve cryptography ove...
Abstract The first practical public key cryptosystem ever published, the Diffie-Hellman key exchange...
In the paper we try to give a view of the discrete logarithm problem, especially of related problems...
In the paper we try to give a view of the discrete logarithm problem, especially of related problems...
Abstract. Cryptographic protocols often make use of the inherent hardness of the classical discrete ...
The crux of elliptic curve cryptography, a popular mechanism for securing data, is an asymmetric pro...
2nd version: fix some font bugs and typos (minor modifications)International audienceThe Discrete Lo...
2nd version: fix some font bugs and typos (minor modifications)International audienceThe Discrete Lo...
Digital signature and cryptography algorithms based on the Elliptic Curve Discrete Logarithm Problem...
Over the last year or two, a large number of attacks have been found by the authors and others on pr...
At the beginning the paper describes the basic properties of finite fieldarithmetic and elliptic cur...
In this paper we analyze the application of a formal proof system to the discrete logarithm problem ...
Abstract. Since the introduction of public-key cryptography by Diffie and Hellman in 1976, the poten...
The discrete logarithm problem is one of the few hard problems on which public-key cryptography can ...
This paper begins by describing basic properties of finite field and elliptic curve cryptography ove...
This paper begins by describing basic properties of finite field and elliptic curve cryptography ove...
Abstract The first practical public key cryptosystem ever published, the Diffie-Hellman key exchange...
In the paper we try to give a view of the discrete logarithm problem, especially of related problems...
In the paper we try to give a view of the discrete logarithm problem, especially of related problems...
Abstract. Cryptographic protocols often make use of the inherent hardness of the classical discrete ...
The crux of elliptic curve cryptography, a popular mechanism for securing data, is an asymmetric pro...
2nd version: fix some font bugs and typos (minor modifications)International audienceThe Discrete Lo...
2nd version: fix some font bugs and typos (minor modifications)International audienceThe Discrete Lo...
Digital signature and cryptography algorithms based on the Elliptic Curve Discrete Logarithm Problem...
Over the last year or two, a large number of attacks have been found by the authors and others on pr...
At the beginning the paper describes the basic properties of finite fieldarithmetic and elliptic cur...
In this paper we analyze the application of a formal proof system to the discrete logarithm problem ...
Abstract. Since the introduction of public-key cryptography by Diffie and Hellman in 1976, the poten...
The discrete logarithm problem is one of the few hard problems on which public-key cryptography can ...