2017
DOI: 10.1007/978-3-662-54365-8_16
|View full text |Cite
|
Sign up to set email alerts
|

Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
27
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(29 citation statements)
references
References 19 publications
0
27
0
Order By: Relevance
“…(Algorithm A subsumes the Conjugation and the GJL methods.) • The generalised Conjugation method of Jeong and Kim [25]. (The method of Jeong and Kim subsumes the polynomial selection algorithm by Kim and Barbulescu [24].)…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…(Algorithm A subsumes the Conjugation and the GJL methods.) • The generalised Conjugation method of Jeong and Kim [25]. (The method of Jeong and Kim subsumes the polynomial selection algorithm by Kim and Barbulescu [24].)…”
Section: Introductionmentioning
confidence: 99%
“…Let p = L Q (a, c p ) with 1/3 < a ≤ 2/3 and n = ηκ be such that there is a c θ > 0 with p η = L Q (2/3, c θ ). The expression for the complexity obtained in [24,25] is a function of c θ . The minimum value of the complexity (as a function of c θ ) is the best known complexity for the medium prime case and is achieved only for a particular value of c θ .…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The embedding degree k is large enough, so that the DLP in G T ⊂ F * p k is as hard as in G 1 , G 2 . In practice F p k must be resistant to the variants of the number field sieve (NFS) attack [EMJ17, KJ17,KB16]. 4. k is relatively small, for efficient operations in G T .…”
mentioning
confidence: 99%