Publication

Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields

Related publications (39)

Practical Cryptography in High Dimensional Tori

Robert Granger, Martijn Stam

At Crypto 2004, van Dijk and Woodruff introduced a new way of using the algebraic tori TnT_n in cryptography, and obtained an asymptotically optimal n/ϕ(n)n/\phi(n) savings in bandwidth and storage for a number of cryptographic applications. However, the compu ...
Springer Berlin Heidelberg2005

Function Field Sieve in Characteristic Three

Robert Granger

In this paper we investigate the efficiency of the function field sieve to compute discrete logarithms in the finite fields F3n\mathbb{F}_{3^n}. Motivated by attacks on identity based encryption systems using supersingular elliptic curves, we pay special at ...
Springer Berlin Heidelberg2004

Computing the performance of unitary space-time group codes from their character table

Mohammad Amin Shokrollahi

Multiple antennas can greatly increase the data rate and reliability of a wireless communication link in a fading environment. Their success, however, depends on the design of cedes that achieve these promises. It is well known that unitary matrices can be ...
2002

Selecting cryptographic key sizes

Arjen Lenstra

In this article we offer guidelines for the determination of key sizes for symmetric cryptosystems, RSA, and discrete logarithm-based cryptosystems both over finite fields and over groups of elliptic curves over prime fields. Our recommendations are based ...
Springer Verlag2001

The XTR public key system

Arjen Lenstra

This paper introduces the XTR public key system. XTR is based on a new method for representing elements of a subgroup of a multiplicative group of a finite field. Application of XTR in cryptographic protocols leads to substantial savings both in communicat ...
2000

Efficient identity based parameter selection for elliptic curve cryptosystems

Arjen Lenstra

A method is proposed that allows each individual party to an elliptic curve cryptosystem to quickly determine its own unique pair of finite field and Weierstrass equation, in such a way that the resulting pair provides adequate security. Although the choic ...
1999

Deciding properties of number fields without factoring

Mohammad Amin Shokrollahi

The polynomial time algorithm of Lenstra, Lenstra, and Lovász [15] for factoring integer polynomials and variants thereof have been widely used to show that various computational problems in number theory have polynomial time solutions. Among them is the p ...
1997

Optimal algorithms for multiplication in certain finite fields using elliptic curves

Mohammad Amin Shokrollahi

Using the results given in [D,. V. Chudnovsky and G. V Chudnovsky, Proc. Nat. Acad. Sci. USA, 84 (1987), pp. 1739-1743] and [W. C. Waterhouse, Ann. Sci. École Norm. Sup., 4 (1969), pp. 521–560], it is proven that the rank (= bilinear complexity of multipli ...
1992

Efficient randomized generation of optimal algorithms for multiplication in certain finite fields

Mohammad Amin Shokrollahi

Let Nmax(q)N_{max}(q) denote the maximum number of points of an elliptic curve over FqF_q . Given a prime power q=pfq=p^f and an integern satisfying 12q+1<nle(Nmax(q)2)/2\frac{1}{2}q+1 < n le (N_{max}(q)2)/2, we present an algorithm which on inputq andn produces an optimal bilinear ...
1992

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.