2018
DOI: 10.48550/arxiv.1804.07904
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Endomorphism rings of reductions of Drinfeld modules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…From this, Hsia and Yu [17] and Garai and Papikian [9] sketched algorithms that compute A. When φ p is computed in a direct manner, they take Θ(n 2 ) additions, multiplications and Frobenius applications in L, so Ω(n 3 ) bit operations.…”
Section: The Case L = Kmentioning
confidence: 99%
See 1 more Smart Citation
“…From this, Hsia and Yu [17] and Garai and Papikian [9] sketched algorithms that compute A. When φ p is computed in a direct manner, they take Θ(n 2 ) additions, multiplications and Frobenius applications in L, so Ω(n 3 ) bit operations.…”
Section: The Case L = Kmentioning
confidence: 99%
“…Based in part on these similarities, Drinfeld modules have recently started being considered under the algorithmic viewpoint. For instance, they have been proved to be unsuitable for usual forms of public key cryptography [34]; they have also been used to design several polynomial factorization algorithms [7,29,30,38]; recent work by Garai and Papikian discusses the computation of their endomorphism rings [9]. Our goal is to study in detail the complexity of computing the characteristic polynomial of a rank two Drinfeld module over a finite field.…”
Section: Introductionmentioning
confidence: 99%