Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles et Sendrier, Nicolas et Roblot, XavierComputing discrete logarithms is a fundamental task for public key cryptanalysis. The mere existence of a subexponential algorithm for this purpose is not su±cient to de¯nitely rule on the security level provided by some cryptosystem. Assessing state-of-the-art cryptanalysis calls for a thorough evaluation process. This dissertation contributes to such an evaluation. In particular, a record computation for discrete logarithms over F2607 is described.The first part of this thesis focuses on our study and use of Coppersmith's algorithm for computing discrete logarithms in finite fields of characteristic two...
This paper reports on the computation of a discrete logarithm in the finite field $\mathbb{F}_{2^{30...
new algorithms for computing discrete logarithms in finite fields of small and medium characteristic...
Les primitives de la cryptographie à clé publique reposent sur la difficulté supposée de résoudre ce...
Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles ...
Cryptography is the study of techniques for secure communication in the presence of third parties, a...
The security of public-key cryptographic primitives relies on the computational difficulty of solvin...
Computing discrete logarithms is a long-standing algorithmic problem, whose hardness forms the basis...
La cryptologie consiste en l’étude des techniques utilisées par deux entités pour communiquer en ...
Public-key cryptosystems are constructed using one-way functions which ensure both the security and ...
The integer factorization and discrete logarithm problems are cornerstones of several public-key cry...
International audienceWe describe in this article how we have been able to extend the record for com...
Due to its use in cryptographic protocols such as the Diffie–Hellman key exchange, the discrete loga...
The discrete logarithm problem is one of the few hard problems on which public-key cryptography can ...
These are notes for a lecture given at CIRM in 2014, for the Journées Nationales du Calcul Formel. W...
This paper reports on the computation of a discrete logarithm in the finite field $\mathbb F_{2^3075...
This paper reports on the computation of a discrete logarithm in the finite field $\mathbb{F}_{2^{30...
new algorithms for computing discrete logarithms in finite fields of small and medium characteristic...
Les primitives de la cryptographie à clé publique reposent sur la difficulté supposée de résoudre ce...
Membre du Jury : von zur Gathen, Joachim et Coppersmith, Don et Berger, Thierry et Villard, Gillles ...
Cryptography is the study of techniques for secure communication in the presence of third parties, a...
The security of public-key cryptographic primitives relies on the computational difficulty of solvin...
Computing discrete logarithms is a long-standing algorithmic problem, whose hardness forms the basis...
La cryptologie consiste en l’étude des techniques utilisées par deux entités pour communiquer en ...
Public-key cryptosystems are constructed using one-way functions which ensure both the security and ...
The integer factorization and discrete logarithm problems are cornerstones of several public-key cry...
International audienceWe describe in this article how we have been able to extend the record for com...
Due to its use in cryptographic protocols such as the Diffie–Hellman key exchange, the discrete loga...
The discrete logarithm problem is one of the few hard problems on which public-key cryptography can ...
These are notes for a lecture given at CIRM in 2014, for the Journées Nationales du Calcul Formel. W...
This paper reports on the computation of a discrete logarithm in the finite field $\mathbb F_{2^3075...
This paper reports on the computation of a discrete logarithm in the finite field $\mathbb{F}_{2^{30...
new algorithms for computing discrete logarithms in finite fields of small and medium characteristic...
Les primitives de la cryptographie à clé publique reposent sur la difficulté supposée de résoudre ce...