Back to Results
First PageMeta Content
Finite fields / Computational hardness assumptions / Group theory / Elliptic curve cryptography / Logarithms / Elliptic curve / Integer factorization / Elliptic Curve DSA / Key size / Abstract algebra / Cryptography / Mathematics


Document Date: 2009-11-30 17:04:11


Open Document

File Size: 354,54 KB

Share Result on Facebook

Company

Hess / Suzuki / /

Country

United States / /

Currency

pence / /

IndustryTerm

reduction algorithm / rho algorithm / web servers / subexponential-time algorithms / proposed public-key cryptographic systems / index-calculus algorithms / subfield-base index-calculus algorithm / Baby-step giant-step algorithm / public-key cryptographic systems / cryptographic systems / number field sieve algorithm / subexponential-time algorithm / Naive exhaustive search / exhaustive search / electronic commerce / /

Organization

U.S. government / /

Person

Van Oorschot / Neal Koblitz / Victor Miller / /

Product

GS / /

Technology

cryptography / randomized algorithm / Pohlig-Hellman algorithm / subexponential-time algorithms / 2.2 Algorithms / subexponential-time algorithm / number field sieve algorithm / index-calculus algorithms / subfield-base index-calculus algorithm / DLP / Digital Signature / rho algorithm / reduction algorithm / cellular telephones / ElGamal encryption / Baby-step giant-step algorithm / /

SocialTag