Cryptographic implications of Hess' generalized GHS attack
Abstract A finite field K is said to be weak for elliptic curve cryptography if all instances of the discrete logarithm problem for all elliptic curves over K can be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. By considering the GHS Weil...
Ausführliche Beschreibung
Autor*in: |
Menezes, Alfred [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2005 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer-Verlag Berlin Heidelberg 2005 |
---|
Übergeordnetes Werk: |
Enthalten in: Applicable algebra in engineering, communication and computing - Springer-Verlag, 1990, 16(2005), 6 vom: 17. Nov., Seite 439-460 |
---|---|
Übergeordnetes Werk: |
volume:16 ; year:2005 ; number:6 ; day:17 ; month:11 ; pages:439-460 |
Links: |
---|
DOI / URN: |
10.1007/s00200-005-0186-8 |
---|
Katalog-ID: |
OLC2075497222 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2075497222 | ||
003 | DE-627 | ||
005 | 20230506014414.0 | ||
007 | tu | ||
008 | 200820s2005 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s00200-005-0186-8 |2 doi | |
035 | |a (DE-627)OLC2075497222 | ||
035 | |a (DE-He213)s00200-005-0186-8-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 510 |a 620 |a 004 |q VZ |
082 | 0 | 4 | |a 510 |a 004 |a 600 |q VZ |
084 | |a 11 |2 ssgn | ||
100 | 1 | |a Menezes, Alfred |e verfasserin |4 aut | |
245 | 1 | 0 | |a Cryptographic implications of Hess' generalized GHS attack |
264 | 1 | |c 2005 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Springer-Verlag Berlin Heidelberg 2005 | ||
520 | |a Abstract A finite field K is said to be weak for elliptic curve cryptography if all instances of the discrete logarithm problem for all elliptic curves over K can be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. By considering the GHS Weil descent attack, it was previously shown that characteristic two finite fields are weak. In this paper, we examine characteristic two finite fields for weakness under Hess' generalization of the GHS attack. We show that the fields are potentially partially weak in the sense that any instance of the discrete logarithm problem for half of all elliptic curves over , namely those curves E for which is divisible by 4, can likely be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. We also show that the fields are partially weak, that the fields are potentially weak, and that the fields are potentially partially weak. Finally, we argue that the other fields where N is not divisible by 3, 5, 6, 7 or 8, are not weak under Hess' generalized GHS attack. | ||
650 | 4 | |a Elliptic curve cryptography | |
650 | 4 | |a Weil descent | |
650 | 4 | |a Isogenies | |
700 | 1 | |a Teske, Edlyn |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Applicable algebra in engineering, communication and computing |d Springer-Verlag, 1990 |g 16(2005), 6 vom: 17. Nov., Seite 439-460 |w (DE-627)130915807 |w (DE-600)1051032-1 |w (DE-576)025004964 |x 0938-1279 |7 nnns |
773 | 1 | 8 | |g volume:16 |g year:2005 |g number:6 |g day:17 |g month:11 |g pages:439-460 |
856 | 4 | 1 | |u https://doi.org/10.1007/s00200-005-0186-8 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-TEC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a SSG-OPC-MAT | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_100 | ||
912 | |a GBV_ILN_267 | ||
912 | |a GBV_ILN_2002 | ||
912 | |a GBV_ILN_2006 | ||
912 | |a GBV_ILN_2012 | ||
912 | |a GBV_ILN_2018 | ||
912 | |a GBV_ILN_2088 | ||
912 | |a GBV_ILN_4116 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4247 | ||
912 | |a GBV_ILN_4266 | ||
912 | |a GBV_ILN_4277 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4318 | ||
912 | |a GBV_ILN_4324 | ||
951 | |a AR | ||
952 | |d 16 |j 2005 |e 6 |b 17 |c 11 |h 439-460 |
author_variant |
a m am e t et |
---|---|
matchkey_str |
article:09381279:2005----::rporpiipiainohsgnr |
hierarchy_sort_str |
2005 |
publishDate |
2005 |
allfields |
10.1007/s00200-005-0186-8 doi (DE-627)OLC2075497222 (DE-He213)s00200-005-0186-8-p DE-627 ger DE-627 rakwb eng 510 620 004 VZ 510 004 600 VZ 11 ssgn Menezes, Alfred verfasserin aut Cryptographic implications of Hess' generalized GHS attack 2005 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag Berlin Heidelberg 2005 Abstract A finite field K is said to be weak for elliptic curve cryptography if all instances of the discrete logarithm problem for all elliptic curves over K can be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. By considering the GHS Weil descent attack, it was previously shown that characteristic two finite fields are weak. In this paper, we examine characteristic two finite fields for weakness under Hess' generalization of the GHS attack. We show that the fields are potentially partially weak in the sense that any instance of the discrete logarithm problem for half of all elliptic curves over , namely those curves E for which is divisible by 4, can likely be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. We also show that the fields are partially weak, that the fields are potentially weak, and that the fields are potentially partially weak. Finally, we argue that the other fields where N is not divisible by 3, 5, 6, 7 or 8, are not weak under Hess' generalized GHS attack. Elliptic curve cryptography Weil descent Isogenies Teske, Edlyn aut Enthalten in Applicable algebra in engineering, communication and computing Springer-Verlag, 1990 16(2005), 6 vom: 17. Nov., Seite 439-460 (DE-627)130915807 (DE-600)1051032-1 (DE-576)025004964 0938-1279 nnns volume:16 year:2005 number:6 day:17 month:11 pages:439-460 https://doi.org/10.1007/s00200-005-0186-8 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT SSG-OPC-MAT GBV_ILN_11 GBV_ILN_40 GBV_ILN_62 GBV_ILN_70 GBV_ILN_100 GBV_ILN_267 GBV_ILN_2002 GBV_ILN_2006 GBV_ILN_2012 GBV_ILN_2018 GBV_ILN_2088 GBV_ILN_4116 GBV_ILN_4126 GBV_ILN_4247 GBV_ILN_4266 GBV_ILN_4277 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4318 GBV_ILN_4324 AR 16 2005 6 17 11 439-460 |
spelling |
10.1007/s00200-005-0186-8 doi (DE-627)OLC2075497222 (DE-He213)s00200-005-0186-8-p DE-627 ger DE-627 rakwb eng 510 620 004 VZ 510 004 600 VZ 11 ssgn Menezes, Alfred verfasserin aut Cryptographic implications of Hess' generalized GHS attack 2005 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag Berlin Heidelberg 2005 Abstract A finite field K is said to be weak for elliptic curve cryptography if all instances of the discrete logarithm problem for all elliptic curves over K can be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. By considering the GHS Weil descent attack, it was previously shown that characteristic two finite fields are weak. In this paper, we examine characteristic two finite fields for weakness under Hess' generalization of the GHS attack. We show that the fields are potentially partially weak in the sense that any instance of the discrete logarithm problem for half of all elliptic curves over , namely those curves E for which is divisible by 4, can likely be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. We also show that the fields are partially weak, that the fields are potentially weak, and that the fields are potentially partially weak. Finally, we argue that the other fields where N is not divisible by 3, 5, 6, 7 or 8, are not weak under Hess' generalized GHS attack. Elliptic curve cryptography Weil descent Isogenies Teske, Edlyn aut Enthalten in Applicable algebra in engineering, communication and computing Springer-Verlag, 1990 16(2005), 6 vom: 17. Nov., Seite 439-460 (DE-627)130915807 (DE-600)1051032-1 (DE-576)025004964 0938-1279 nnns volume:16 year:2005 number:6 day:17 month:11 pages:439-460 https://doi.org/10.1007/s00200-005-0186-8 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT SSG-OPC-MAT GBV_ILN_11 GBV_ILN_40 GBV_ILN_62 GBV_ILN_70 GBV_ILN_100 GBV_ILN_267 GBV_ILN_2002 GBV_ILN_2006 GBV_ILN_2012 GBV_ILN_2018 GBV_ILN_2088 GBV_ILN_4116 GBV_ILN_4126 GBV_ILN_4247 GBV_ILN_4266 GBV_ILN_4277 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4318 GBV_ILN_4324 AR 16 2005 6 17 11 439-460 |
allfields_unstemmed |
10.1007/s00200-005-0186-8 doi (DE-627)OLC2075497222 (DE-He213)s00200-005-0186-8-p DE-627 ger DE-627 rakwb eng 510 620 004 VZ 510 004 600 VZ 11 ssgn Menezes, Alfred verfasserin aut Cryptographic implications of Hess' generalized GHS attack 2005 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag Berlin Heidelberg 2005 Abstract A finite field K is said to be weak for elliptic curve cryptography if all instances of the discrete logarithm problem for all elliptic curves over K can be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. By considering the GHS Weil descent attack, it was previously shown that characteristic two finite fields are weak. In this paper, we examine characteristic two finite fields for weakness under Hess' generalization of the GHS attack. We show that the fields are potentially partially weak in the sense that any instance of the discrete logarithm problem for half of all elliptic curves over , namely those curves E for which is divisible by 4, can likely be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. We also show that the fields are partially weak, that the fields are potentially weak, and that the fields are potentially partially weak. Finally, we argue that the other fields where N is not divisible by 3, 5, 6, 7 or 8, are not weak under Hess' generalized GHS attack. Elliptic curve cryptography Weil descent Isogenies Teske, Edlyn aut Enthalten in Applicable algebra in engineering, communication and computing Springer-Verlag, 1990 16(2005), 6 vom: 17. Nov., Seite 439-460 (DE-627)130915807 (DE-600)1051032-1 (DE-576)025004964 0938-1279 nnns volume:16 year:2005 number:6 day:17 month:11 pages:439-460 https://doi.org/10.1007/s00200-005-0186-8 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT SSG-OPC-MAT GBV_ILN_11 GBV_ILN_40 GBV_ILN_62 GBV_ILN_70 GBV_ILN_100 GBV_ILN_267 GBV_ILN_2002 GBV_ILN_2006 GBV_ILN_2012 GBV_ILN_2018 GBV_ILN_2088 GBV_ILN_4116 GBV_ILN_4126 GBV_ILN_4247 GBV_ILN_4266 GBV_ILN_4277 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4318 GBV_ILN_4324 AR 16 2005 6 17 11 439-460 |
