skip to main content
research-article

Fast evaluation of logarithms in fields of characteristic two

Published: 01 September 2006 Publication History

Abstract

A method for determining logarithms in GF (2^{n}) is presented. Its asymptotic running time is O(exp (cn^{1/3} log^{2/3} n)) for a small constant c, while, by comparison, Adleman's scheme runs in time O(exp (c^{'}n^{1/2} log^{1/2} n )) . The ideas give a dramatic improvement even for moderate-sized fields such as GF (2^{127}), and make (barely) possible computations in fields of size around 2^{400} . The method is not applicable to GF (q) for a large prime q .

Cited By

View all
  • (2022)Democratizing CryptographyundefinedOnline publication date: 24-Aug-2022
  • (2021)An Efficient HPRA-Based Multiclient Verifiable ComputationSecurity and Communication Networks10.1155/2021/66126142021Online publication date: 1-Jan-2021
  • (2020)Asymptotic Complexities of Discrete Logarithm Algorithms in Pairing-Relevant Finite FieldsAdvances in Cryptology – CRYPTO 202010.1007/978-3-030-56880-1_2(32-61)Online publication date: 17-Aug-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Information Theory
IEEE Transactions on Information Theory  Volume 30, Issue 4
July 1984
129 pages

Publisher

IEEE Press

Publication History

Published: 01 September 2006

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Democratizing CryptographyundefinedOnline publication date: 24-Aug-2022
  • (2021)An Efficient HPRA-Based Multiclient Verifiable ComputationSecurity and Communication Networks10.1155/2021/66126142021Online publication date: 1-Jan-2021
  • (2020)Asymptotic Complexities of Discrete Logarithm Algorithms in Pairing-Relevant Finite FieldsAdvances in Cryptology – CRYPTO 202010.1007/978-3-030-56880-1_2(32-61)Online publication date: 17-Aug-2020
  • (2019)Koblitz Curves over Quadratic FieldsJournal of Cryptology10.1007/s00145-018-9294-z32:3(867-894)Online publication date: 1-Jul-2019
  • (2016)A Survey of Public-Key Cryptographic Primitives in Wireless Sensor NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2015.245969118:1(577-601)Online publication date: 27-Jan-2016
  • (2016)Technical history of discrete logarithms in small characteristic finite fieldsDesigns, Codes and Cryptography10.1007/s10623-015-0147-678:1(73-85)Online publication date: 1-Jan-2016
  • (2015)Weakness of F 3 6 ⋅ 1429 and F 2 4 ⋅ 3041 for discrete logarithm cryptographyFinite Fields and Their Applications10.1016/j.ffa.2014.10.00932:C(148-170)Online publication date: 1-Mar-2015
  • (2013)A New Index Calculus Algorithm with Complexity $$L1/4+o1$$ in Small CharacteristicRevised Selected Papers on Selected Areas in Cryptography -- SAC 2013 - Volume 828210.1007/978-3-662-43414-7_18(355-379)Online publication date: 14-Aug-2013
  • (2013)Weakness of $\mathbb{F}_{3^{6 \cdot 509}}$ for Discrete Logarithm Cryptography6th International Conference on Pairing-Based Cryptography --- Pairing 2013 - Volume 836510.1007/978-3-319-04873-4_2(20-44)Online publication date: 22-Nov-2013
  • (2012)A survey on fast correlation attacksCryptography and Communications10.1007/s12095-012-0062-x4:3-4(173-202)Online publication date: 1-Dec-2012
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media