Pollard's kangaroo algorithm

Known as: Pollard kangaroo, Pollard's lambda algorithm 
In computational number theory and computational algebra, Pollard's kangaroo algorithm (also Pollard's lambda algorithm, see below) is an algorithm… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2002-2015
012320022015

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The negation map can be used to speed up the computation of elliptic curve discrete logarithms using either the baby-step giant… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2015
2015
The interval discrete logarithm problem is defined as follows: Given some g, h in a group G, and some N ∈ N such that gz = h for… (More)
  • figure 3.1
Is this relevant?
2014
2014
Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
2013
2013
Even if the asynchronous machine is widely used in industrial process under speed variable, we have to monitor the process which… (More)
  • figure 1
  • figure 4
  • figure 2
  • table I
  • figure 6
Is this relevant?
2011
2011
In [BKT11] Baba, Kotyada and Teja introduced the FACTOR problem over non-abelian groups as base of an ElGamal-like cryptosystem… (More)
Is this relevant?
2010
2010
The discrete logarithm problem in an interval of size N in a group G is: Given g, h ∈ G and an integer N to find an integer 0 ≤ n… (More)
  • figure 1
  • table 1
Is this relevant?
2009
2009
The Boneh-Boyen signature scheme is a pairing based short signature scheme which is provably secure in the standard model under… (More)
Is this relevant?
2005
2005
This paper presents a discrete optimization system implementing a parallel hybrid metaheuristic. This is obtained by joining a… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 4
Is this relevant?
2003
2003
In this paper we present the first lattice attack on an authenticated key agreement protocol, which does not use a digital… (More)
Is this relevant?
2002
2002
We show how to use the parallelized kangaroo method for computing invariants in real quadratic function fields. Specifically, we… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?