Keyword : discrete logarithm problem


Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3n)
Naoyuki SHINOHARA Takeshi SHIMOYAMA Takuya HAYASHI Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 236-244
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Foundations
Keyword: 
pairing-based cryptosystemsdiscrete logarithm problemfinite fieldkey length
 Summary | Full Text:PDF

On Discrete Logarithm Based Additively Homomorphic Encryption
Jae Hong SEO Keita EMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/11/01
Vol. E96-A  No. 11 ; pp. 2286-2289
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
additive homomorphic encryptiondiscrete logarithm problemElGamal encryption
 Summary | Full Text:PDF

Solving a 676-Bit Discrete Logarithm Problem in GF(36n)
Takuya HAYASHI Naoyuki SHINOHARA Lihua WANG Shin'ichiro MATSUO Masaaki SHIRASE Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 204-212
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Mathematics
Keyword: 
function field sievediscrete logarithm problempairing-based cryptosystems
 Summary | Full Text:PDF

More Efficient Threshold Signature Scheme in Gap Diffie-Hellman Group
DaeHun NYANG Akihiro YAMAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/07/01
Vol. E92-A  No. 7 ; pp. 1720-1723
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
bilinear pairingdigital signaturethreshold signaturediscrete logarithm problem
 Summary | Full Text:PDF

Collusion-Attack Free ID-Based Non-interactive Key Sharing
Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/06/01
Vol. E89-A  No. 6 ; pp. 1820-1824
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
identity-informationnon-interactive key sharingidentity-based cryptosystemdiscrete logarithm problemfactoring problemcollusion-attack free
 Summary | Full Text:PDF | Errata(Uploaded on September 1,2006)

Security Analysis of the SPA-Resistant Fractional Width Method
Katsuyuki OKEYA Tsuyoshi TAKAGI Camille VUILLAUME 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 161-168
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Elliptic Curve Cryptography
Keyword: 
elliptic curve cryptosystemssmartcardfractional windowside channel attacksflexibilitydiscrete logarithm problem
 Summary | Full Text:PDF

The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem
Chisato KONOMA Masahiro MAMBO Hiroki SHIZUYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 81-88
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
discrete logarithm problemdouble discrete logarithm problemsquare root of discrete logarithm probleme-th root of discrete logarithm problem
 Summary | Full Text:PDF

Complexity Analysis of the Cryptographic Primitive Problems through Square-Root Exponent
Chisato KONOMA Masahiro MAMBO Hiroki SHIZUYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1083-1091
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
square-root exponentdiscrete logarithm problemfactoring problemDiffie-Hellman problemcomputing problemdecision problem
 Summary | Full Text:PDF

New Multiplicative Knapsack-Type Public Key Cryptosystems
Shinya KIUCHI Yasuyuki MURAKAMI Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 188-196
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Morii-Kasahara cryptosystemSchalkwijk algorithmhigh ratefast encryptiondiscrete logarithm problem
 Summary | Full Text:PDF

A Study on the Generalized Key Agreement and Password Authentication Protocol
Taekyoung KWON Jooseok SONG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2000/09/25
Vol. E83-B  No. 9 ; pp. 2044-2050
Type of Manuscript:  PAPER
Category: Fundamental Theories
Keyword: 
securitykey agreementpassword authenticationdiscrete logarithm problem
 Summary | Full Text:PDF

Using Cab Curves in the Function Field Sieve
Ryutaroh MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/03/25
Vol. E82-A  No. 3 ; pp. 551-552
Type of Manuscript:  LETTER
Category: Image Theory
Keyword: 
discrete logarithm problemfunction field sieveCab curve
 Summary | Full Text:PDF

Conference Key Supervision in a Level-Based Hierarchy
Ching-Te WANG Chin-Chen CHANG Chu-Hsing LIN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/10/25
Vol. E81-A  No. 10 ; pp. 2219-2227
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
secret-key agreementconference key distribution systemdiscrete logarithm problem level-based hierarchy
 Summary | Full Text:PDF