allfieldsGer |
10.1007/s00200-005-0186-8 doi (DE-627)OLC2075497222 (DE-He213)s00200-005-0186-8-p DE-627 ger DE-627 rakwb eng 510 620 004 VZ 510 004 600 VZ 11 ssgn Menezes, Alfred verfasserin aut Cryptographic implications of Hess' generalized GHS attack 2005 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag Berlin Heidelberg 2005 Abstract A finite field K is said to be weak for elliptic curve cryptography if all instances of the discrete logarithm problem for all elliptic curves over K can be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. By considering the GHS Weil descent attack, it was previously shown that characteristic two finite fields are weak. In this paper, we examine characteristic two finite fields for weakness under Hess' generalization of the GHS attack. We show that the fields are potentially partially weak in the sense that any instance of the discrete logarithm problem for half of all elliptic curves over , namely those curves E for which is divisible by 4, can likely be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. We also show that the fields are partially weak, that the fields are potentially weak, and that the fields are potentially partially weak. Finally, we argue that the other fields where N is not divisible by 3, 5, 6, 7 or 8, are not weak under Hess' generalized GHS attack. Elliptic curve cryptography Weil descent Isogenies Teske, Edlyn aut Enthalten in Applicable algebra in engineering, communication and computing Springer-Verlag, 1990 16(2005), 6 vom: 17. Nov., Seite 439-460 (DE-627)130915807 (DE-600)1051032-1 (DE-576)025004964 0938-1279 nnns volume:16 year:2005 number:6 day:17 month:11 pages:439-460 https://doi.org/10.1007/s00200-005-0186-8 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT SSG-OPC-MAT GBV_ILN_11 GBV_ILN_40 GBV_ILN_62 GBV_ILN_70 GBV_ILN_100 GBV_ILN_267 GBV_ILN_2002 GBV_ILN_2006 GBV_ILN_2012 GBV_ILN_2018 GBV_ILN_2088 GBV_ILN_4116 GBV_ILN_4126 GBV_ILN_4247 GBV_ILN_4266 GBV_ILN_4277 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4318 GBV_ILN_4324 AR 16 2005 6 17 11 439-460 |
allfieldsSound |
10.1007/s00200-005-0186-8 doi (DE-627)OLC2075497222 (DE-He213)s00200-005-0186-8-p DE-627 ger DE-627 rakwb eng 510 620 004 VZ 510 004 600 VZ 11 ssgn Menezes, Alfred verfasserin aut Cryptographic implications of Hess' generalized GHS attack 2005 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer-Verlag Berlin Heidelberg 2005 Abstract A finite field K is said to be weak for elliptic curve cryptography if all instances of the discrete logarithm problem for all elliptic curves over K can be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. By considering the GHS Weil descent attack, it was previously shown that characteristic two finite fields are weak. In this paper, we examine characteristic two finite fields for weakness under Hess' generalization of the GHS attack. We show that the fields are potentially partially weak in the sense that any instance of the discrete logarithm problem for half of all elliptic curves over , namely those curves E for which is divisible by 4, can likely be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. We also show that the fields are partially weak, that the fields are potentially weak, and that the fields are potentially partially weak. Finally, we argue that the other fields where N is not divisible by 3, 5, 6, 7 or 8, are not weak under Hess' generalized GHS attack. Elliptic curve cryptography Weil descent Isogenies Teske, Edlyn aut Enthalten in Applicable algebra in engineering, communication and computing Springer-Verlag, 1990 16(2005), 6 vom: 17. Nov., Seite 439-460 (DE-627)130915807 (DE-600)1051032-1 (DE-576)025004964 0938-1279 nnns volume:16 year:2005 number:6 day:17 month:11 pages:439-460 https://doi.org/10.1007/s00200-005-0186-8 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT SSG-OPC-MAT GBV_ILN_11 GBV_ILN_40 GBV_ILN_62 GBV_ILN_70 GBV_ILN_100 GBV_ILN_267 GBV_ILN_2002 GBV_ILN_2006 GBV_ILN_2012 GBV_ILN_2018 GBV_ILN_2088 GBV_ILN_4116 GBV_ILN_4126 GBV_ILN_4247 GBV_ILN_4266 GBV_ILN_4277 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4318 GBV_ILN_4324 AR 16 2005 6 17 11 439-460 |
language |
English |
source |
Enthalten in Applicable algebra in engineering, communication and computing 16(2005), 6 vom: 17. Nov., Seite 439-460 volume:16 year:2005 number:6 day:17 month:11 pages:439-460 |
sourceStr |
