Sciweavers

5 search results - page 1 / 1
» A Cryptographic Application of Weil Descent
Sort
View
IMA
1999
Springer
73views Cryptology» more  IMA 1999»
13 years 9 months ago
A Cryptographic Application of Weil Descent
Steven D. Galbraith, Nigel P. Smart
INDOCRYPT
2001
Springer
13 years 9 months ago
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
In this paper, the authors analyze the Gaudry–Hess–Smart (GHS) Weil descent attack on the elliptic curve discrete logarithm problem (ECDLP) for elliptic curves defined over c...
Markus Maurer, Alfred Menezes, Edlyn Teske
EUROCRYPT
2001
Springer
13 years 9 months ago
How Secure Are Elliptic Curves over Composite Extension Fields?
We compare the method of Weil descent for solving the ECDLP, over extensions fields of composite degree in characteristic two, against the standard method of parallelised Pollard ...
Nigel P. Smart
EUROCRYPT
2003
Springer
13 years 10 months ago
The GHS Attack Revisited
Abstract. We generalize the Weil descent construction of the GHS attack to arbitrary Artin-Schreier extensions. We give a formula for the characteristic polynomial of Frobenius of ...
Florian Hess
IJISEC
2006
113views more  IJISEC 2006»
13 years 5 months ago
Escrow-free encryption supporting cryptographic workflow
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing , there has been a great deal of interest in cryptographic primitiv...
Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Sma...