Discrete logarithm

Known as: DLOG, GDLP, Generalized discrete logarithm problem 
In mathematics, a discrete logarithm is an integer k solving the equation bk = g, where b and g are elements of a finite group. Discrete logarithms… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2004
Highly Cited
2004
The aim of the paper is the construction of the index calculus algorithm for the discrete logarithm problem on elliptic curves… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We show in some detail how to implement Shor’s efficient quantum algorithm for discrete logarithms for the particular case of… (More)
  • table 1
  • table 2
  • table 3
  • figure 1
Is this relevant?
Highly Cited
1999
Highly Cited
1999
In this short note we describe an elementary technique which leads to a linear algorithm for solving the discrete logarithm… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
1 The Tate{Lichtenbaum pairing In the paper F-R] it is shown how the Tate pairing on Abelian varieties in Licht-enbaum`s version… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
This paper considers the computational complexity of the discrete logarithm and related problems in the context of “generic… (More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
A computer is generally considered to be a universal computational device; i.e., it is believed able to simulate any physical… (More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
Blind signature schemes, an important cryptographic primitive , are useful in protocols that guarantee the anonymity of the… (More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
The aim of the following paper is to show that the computation of the discrete logarithm in the m-torsion part of the divisor… (More)
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Recently, several algorithms using number field sieves have been given to factor a number n in heuristic expected time Ln[1/3; c… (More)
Is this relevant?
Highly Cited
1989
Highly Cited
1989
In a modern network system, data security technologies such as cryptosystems, signature schemes, etc., are indispensable for… (More)
  • table I
Is this relevant?