<--- Back to Details
First PageDocument Content
Cryptography / Abstract algebra / Algebra / Finite fields / Elliptic curve cryptography / Public-key cryptography / Group theory / Elliptic-curve cryptography / Elliptic curve / XTR / Elliptic curve only hash / Supersingular isogeny key exchange
Date: 2006-05-04 18:26:31
Cryptography
Abstract algebra
Algebra
Finite fields
Elliptic curve cryptography
Public-key cryptography
Group theory
Elliptic-curve cryptography
Elliptic curve
XTR
Elliptic curve only hash
Supersingular isogeny key exchange

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

Add to Reading List

Source URL: www.hyperelliptic.org

Download Document from Source Website

File Size: 348,73 KB

Share Document on Facebook

Similar Documents

Cryptography / Cryptographic hash functions / Error detection and correction / SHA-1 / SHA-2 / MD5 / NIST hash function competition / SHA-3 / Elliptic curve only hash / Elliptic Curve Digital Signature Algorithm / Libgcrypt / FORK-256

Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

DocID: 1lo8W - View Document

Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion

DocID: 1l2py - View Document

Polynomials / Algebraic geometry / Commutative algebra / Computer algebra / System of polynomial equations / Finite field / NP / Time complexity / Elliptic curve only hash / Abstract algebra / Mathematics / Algebra

PDF Document

DocID: 14sXr - View Document

Hashing / Artificial intelligence / Information retrieval / Hash function / Hash table / MD5 / Collision / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Search algorithms

Time-memory Trade-offs for Near-collisions Gaëtan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find near-collisions for a hash

DocID: 12HMr - View Document

Claw-free permutation / MD5 / One-way function / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Hash function

An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:

DocID: 12CJD - View Document