Sciweavers

5 search results - page 1 / 1
» Cryptographic implications of Hess' generalized GHS attack
Sort
View
69
Voted
AAECC
2006
Springer
102views Algorithms» more  AAECC 2006»
14 years 10 months ago
Cryptographic implications of Hess' generalized GHS attack
Alfred Menezes, Edlyn Teske
EUROCRYPT
2003
Springer
15 years 3 months ago
The GHS Attack Revisited
Abstract. We generalize the Weil descent construction of the GHS attack to arbitrary Artin-Schreier extensions. We give a formula for the characteristic polynomial of Frobenius of ...
Florian Hess
INDOCRYPT
2001
Springer
15 years 2 months ago
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
In this paper, the authors analyze the Gaudry–Hess–Smart (GHS) Weil descent attack on the elliptic curve discrete logarithm problem (ECDLP) for elliptic curves defined over c...
Markus Maurer, Alfred Menezes, Edlyn Teske
ISCC
2007
IEEE
15 years 4 months ago
Validating Attacks on Authentication Protocols
— It is possible to show that well-known attacks on authentication protocols are flawed. This is a problem, since good protocols may thus be dismissed rather than improved and p...
Anders Moen Hagalisletto
TCOS
2010
14 years 4 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin