On Computing Logarithms Over Finite Fields
暂无分享,去创建一个
[1] S. Vanstone,et al. Computing Logarithms in Finite Fields of Characteristic Two , 1984 .
[2] Ralph C. Merkle,et al. Secrecy, authentication, and public key systems , 1979 .
[3] M.E. Hellman,et al. Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.
[4] Andrew M. Odlyzko,et al. Discrete Logarithms in Finite Fields and Their Cryptographic Significance , 1985, EUROCRYPT.
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Justin M. Reyneri,et al. Fast Computation of Discrete Logarithms in GF(q) , 1982, CRYPTO.
[7] Leonard M. Adleman,et al. A subexponential algorithm for the discrete logarithm problem with applications to cryptography , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[8] Don Coppersmith,et al. Fast evaluation of logarithms in fields of characteristic two , 1984, IEEE Trans. Inf. Theory.
[9] T. Elgamal. A subexponential-time algorithm for computing discrete logarithms over GF(p^2) , 1985 .