Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 11 von 793
Lecture notes in computer science, 1999, p.190-200
1999
Volltextzugriff (PDF)

Details

Autor(en) / Beteiligte
Titel
Faster Attacks on Elliptic Curve Cryptosystems
Ist Teil von
  • Lecture notes in computer science, 1999, p.190-200
Ort / Verlag
Berlin, Heidelberg: Springer Berlin Heidelberg
Erscheinungsjahr
1999
Quelle
Alma/SFX Local Collection
Beschreibungen/Notizen
  • The previously best attack known on elliptic curve cryptosystems used in practice was the parallel collision search based on Pollard ’s ρ-method. The complexity of this attack is the square root of the prime order of the generating point used. For arbitrary curves, typically defined over GF(p) or GF(2m), the attack time can be reduced by a factor or √2, a small improvement. For subfield curves, those defined over GF(2ed) with coefficients defining the curve restricted to GF(2e), the attack time can be reduced by a factor of √2d. In particular for curves over GF(2m) with coefficients in GF(2), called anomalous binary curves or Koblitz curves, the attack time can be reduced by a factor of √2m. These curves have structure which allows faster cryptosystem computations. Unfortunately, this structure also helps the attacker. In an example, the time required to compute an elliptic curve logarithm on an anomalous binary curve over GF(2163) is reduced from 281 to 277 elliptic curve operations.
Sprache
Englisch
Identifikatoren
ISBN: 9783540658948, 3540658947
ISSN: 0302-9743
eISSN: 1611-3349
DOI: 10.1007/3-540-48892-8_15
Titel-ID: cdi_pascalfrancis_primary_1578463

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX