An Extension of GHS Weil Descent Attack(Public Key Cryptography)(<Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
The Weil descent attack, suggested by Frey, has been implemented by Gaudry, Hess and Smart (the so-called GHS attack) on elliptic curves over finite fields of characteristic two and with composite extension degrees. Recently, Diem presented a general treatment of the GHS attack to hyperelliptic curves over finite fields of arbitrary odd characteristics. This paper shows that Diem's approach can be extended to curves of which the function fields are cyclic Galois extensions. In particular, we show the existence of GHS Weil restriction, triviality of the kernel of GHS conorm-norm homomorphism, and lower/upper bounds of genera of the resulting curves.
- 社団法人電子情報通信学会の論文
- 2005-01-01
著者
-
Chao Jinhui
Department Of Information And System Engineering Chuo University
-
Chao Jinhui
Department Of Electrical And Electronic Engineering Faculty Of Science And Engineering Chuo Universi
-
SHIMURA Mahoro
Chuo Univ. 21st Century Center of Excellence Program
-
Iijima Tsutomu
Department Of Information And System Engineering Chuo University
-
Tsujii Shigeo
Research And Development Initiative At Chuo University
-
Shimura Mahoro
Chuo University 21st Century Center Of Excellence Program
関連論文
- Anonymous Query Language Retrieval (ライフインテリジェンスとオフィス情報システム)
- Anonymous Query Language Retrieval (情報セキュリティ)
- Key-Generation Algorithms for Linear Piece In Hand Matrix Method
- Dually-Perturbed Matsumoto-Imai Signature (DPMS) Scheme
- Baby Step Giant Step Algorithms in Point Counting of Hyperelliptic Curves
- A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields(Discrete Mathematics and Its Applications)
- Realization of Geometric Illusions Using a Lateral-Inhibitive Shifting Model and Intrinsic Geometry of Subjective Visual Space
- An Extension of GHS Weil Descent Attack(Public Key Cryptography)(Cryptography and Information Security)
- Invariant Extraction and Segmentation of 3D Objects Using Linear Lie Algebra Models(Regular Section)
- A secure ID based authenticated key agreement scheme with pairing(情報通信基礎サブソサイエティ合同研究会)
- A secure ID based authenticated key agreement scheme with pairing(情報通信基礎サブソサイエティ合同研究会)
- A secure ID based authenticated key agreement scheme with pairing(情報通信基礎サブソサイエティ合同研究会)