# Discrete logarithm

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

Highly Cited

2004

Highly Cited

2004

- IACR Cryptology ePrint Archive
- 2004

The aim of the paper is the construction of the index calculus algorithm for the discrete logarithm problem on elliptic curvesâ€¦Â (More)

Is this relevant?

Highly Cited

2003

Highly Cited

2003

- Quantum Information & Computation
- 2003

We show in some detail how to implement Shorâ€™s efficient quantum algorithm for discrete logarithms for the particular case ofâ€¦Â (More)

Is this relevant?

Highly Cited

1999

Highly Cited

1999

- Journal of Cryptology
- 1999

In this short note we describe an elementary technique which leads to a linear algorithm for solving the discrete logarithmâ€¦Â (More)

Is this relevant?

Highly Cited

1999

Highly Cited

1999

- IEEE Trans. Information Theory
- 1999

1 The Tate{Lichtenbaum pairing In the paper F-R] it is shown how the Tate pairing on Abelian varieties in Licht-enbaum`s versionâ€¦Â (More)

Is this relevant?

Highly Cited

1997

Highly Cited

1997

- EUROCRYPT
- 1997

This paper considers the computational complexity of the discrete logarithm and related problems in the context of â€œgenericâ€¦Â (More)

Is this relevant?

Highly Cited

1994

Highly Cited

1994

- FOCS
- 1994

A computer is generally considered to be a universal computational device; i.e., it is believed able to simulate any physicalâ€¦Â (More)

Is this relevant?

Highly Cited

1994

Highly Cited

1994

- EUROCRYPT
- 1994

Blind signature schemes, an important cryptographic primitive , are useful in protocols that guarantee the anonymity of theâ€¦Â (More)

Is this relevant?

Highly Cited

1994

Highly Cited

1994

- 1994

The aim of the following paper is to show that the computation of the discrete logarithm in the m-torsion part of the divisorâ€¦Â (More)

Is this relevant?

Highly Cited

1993

Highly Cited

1993

- SIAM J. Discrete Math.
- 1993

Recently, several algorithms using number field sieves have been given to factor a number n in heuristic expected time Ln[1/3; câ€¦Â (More)

Is this relevant?

Highly Cited

1989

Highly Cited

1989

- IEEE Journal on Selected Areas in Communications
- 1989

In a modern network system, data security technologies such as cryptosystems, signature schemes, etc., are indispensable forâ€¦Â (More)

Is this relevant?