Back to Results
First PageMeta Content
Integer factorization algorithms / Finite fields / Computational hardness assumptions / Algebraic number theory / Group theory / XTR / Discrete logarithm / Quadratic sieve / Integer factorization / Abstract algebra / Mathematics / Algebra


Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders Safuat Hamdy Bodo Möller
Add to Reading List

Document Date: 2006-01-02 00:23:19


Open Document

File Size: 321,69 KB

Share Result on Facebook

Company

SUN Microsystems / /

/

IndustryTerm

machinery / cient algorithm / signature protocol / cryptographic protocols / index-calculus algorithms / signature protocols / arbitrary class / subexponential index-calculus algorithm / expected computing amount / class groups / class / /

Person

Hamdy Bodo Möller Fachbereich Informatik / /

Technology

Guillou-Quisquater signature protocol / subexponential index-calculus algorithm / Pohlig-Hellman algorithm The Pohlig-Hellman algorithm / index-calculus algorithms / DL-based cryptographic protocols / also cryptographic protocols / DLP / Pohlig-Hellman algorithm / Sparc ULTRA-170 processor / signature protocols / factoring 1 algorithm / PohligHellman algorithm / cient algorithm / time algorithm / ULTRA-170 processor / DL-computation algorithm / /

SocialTag