Enthalten in Applicable algebra in engineering, communication and computing 16(2005), 6 vom: 17. Nov., Seite 439-460 volume:16 year:2005 number:6 day:17 month:11 pages:439-460 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Elliptic curve cryptography Weil descent Isogenies |
dewey-raw |
510 |
isfreeaccess_bool |
false |
container_title |
Applicable algebra in engineering, communication and computing |
authorswithroles_txt_mv |
Menezes, Alfred @@aut@@ Teske, Edlyn @@aut@@ |
publishDateDaySort_date |
2005-11-17T00:00:00Z |
hierarchy_top_id |
130915807 |
dewey-sort |
3510 |
id |
OLC2075497222 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2075497222</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230506014414.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200820s2005 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s00200-005-0186-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2075497222</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s00200-005-0186-8-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">510</subfield><subfield code="a">620</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">510</subfield><subfield code="a">004</subfield><subfield code="a">600</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">11</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Menezes, Alfred</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptographic implications of Hess' generalized GHS attack</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2005</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer-Verlag Berlin Heidelberg 2005</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract A finite field K is said to be weak for elliptic curve cryptography if all instances of the discrete logarithm problem for all elliptic curves over K can be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. By considering the GHS Weil descent attack, it was previously shown that characteristic two finite fields are weak. In this paper, we examine characteristic two finite fields for weakness under Hess' generalization of the GHS attack. We show that the fields are potentially partially weak in the sense that any instance of the discrete logarithm problem for half of all elliptic curves over , namely those curves E for which is divisible by 4, can likely be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. We also show that the fields are partially weak, that the fields are potentially weak, and that the fields are potentially partially weak. Finally, we argue that the other fields where N is not divisible by 3, 5, 6, 7 or 8, are not weak under Hess' generalized GHS attack.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Elliptic curve cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Weil descent</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Isogenies</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Teske, Edlyn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Applicable algebra in engineering, communication and computing</subfield><subfield code="d">Springer-Verlag, 1990</subfield><subfield code="g">16(2005), 6 vom: 17. Nov., Seite 439-460</subfield><subfield code="w">(DE-627)130915807</subfield><subfield code="w">(DE-600)1051032-1</subfield><subfield code="w">(DE-576)025004964</subfield><subfield code="x">0938-1279</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:16</subfield><subfield code="g">year:2005</subfield><subfield code="g">number:6</subfield><subfield code="g">day:17</subfield><subfield code="g">month:11</subfield><subfield code="g">pages:439-460</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s00200-005-0186-8</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-TEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OPC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_267</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2002</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2088</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4116</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4247</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4266</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4277</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4318</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">16</subfield><subfield code="j">2005</subfield><subfield code="e">6</subfield><subfield code="b">17</subfield><subfield code="c">11</subfield><subfield code="h">439-460</subfield></datafield></record></collection>
|
author |
Menezes, Alfred |
spellingShingle |
Menezes, Alfred ddc 510 ssgn 11 misc Elliptic curve cryptography misc Weil descent misc Isogenies Cryptographic implications of Hess' generalized GHS attack |
authorStr |
Menezes, Alfred |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)130915807 |
format |
Article |
dewey-ones |
510 - Mathematics 620 - Engineering & allied operations 004 - Data processing & computer science 600 - Technology |
delete_txt_mv |
keep |
author_role |
aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
