The discrete logarithm problem is a fundamental brick for several protocols for secured communications. Its instantiation over elliptic curves allows the deployment of efficient asymmetric primitives in embedded systems, because of the small size of the parameters considered. Nowadays, elliptic curves cryptosystems are already widely used: it is therefore crucial to precisely understand the hardness of such systems. Because of the existence of mathematical attacks enabling the transfer from an elliptic curve discrete logarithm problem to another algebraic curve, and the upcoming competitivity of genus 2 curves, it is mandatory to study the problem not only for elliptic curves, but for the other curves as well.In this way, this thesis focuse...
The discrete logarithm on elliptic curves gives the standard protocols in public key cryptography: a...
To date, elliptic curves offer the most efficient cryptographic solution. Particularly efficient amo...
We give an improved index calculus attack for a large class of elliptic curves. Our algorithm works...
The discrete logarithm problem is a fundamental brick for several protocols for secured communicatio...
The discrete logarithm problem is a fundamental brick for several protocols for secured communicatio...
Up to now, very few algorithms exist that solve the discrete logarithm problem in the group of point...
Le problème du logarithme discret est une brique fondamentale de nombreux protocoles de communicatio...
Le problème du logarithme discret est une brique fondamentale de nombreux protocoles de communicatio...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
Since the last decade, attacks on the elliptic curve discrete logarithm problem (ECDLP) which requir...
Since the last decade, attacks on the elliptic curve discrete logarithm problem (ECDLP) which requir...
The discrete logarithm on elliptic curves give the standard protocols in public key cryptography: as...
In this thesis, we explore the use of combinatorial techniques, such as graph-based algorithms and c...
The discrete logarithm on elliptic curves gives the standard protocols in public key cryptography: a...
The discrete logarithm on elliptic curves gives the standard protocols in public key cryptography: a...
To date, elliptic curves offer the most efficient cryptographic solution. Particularly efficient amo...
We give an improved index calculus attack for a large class of elliptic curves. Our algorithm works...
The discrete logarithm problem is a fundamental brick for several protocols for secured communicatio...
The discrete logarithm problem is a fundamental brick for several protocols for secured communicatio...
Up to now, very few algorithms exist that solve the discrete logarithm problem in the group of point...
Le problème du logarithme discret est une brique fondamentale de nombreux protocoles de communicatio...
Le problème du logarithme discret est une brique fondamentale de nombreux protocoles de communicatio...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
Since the last decade, attacks on the elliptic curve discrete logarithm problem (ECDLP) which requir...
Since the last decade, attacks on the elliptic curve discrete logarithm problem (ECDLP) which requir...
The discrete logarithm on elliptic curves give the standard protocols in public key cryptography: as...
In this thesis, we explore the use of combinatorial techniques, such as graph-based algorithms and c...
The discrete logarithm on elliptic curves gives the standard protocols in public key cryptography: a...
The discrete logarithm on elliptic curves gives the standard protocols in public key cryptography: a...
To date, elliptic curves offer the most efficient cryptographic solution. Particularly efficient amo...
We give an improved index calculus attack for a large class of elliptic curves. Our algorithm works...