Back to Results
First PageMeta Content
Algebraic number theory / Integer factorization algorithms / Finite fields / Computational hardness assumptions / Logarithms / Discrete logarithm / Quadratic sieve / XTR / Integer factorization / Abstract algebra / Mathematics / Algebra


Main text appears in T. Okamoto (Ed.): Advances in Cryptology – ASIACRYPT 2000, Springer-Verlag LNCS 1976, pp, ISBNAddendum does not appear in proceedings. Security of Cryptosystems Based on Cl
Add to Reading List

Document Date: 2006-01-02 00:24:48


Open Document

File Size: 284,80 KB

Share Result on Facebook

Company

SUN Microsystems / /

/

Event

Product Issues / Product Recall / /

Facility

library LiDIA / /

IndustryTerm

machinery / cyclic groups / signature protocol / cryptographic protocols / index-calculus algorithms / probabilistic efficient algorithm / signature protocols / arbitrary class / multiplicative groups / expected computing amount / subexponential index-calculus algorithm / class groups / class / /

Product

Class Groups / /

ProgrammingLanguage

C++ / /

Technology

GuillouQuisquater signature protocol / Guillou-Quisquater signature protocol / subexponential index-calculus algorithm / Pohlig-Hellman Algorithm The Pohlig-Hellman algorithm / index-calculus algorithms / MPQS factoring algorithm / also cryptographic protocols / DLP / MPQS DL-computation algorithm / Pohlig-Hellman algorithm / signature protocols / PohligHellman algorithm / factoring algorithm / Ultra-170 processor / /

SocialTag