dc.contributor.author |
Galbraith, Steven |
en |
dc.contributor.author |
Hess, F |
en |
dc.contributor.author |
Smart, NP |
en |
dc.contributor.editor |
Knudsen, LR |
en |
dc.coverage.spatial |
Amsterdam, Netherlands |
en |
dc.date.accessioned |
2015-08-11T23:38:45Z |
en |
dc.date.issued |
2002 |
en |
dc.identifier.citation |
Lecture Notes in Computer Science: Advances in Cryptology, 2002, 2332 pp. 29 - 44 |
en |
dc.identifier.isbn |
3-540-43553-0 |
en |
dc.identifier.isbn |
978-3-540-43553-2 |
en |
dc.identifier.issn |
0302-9743 |
en |
dc.identifier.uri |
http://hdl.handle.net/2292/26672 |
en |
dc.description.abstract |
In this paper we extend the Weil descent attack due to Gaudry, Hess and Smart (GHS) to a much larger class of elliptic curves. This extended attack applies to fields of composite degree over F 2. The principle behind the extended attack is to use isogenies to find an elliptic curve for which the GHS attack is effective. The discrete logarithm problem on the target curve can be transformed into a discrete logarithm problem on the isogenous curve. A further contribution of the paper is to give an improvement to an algorithm of Galbraith for constructing isogenies between elliptic curves, and this is of independent interest in elliptic curve cryptography. We show that a larger proportion than previously thought of elliptic curves over F 2155 should be considered weak. |
en |
dc.relation.ispartof |
Advances in Cryptology - EUROCRYPT 2002 |
en |
dc.relation.ispartofseries |
Lecture Notes in Computer Science: Advances in Cryptology |
en |
dc.rights |
Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. Details obtained from http://www.springer.com/gp/open-access/authors-rights/self-archiving-policy/2124
http://www.sherpa.ac.uk/romeo/issn/0302-9743/ |
en |
dc.rights.uri |
https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm |
en |
dc.title |
Extending the GHS Weil Descent Attack |
en |
dc.type |
Conference Item |
en |
dc.identifier.doi |
10.1007/3-540-46035-7_3 |
en |
pubs.begin-page |
29 |
en |
pubs.volume |
2332 |
en |
dc.description.version |
AM - Accepted Manuscript |
en |
pubs.end-page |
44 |
en |
pubs.finish-date |
2002-05-02 |
en |
pubs.start-date |
2002-04-28 |
en |
dc.rights.accessrights |
http://purl.org/eprint/accessRights/OpenAccess |
en |
pubs.subtype |
Proceedings |
en |
pubs.elements-id |
489103 |
en |
pubs.org-id |
Science |
en |
pubs.org-id |
Mathematics |
en |
pubs.record-created-at-source-date |
2015-06-29 |
en |