2010
DOI: 10.1090/conm/518/10202
|View full text |Cite
|
Sign up to set email alerts
|

Normal elliptic bases and torus-based cryptography

Abstract: We consider representations of algebraic tori Tn(Fq) over finite fields. We make use of normal elliptic bases to show that, for infinitely many squarefree integers n and infinitely many values of q, we can encode m torus elements, to a small fixed overhead and to m ϕ(n)-tuples of Fq elements, in quasi-linear time in log q.This improves upon previously known algorithms, which all have a quasi-quadratic complexity. As a result, the cost of the encoding phase is now negligible in Diffie-Hellman cryptographic sche… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…In this section we will briefly describe how Theorem 1 has been used in [12]. We refer to the latter paper for more details and further references.…”
Section: A Cryptographic Applicationmentioning
confidence: 99%
See 4 more Smart Citations
“…In this section we will briefly describe how Theorem 1 has been used in [12]. We refer to the latter paper for more details and further references.…”
Section: A Cryptographic Applicationmentioning
confidence: 99%
“…In [12] we present a practical implementation of this map, whose efficiency relies on the use of a certain class of normal bases (see [10]) in the representation of field extensions.…”
Section: A Cryptographic Applicationmentioning
confidence: 99%
See 3 more Smart Citations