Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Discrete logarithm
Known as:
DLOG
, GDLP
, Generalized discrete logarithm problem
Expand
In mathematics, a discrete logarithm is an integer k solving the equation bk = g, where b and g are elements of a finite group. Discrete logarithms…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Algorithm
BQP
Berlekamp's algorithm
Birthday attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
New dynamic ID authentication scheme using smart cards
Jia-Lun Tsai
,
Tzong-Chen Wu
,
Kuo-Yu Tsai
International Journal of Communication Systems
2010
Corpus ID: 13539873
Recently, Yoon et al. and Wang et al. independently proposed a dynamic ID authentication scheme and claimed that their schemes…
Expand
2010
2010
Fixed Points for Discrete Logarithms
Mariana Levin
,
C. Pomerance
,
K. Soundararajan
International Workshop on Ant Colony Optimization…
2010
Corpus ID: 810247
We establish a conjecture of Brizolis that for every prime p > 3 there is a primitive root g and an integer x in the interval [1…
Expand
2009
2009
Efficient migration access control for mobile agents
Y. Chung
,
Tzer-Shyong Chen
,
Ming-Wei Lai
Comput. Stand. Interfaces
2009
Corpus ID: 20949632
2009
2009
An Improved Algorithm for Discrete Logarithm Problem
Jun Zhang
,
Liqun Chen
International Conference on Environmental Science…
2009
Corpus ID: 12786914
The difficulty in solving the discrete logarithm problem (DLP) is very important to the cryptography since it is widely used in…
Expand
2009
2009
Discrete logarithms for finite groups
L. Klingler
,
S. Magliveras
,
F. Richman
,
Michal Sramka
Computing
2009
Corpus ID: 16542876
We present group-theoretic and cryptographic properties of a generalization of the traditional discrete logarithm problem from…
Expand
2005
2005
Designated-Verifier Proxy Signature Schemes
Guilin Wang
IFIP International Information Security…
2005
Corpus ID: 2158379
In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign…
Expand
1999
1999
RSA-based fail-stop signature schemes
W. Susilo
,
R. Safavi-Naini
,
J. Pieprzyk
Cooperative Multimodal Communication
1999
Corpus ID: 13628558
Fail-stop signatures provide security for a sender against a forger with unlimited computational power. In this paper we present…
Expand
Highly Cited
1998
Highly Cited
1998
An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms
F. Bao
Smart Card Research and Advanced Application…
1998
Corpus ID: 35370563
A verifiable encryption scheme (VES) is useful for many cryptographic protocols. A VES may be either for (encryption of) discrete…
Expand
1998
1998
Computing Discrete Logarithms with Quadratic Number Rings
Damian Weber
International Conference on the Theory and…
1998
Corpus ID: 16670691
At present, there are two competing index calculus variants for computing discrete logarithms in (ℤ/pℤ)* in practice. The purpose…
Expand
Highly Cited
1994
Highly Cited
1994
Test embedding with discrete logarithms
Mody Lempel
,
S. Gupta
,
M. Breuer
Proceedings of the ... IEEE VLSI Test Symposium
1994
Corpus ID: 5894578
When using Built-In Self Test (BIST) for testing VLSI circuits, a major concern is the generation of proper test patterns that…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE