Author of the publication

Traps to the BGJT-algorithm for discrete logarithms.

, , and . LMS J. Comput. Math., 17 (Theory): 218-229 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traps to the BGJT-algorithm for discrete logarithms., , and . LMS J. Comput. Math., 17 (Theory): 218-229 (2014)Vector Sum Range Decision for Verifiable Multiuser Fuzzy Keyword Search in Cloud-Assisted IoT., , and . IEEE Internet Things J., 11 (1): 931-943 (January 2024)Factor Base Discrete Logarithms in Kummer Extensions., , and . IACR Cryptol. ePrint Arch., (2015)A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity., , , , and . Des. Codes Cryptogr., 87 (5): 971-986 (2019)Improvements on the Individual Logarithm Step in exTNFS., , , and . IACR Cryptology ePrint Archive, (2016)Factor base discrete logarithms in Kummer extensions., , and . Finite Fields Their Appl., (2018)LWE from non-commutative group rings., , and . Des. Codes Cryptogr., 90 (1): 239-263 (2022)Improving the Gaudry-Schost algorithm for multidimensional discrete logarithms., and . Des. Codes Cryptogr., 90 (1): 107-119 (2022)On Generating Coset Representatives of PGL2(Fq) in PGL2(Fq2)., and . Inscrypt, volume 9589 of Lecture Notes in Computer Science, page 167-177. Springer, (2015)LWE from Non-commutative Group Rings., and . IACR Cryptol. ePrint Arch., (2016)