2015
DOI: 10.1007/978-3-319-16277-5_1
|View full text |Cite
|
Sign up to set email alerts
|

Computing Discrete Logarithms in $${\mathbb F}_{3^{6 \cdot 137}}$$ and $${\mathbb F}_{3^{6 \cdot 163}}$$ Using Magma

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(17 citation statements)
references
References 22 publications
0
17
0
Order By: Relevance
“…This is expected to be successful about 50% of the time. If unsuccessful, then the 'Frobenius strategy' described in [5] is employed. Namely, one has…”
Section: 21mentioning
confidence: 99%
See 2 more Smart Citations
“…This is expected to be successful about 50% of the time. If unsuccessful, then the 'Frobenius strategy' described in [5] is employed. Namely, one has…”
Section: 21mentioning
confidence: 99%
“…be an irreducible polynomial of degree D, and let m ≥ 1. In Joux's D-to-m descent [26] (see also §2.5 of [5]), one obtains a system of 3m + 1 bilinear equations in 5m − D + 3 variables over F q .…”
Section: 3mentioning
confidence: 99%
See 1 more Smart Citation
“…It has been reported in the literature [SV07], [GPS08], [CM11], that among the different types of pairings, it is the Type-3 pairings which provide the most compact parameter sizes and the most efficient algorithms. Further, Type-1 pairings are usually defined over low characteristics fields and recent advances [BGJT14], [Jou13], [GKZ14a], [AMORH14], [GKZ14b] in algorithms for discrete log computations over such fields have raised serious question marks about the security of Type-1 pairings [Gal14]. From both efficiency and security considerations, constructions based on Type-3 pairings are desirable.…”
Section: A Issues Regarding the Construction Of Ibbe Schemesmentioning
confidence: 99%
“…We decided to attack the eta pairing [24] despite current research results which indicate that it should no longer be used for security applications, cf. [25], [26]. This was due to the fact that the eta pairing is the default for AVR devices in the attacked RELIC library [23].…”
Section: A Mathematical Details Of the Attacked Implementationmentioning
confidence: 99%