In computational number theory and computational algebra, Pollard's kangaroo algorithm (also Pollard's lambda algorithm, see below) is an algorithm… (More)

Semantic Scholar uses AI to extract papers important to this topic.

2015

2015

- Steven D. Galbraith, Ping Wang, Fangguo Zhang
- Adv. in Math. of Comm.
- 2015

The negation map can be used to speed up the computation of elliptic curve discrete logarithms using either the baby-step giant… (More)

Is this relevant?

2015

2015

- Alex Fowler, Steven D. Galbraith
- ArXiv
- 2015

The interval discrete logarithm problem is defined as follows: Given some g, h in a group G, and some N ∈ N such that gz = h for… (More)

Is this relevant?

2014

2014

- Tanja Lange, Christine van Vredendaal, Marnix Wakker
- CARDIS
- 2014

Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do… (More)

Is this relevant?

2013

2013

- H. Razik, Mohamed El Kamel Oumaamar, Georges Clerc
- 2013 9th IEEE International Symposium on…
- 2013

Even if the asynchronous machine is widely used in industrial process under speed variable, we have to monitor the process which… (More)

Is this relevant?

2011

2011

- Mario Romsy
- IACR Cryptology ePrint Archive
- 2011

In [BKT11] Baba, Kotyada and Teja introduced the FACTOR problem over non-abelian groups as base of an ElGamal-like cryptosystem… (More)

Is this relevant?

2010

2010

- Steven D. Galbraith, John M. Pollard, Raminder S. Ruprai
- Math. Comput.
- 2010

The discrete logarithm problem in an interval of size N in a group G is: Given g, h ∈ G and an integer N to find an integer 0 ≤ n… (More)

Is this relevant?

2009

2009

- David Jao, Kayo Yoshida
- Pairing
- 2009

The Boneh-Boyen signature scheme is a pairing based short signature scheme which is provably secure in the standard model under… (More)

Is this relevant?

2005

2005

- Viorel Mînzu, Liviu Beldiman
- (ISATP 2005). The 6th IEEE International…
- 2005

This paper presents a discrete optimization system implementing a parallel hybrid metaheuristic. This is obtained by joining a… (More)

Is this relevant?

2003

2003

- Peter James Leadbitter, Nigel P. Smart
- ISC
- 2003

In this paper we present the first lattice attack on an authenticated key agreement protocol, which does not use a digital… (More)

Is this relevant?

2002

2002

- Andreas Stein, Edlyn Teske
- Math. Comput.
- 2002

We show how to use the parallelized kangaroo method for computing invariants in real quadratic function fields. Specifically, we… (More)

Is this relevant?