0938-1279 |
topic_title |
510 620 004 VZ 510 004 600 VZ 11 ssgn Cryptographic implications of Hess' generalized GHS attack Elliptic curve cryptography Weil descent Isogenies |
topic |
ddc 510 ssgn 11 misc Elliptic curve cryptography misc Weil descent misc Isogenies |
topic_unstemmed |
ddc 510 ssgn 11 misc Elliptic curve cryptography misc Weil descent misc Isogenies |
topic_browse |
ddc 510 ssgn 11 misc Elliptic curve cryptography misc Weil descent misc Isogenies |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Applicable algebra in engineering, communication and computing |
hierarchy_parent_id |
130915807 |
dewey-tens |
510 - Mathematics 620 - Engineering 000 - Computer science, knowledge & systems 600 - Technology |
hierarchy_top_title |
Applicable algebra in engineering, communication and computing |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)130915807 (DE-600)1051032-1 (DE-576)025004964 |
title |
Cryptographic implications of Hess' generalized GHS attack |
ctrlnum |
(DE-627)OLC2075497222 (DE-He213)s00200-005-0186-8-p |
title_full |
Cryptographic implications of Hess' generalized GHS attack |
author_sort |
Menezes, Alfred |
journal |
Applicable algebra in engineering, communication and computing |
journalStr |
Applicable algebra in engineering, communication and computing |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
500 - Science 600 - Technology 000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2005 |
contenttype_str_mv |
txt |
container_start_page |
439 |
author_browse |
Menezes, Alfred Teske, Edlyn |
container_volume |
16 |
class |
510 620 004 VZ 510 004 600 VZ 11 ssgn |
format_se |
Aufsätze |
author-letter |
Menezes, Alfred |
doi_str_mv |
10.1007/s00200-005-0186-8 |
dewey-full |
510 620 004 600 |
title_sort |
cryptographic implications of hess' generalized ghs attack |
title_auth |
Cryptographic implications of Hess' generalized GHS attack |
abstract |
Abstract A finite field K is said to be weak for elliptic curve cryptography if all instances of the discrete logarithm problem for all elliptic curves over K can be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. By considering the GHS Weil descent attack, it was previously shown that characteristic two finite fields are weak. In this paper, we examine characteristic two finite fields for weakness under Hess' generalization of the GHS attack. We show that the fields are potentially partially weak in the sense that any instance of the discrete logarithm problem for half of all elliptic curves over , namely those curves E for which is divisible by 4, can likely be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. We also show that the fields are partially weak, that the fields are potentially weak, and that the fields are potentially partially weak. Finally, we argue that the other fields where N is not divisible by 3, 5, 6, 7 or 8, are not weak under Hess' generalized GHS attack. © Springer-Verlag Berlin Heidelberg 2005 |
abstractGer |
Abstract A finite field K is said to be weak for elliptic curve cryptography if all instances of the discrete logarithm problem for all elliptic curves over K can be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. By considering the GHS Weil descent attack, it was previously shown that characteristic two finite fields are weak. In this paper, we examine characteristic two finite fields for weakness under Hess' generalization of the GHS attack. We show that the fields are potentially partially weak in the sense that any instance of the discrete logarithm problem for half of all elliptic curves over , namely those curves E for which is divisible by 4, can likely be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. We also show that the fields are partially weak, that the fields are potentially weak, and that the fields are potentially partially weak. Finally, we argue that the other fields where N is not divisible by 3, 5, 6, 7 or 8, are not weak under Hess' generalized GHS attack. © Springer-Verlag Berlin Heidelberg 2005 |
abstract_unstemmed |
Abstract A finite field K is said to be weak for elliptic curve cryptography if all instances of the discrete logarithm problem for all elliptic curves over K can be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. By considering the GHS Weil descent attack, it was previously shown that characteristic two finite fields are weak. In this paper, we examine characteristic two finite fields for weakness under Hess' generalization of the GHS attack. We show that the fields are potentially partially weak in the sense that any instance of the discrete logarithm problem for half of all elliptic curves over , namely those curves E for which is divisible by 4, can likely be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. We also show that the fields are partially weak, that the fields are potentially weak, and that the fields are potentially partially weak. Finally, we argue that the other fields where N is not divisible by 3, 5, 6, 7 or 8, are not weak under Hess' generalized GHS attack. © Springer-Verlag Berlin Heidelberg 2005 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MAT SSG-OPC-MAT GBV_ILN_11 GBV_ILN_40 GBV_ILN_62 GBV_ILN_70 GBV_ILN_100 GBV_ILN_267 GBV_ILN_2002 GBV_ILN_2006 GBV_ILN_2012 GBV_ILN_2018 GBV_ILN_2088 GBV_ILN_4116 GBV_ILN_4126 GBV_ILN_4247 GBV_ILN_4266 GBV_ILN_4277 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4318 GBV_ILN_4324 |
