<--- Back to Details
First PageDocument Content
Algebraic curves / Algebraic geometry / Geometry / Abstract algebra / Group theory / Hyperelliptic curve / Algebraic surfaces / Index calculus algorithm / Elliptic curve / Hyperelliptic curve cryptography / Trace Zero Cryptography
Date: 2006-04-16 23:42:07
Algebraic curves
Algebraic geometry
Geometry
Abstract algebra
Group theory
Hyperelliptic curve
Algebraic surfaces
Index calculus algorithm
Elliptic curve
Hyperelliptic curve cryptography
Trace Zero Cryptography

Index calculus in class groups of non-hyperelliptic curves of genus 3 from a full cost perspective Claus Diem University of Leipzig

Add to Reading List

Source URL: www.hyperelliptic.org

Download Document from Source Website

File Size: 114,46 KB

Share Document on Facebook

Similar Documents

A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups Alexander May? and Ilya Ozerov?? Horst G¨ ortz Institute for IT-Security Ruhr-University Bochum, Germany

A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups Alexander May? and Ilya Ozerov?? Horst G¨ ortz Institute for IT-Security Ruhr-University Bochum, Germany

DocID: 1qKpq - View Document

On the Function Field Sieve and the Impact of Higher Splitting Probabilities Robert Granger  Joint work with Faruk Gölo§lu, Gary McGuire and Jens Zumbrägel

On the Function Field Sieve and the Impact of Higher Splitting Probabilities Robert Granger Joint work with Faruk Gölo§lu, Gary McGuire and Jens Zumbrägel

DocID: 1qJsF - View Document

Revisiting discrete logarithms in medium/small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6

Revisiting discrete logarithms in medium/small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6

DocID: 1qjra - View Document

Master’s thesis in Mathematics  The use of elliptic curves in cryptography by  Gijsbert van Vliet

Master’s thesis in Mathematics The use of elliptic curves in cryptography by Gijsbert van Vliet

DocID: 1pH9i - View Document

Public Key Cryptography Using Discrete Logarithms in Finite Fields: Algorithms, Efficient Implementation and Attacks  L. Maurits)

Public Key Cryptography Using Discrete Logarithms in Finite Fields: Algorithms, Efficient Implementation and Attacks L. Maurits)

DocID: 1obzi - View Document