The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Public-Key Cryptography and Computational Number Theory
DOI: 10.1515/9783110881035.283
|View full text |Cite
|
Sign up to set email alerts
|

Square-root algorithms for the discrete logarithm problem (a survey)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
35
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(35 citation statements)
references
References 0 publications
0
35
0
Order By: Relevance
“…The attacker can then use Pollard's rho method or Pollard's kangaroo method to compute the discrete logarithm of this point, namely n. The main cost in either method is the cost of performing a huge number of additions of elliptic-curve points; both methods are almost perfectly parallelizable, with negligible communication costs. See [60], [52], [58], and [59].…”
Section: Generic Discrete Logarithms By the Rho And Kangaroo Methodsmentioning
confidence: 99%
“…The attacker can then use Pollard's rho method or Pollard's kangaroo method to compute the discrete logarithm of this point, namely n. The main cost in either method is the cost of performing a huge number of additions of elliptic-curve points; both methods are almost perfectly parallelizable, with negligible communication costs. See [60], [52], [58], and [59].…”
Section: Generic Discrete Logarithms By the Rho And Kangaroo Methodsmentioning
confidence: 99%
“…The number of successes (R ku :H(R ku ,B) = u) in these computations is a binomial random variable with parameters (2 l , 1/2 l ); hence these computations lead to a decomposed i-point with probability P rs = 1 − (1 − 1/2 l ) 2 l ≈ 1 − e −1 ≈ 0.63 > 1/2 for l sufficiently large. Pollard's rho algorithm [24,26,25] can be modified to take into account decomposed i-points detection, the resulting algorithm produces either a decomposed i-point or a discrete logarithm; this approach is expected to duplicate the efficiency of the rho algorithm.…”
Section: Attack 2 Hmqv Impersonation Ofâ Tobmentioning
confidence: 99%
“…The identity element in G is denoted1, Shank's method is deterministic, but requires a large storage; using the Pollard's Kangaroo method [24,25] …”
Section: Introductionmentioning
confidence: 99%
“…While the algorithms are of much interest in computational number theory and cryptography, there has been very little work on rigorous analyses. We refer the reader to [9] and other existing literature (e.g., [18,3]) for further cryptographic and number-theoretical motivation for the discrete logarithm problem.…”
Section: Introductionmentioning
confidence: 99%