Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Torus-based cryptography

Known as: Torus based cryptography 
Torus-based cryptography involves using algebraic tori to construct a group for use in ciphers based on the discrete logarithm problem. This idea was… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A bstractThe geometry of elliptic fibrations translates to the physics of gauge theories in F-theory. We systematically develop… Expand
  • figure 1
  • figure 2
  • figure 3
  • table A.1
Is this relevant?
2016
2016
We give explicit parametrizations of the algebraic tori $$\mathbb {T}_{n}$$Tn over any finite field $$\mathbb {F}_{q}$$Fq for any… Expand
Is this relevant?
2012
2012
We introduce a constructive model for algebraic tori based on reduced divisors on singular curves. By using a singular… Expand
Is this relevant?
2011
2011
  • Elisa Gorla
  • Encyclopedia of Cryptography and Security
  • 2011
  • Corpus ID: 8496573
We introduce cryptography based on algebraic tori, give a new public key system called CEILIDH, and compare it to other discrete… Expand
  • table 2
  • table 3
  • table 4
Is this relevant?
2008
2008
We present efficient compression algorithms for subgroups of multiplicative groups of finite fields, we use our compression… Expand
  • table 4
  • table 3
Is this relevant?
2006
2006
We use the Bateman-Horn conjecture to study the order of the set of Fq-rational points of primitive subgroups that arise in torus… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2004
2004
We introduce a compact and efficient representation of elements of the algebraic torus. This allows us to design a new discrete… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
The value of the Tate pairing on an elliptic curve over a finite field may be viewed as an element of an algebraic torus. Using… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We introduce the concept of torus-based cryptography, give a new public key system called CEILIDH, and compare it to other… Expand
Is this relevant?
1985
1985
Let X be a semisimple algebraic monoid with unit group G. Associated with E is its polyhedral root system ( X , @, C), where X… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?