container_issue |
6 |
title_short |
Cryptographic implications of Hess' generalized GHS attack |
url |
https://doi.org/10.1007/s00200-005-0186-8 |
remote_bool |
false |
author2 |
Teske, Edlyn |
author2Str |
Teske, Edlyn |
ppnlink |
130915807 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s00200-005-0186-8 |
up_date |
2024-07-04T01:29:43.061Z |
_version_ |
1803610051640819712 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2075497222</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230506014414.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200820s2005 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s00200-005-0186-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2075497222</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s00200-005-0186-8-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">510</subfield><subfield code="a">620</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">510</subfield><subfield code="a">004</subfield><subfield code="a">600</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">11</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Menezes, Alfred</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptographic implications of Hess' generalized GHS attack</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2005</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer-Verlag Berlin Heidelberg 2005</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract A finite field K is said to be weak for elliptic curve cryptography if all instances of the discrete logarithm problem for all elliptic curves over K can be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. By considering the GHS Weil descent attack, it was previously shown that characteristic two finite fields are weak. In this paper, we examine characteristic two finite fields for weakness under Hess' generalization of the GHS attack. We show that the fields are potentially partially weak in the sense that any instance of the discrete logarithm problem for half of all elliptic curves over , namely those curves E for which is divisible by 4, can likely be solved in significantly less time than it takes Pollard's rho method to solve the hardest instances. We also show that the fields are partially weak, that the fields are potentially weak, and that the fields are potentially partially weak. Finally, we argue that the other fields where N is not divisible by 3, 5, 6, 7 or 8, are not weak under Hess' generalized GHS attack.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Elliptic curve cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Weil descent</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Isogenies</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Teske, Edlyn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Applicable algebra in engineering, communication and computing</subfield><subfield code="d">Springer-Verlag, 1990</subfield><subfield code="g">16(2005), 6 vom: 17. Nov., Seite 439-460</subfield><subfield code="w">(DE-627)130915807</subfield><subfield code="w">(DE-600)1051032-1</subfield><subfield code="w">(DE-576)025004964</subfield><subfield code="x">0938-1279</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:16</subfield><subfield code="g">year:2005</subfield><subfield code="g">number:6</subfield><subfield code="g">day:17</subfield><subfield code="g">month:11</subfield><subfield code="g">pages:439-460</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s00200-005-0186-8</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-TEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OPC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_267</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2002</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2088</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4116</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4247</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4266</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4277</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4318</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">16</subfield><subfield code="j">2005</subfield><subfield code="e">6</subfield><subfield code="b">17</subfield><subfield code="c">11</subfield><subfield code="h">439-460</subfield></datafield></record></collection>
|
score |
7.400222 |