Aitken and Neville Inverse Interpolation Methods over Finite Fields
暂无分享,去创建一个
Michael N. Vrahatis | E. C. Laskari | G. C. Meletiou | M. N. Vrahatis | E. Laskari | G. Meletiou | M. Vrahatis
[1] Gary L. Mullen,et al. A note on discrete logarithms in finite fields , 1992, Applicable Algebra in Engineering, Communication and Computing.
[2] Tanja Lange,et al. Incomplete character sums over finite fields and their application to the interpolation of the discrete logarithm by Boolean functions , 2002 .
[3] Gerasimos C. Meletiou,et al. Explicit form for the discrete logarithm over the field ${\rm GF}(p,k)$ , 1993 .
[4] J. Douglas Faires,et al. Numerical Analysis , 1981 .
[5] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[6] Andrew M. Odlyzko,et al. Discrete Logarithms: The Past and the Future , 2000, Des. Codes Cryptogr..
[7] Arne Winterhof,et al. Polynomial Interpolation of the Discrete Logarithm , 2002, Des. Codes Cryptogr..
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] Gary L. Mullen,et al. A polynomial representation for logarithms in GF(q) , 1986 .
[10] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[11] A. L. Wells,et al. A polynomial form for logarithms modulo a prime , 1984, IEEE Trans. Inf. Theory.
[12] Arne Winterhof,et al. A note on the interpolation of the Diffie-Hellman mapping , 2001 .
[13] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[14] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[15] Igor E. Shparlinski,et al. Cryptographic applications of analytic number theory - complexity lower bounds and pseudorandomness , 2003, Progress in computer science and applied logic.
[16] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[17] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[18] Harald Niederreiter,et al. A short proof for explicit formulas for discrete logarithms in finite fields , 1990, Applicable Algebra in Engineering, Communication and Computing.
[19] Ueli Maurer,et al. The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms , 1999, SIAM J. Comput..
[20] Leonard M. Adleman,et al. A subexponential algorithm for the discrete logarithm problem with applications to cryptography , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[21] Stephen C. Pohlig,et al. An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance , 2022, IEEE Trans. Inf. Theory.
[22] Gerasimos C. Meletiou. A Polynomial Representation for Exponents in Zp , 1992 .
[23] J. Miller. Numerical Analysis , 1966, Nature.