Recent progress on the elliptic curve discrete logarithm problem

SD Galbraith, P Gaudry - Designs, Codes and Cryptography, 2016 - Springer
Recent progress on the elliptic curve discrete logarithm problem | SpringerLink Skip to main
content Advertisement SpringerLink Log in Menu Find a journal Publish with us Search Cart …

New algorithm for the discrete logarithm problem on elliptic curves

I Semaev - arXiv preprint arXiv:1504.01175, 2015 - arxiv.org
A new algorithms for computing discrete logarithms on elliptic curves defined over finite
fields is suggested. It is based on a new method to find zeroes of summation polynomials. In …

Quantum Advantage via Solving Multivariate Quadratics

P Briaud, R Ghosal, A Jain, P Lou, A Sahai - arXiv preprint arXiv …, 2024 - arxiv.org
In this work, we propose a new way to (non-interactively, verifiably) demonstrate Quantum
Advantage by solving the average-case $\mathsf {NP} $ search problem of finding a solution …

Rank analysis of cubic multivariate cryptosystems

J Baena, D Cabarcas, DE Escudero… - … , PQCrypto 2018, Fort …, 2018 - Springer
In this work we analyze the security of cubic cryptographic constructions with respect to rank
weakness. We detail how to extend the big field idea from quadratic to cubic, and show that …

[HTML][HTML] On the existence of homogeneous semi-regular sequences in F2 [X1,..., Xn]/(X12,..., Xn2)

TJ Hodges, SD Molina, J Schlather - Journal of Algebra, 2017 - Elsevier
Semi-regular sequences over F 2 are sequences of homogeneous elements of the algebra
B (n)= F 2 [X 1,..., X n]/(X 1 2,..., X n 2), which have as few relations between them as …

Formal power series on algebraic cryptanalysis

S Nakamura - arXiv preprint arXiv:2007.14729, 2020 - arxiv.org
In cryptography, by attacks reducing a cryptosystem to the problem that solves the system of
polynomial equations, several cryptosystems have been broken. The efficiency of an …

On selection of samples in algebraic attacks and a new technique to find hidden low degree equations

P Sušil, P Sepehrdad, S Vaudenay… - International Journal of …, 2016 - Springer
The best way of selecting samples in algebraic attacks against block ciphers is not well
explored and understood. We introduce a simple strategy for selecting the plaintexts and …

On generalized first fall degree assumptions

YJ Huang, C Petit, N Shinohara, T Takagi - Cryptology ePrint Archive, 2015 - eprint.iacr.org
The first fall degree assumption provides a complexity approximation of Gröbner basis
algorithms when the degree of regularity of a polynomial system cannot be precisely …

On the security of biquadratic C public-key cryptosystems and its generalizations

P Felke - Cryptography and Communications, 2019 - Springer
Public key cryptosystems based on multivariate polynomials have been studied since the
eighties. One of them, called C∗, was introduced in 1988 by Imai and Matsumoto, and …

[PDF][PDF] Bounding HFE with SRA

C Petit - 2014 - people.maths.ox.ac.uk
The Hidden Field Equation cryptosystem (HFE) is a public key encryption scheme whose
security relies on the hardness of solving a system of polynomial equations over the finite …