{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:18:17Z","timestamp":1725495497405},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540430100"},{"type":"electronic","value":"9783540453116"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45311-3_19","type":"book-chapter","created":{"date-parts":[[2007,11,14]],"date-time":"2007-11-14T14:01:41Z","timestamp":1195048901000},"page":"195-213","source":"Crossref","is-referenced-by-count":9,"title":["Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree"],"prefix":"10.1007","author":[{"given":"Markus","family":"Maurer","sequence":"first","affiliation":[]},{"given":"Alfred","family":"Menezes","sequence":"additional","affiliation":[]},{"given":"Edlyn","family":"Teske","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,11,26]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/BF01181075","volume":"19","author":"E. Artin","year":"1924","unstructured":"E. Artin. \u201cQuadratische K\u00f6rper im Gebiete der h\u00f6heren Kongruenzen\u201d, Mathematische Zeitschrift, 19 (1924), 207\u2013246.","journal-title":"Mathematische Zeitschrift"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"95","DOI":"10.2307\/2007876","volume":"48","author":"D. Cantor","year":"1987","unstructured":"D. Cantor, \u201cComputing in the jacobian of a hyperelliptic curve\u201d, Math. Comp., 48 (1987), 95\u2013101.","journal-title":"Math. Comp"},{"key":"19_CR3","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1006\/jsco.1996.0126","volume":"24","author":"M. Daberkow","year":"1997","unstructured":"M. Daberkow, C. Fieker, J. Kl\u00fcners, M. Pohst, K. Roegner, M. Sch\u00f6rnig, K. Wildanger, \u201cKANT V4\u201d, J. Symbolic Computation, 24 (1997), 267\u2013283.","journal-title":"J. Symbolic Computation"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"A. Enge, P. Gaudry, \u201cA general framework for subexponential discrete logarithm algorithms\u201d, Acta Arithmetica, to appear.","DOI":"10.4064\/aa102-1-6"},{"key":"19_CR5","first-page":"281","volume":"15","author":"M. Fouquet","year":"2000","unstructured":"M. Fouquet, P. Gaudry, R. Harley, \u201cAn extension of Satoh\u2019s algorithm and its implementation\u201d, J. Ramanujan Mathematical Society, 15 (2000), 281\u2013318.","journal-title":"J. Ramanujan Mathematical Society"},{"key":"19_CR6","unstructured":"G. Frey, \u201cHow to disguise an elliptic curve (Weil descent)\u201d, Talk at ECC\u2019 98, Waterloo, 1998."},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"865","DOI":"10.2307\/2153546","volume":"62","author":"G. Frey","year":"1994","unstructured":"G. Frey, H. R\u00fcck, \u201cA remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves\u201d, Math. Comp., 62 (1994), 865\u2013874.","journal-title":"Math. Comp"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"S. Galbraith, F. Hess, N. Smart, \u201cExtending the GHS Weil descent attack\u201d, preprint, 2001.","DOI":"10.1007\/3-540-46035-7_3"},{"key":"19_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/3-540-46665-7_23","volume-title":"Codes and Cryptography","author":"S. Galbraith","year":"1999","unstructured":"S. Galbraith, N. Smart, \u201cA cryptographic application of Weil descent\u201d, Codes and Cryptography, LNCS 1746, 1999, 191\u2013200."},{"key":"19_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/3-540-45539-6_2","volume-title":"Advances in Cryptology\u2014Eurocrypt 2000","author":"P. Gaudry","year":"2000","unstructured":"P. Gaudry, \u201cAn algorithm for solving the discrete log problem on hyperelliptic curves\u201d, Advances in Cryptology\u2014Eurocrypt 2000, LNCS 1807, 2000, 19\u201334."},{"key":"19_CR11","unstructured":"P. Gaudry, F. Hess, N. Smart, \u201cConstructive and destructive facets of Weil descent on elliptic curves\u201d, preprint, January 2000."},{"key":"19_CR12","unstructured":"F. Hess, KASH program for performing the GHS attack, 2000."},{"key":"19_CR13","unstructured":"Internet Engineering Task Force, The OAKLEY Key Determination Protocol, IETF RFC 2412, November 1998."},{"key":"19_CR14","unstructured":"M. Jacobson, A. Menezes, A. Stein, \u201cSolving elliptic curve discrete logarithm problems using Weil descent\u201d, J. Ramanujan Mathematical Society, to appear."},{"key":"19_CR15","unstructured":"A. Joux. Personal communication. June 2001."},{"key":"19_CR16","unstructured":"A. Joux, R. Lercier, \u201cImprovements on the general number field sieve for discrete logarithms in finite fields\u201d, Math. Comp., to appear."},{"key":"19_CR17","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"A. Menezes","year":"1993","unstructured":"A. Menezes, T. Okamoto, S. Vanstone, \u201cReducing elliptic curve logarithms to logarithms in a finite field\u201d, IEEE Trans. Info. Th., 39 (1993), 1639\u20131646.","journal-title":"IEEE Trans. Info. Th"},{"key":"19_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/3-540-45353-9_23","volume-title":"Topics in Cryptology\u2014CT-RSA 2001","author":"A. Menezes","year":"2001","unstructured":"A. Menezes, M. Qu, \u201cAnalysis of the Weil descent attack of Gaudry, Hess and Smart\u201d, Topics in Cryptology\u2014CT-RSA 2001, LNCS 2020, 2001, 308\u2013318."},{"key":"19_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","author":"P. Oorschot van","year":"1999","unstructured":"P. van Oorschot, M. Wiener, \u201cParallel collision search with cryptanalytic applications\u201d, J. Cryptology, 12 (1999), 1\u201328.","journal-title":"J. Cryptology"},{"key":"19_CR20","doi-asserted-by":"publisher","first-page":"1233","DOI":"10.1090\/S0025-5718-99-01066-2","volume":"68","author":"S. Paulus","year":"1999","unstructured":"S. Paulus, H. R\u00fcck, \u201cReal amd imaginary quadratic representations of hyperelliptic function fields\u201d, Math. Comp., 68 (1999), 1233\u20131241.","journal-title":"Math. Comp"},{"key":"19_CR21","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S. Pohlig","year":"1978","unstructured":"S. Pohlig, M. Hellman, \u201cAn improved algorithm for computing logs over GF(p) and its cryptographic significance\u201d, IEEE Trans. Info. Th., 24 (1978), 106\u2013110.","journal-title":"IEEE Trans. Info. Th"},{"key":"19_CR22","doi-asserted-by":"publisher","first-page":"918","DOI":"10.2307\/2006496","volume":"32","author":"J. Pollard","year":"1978","unstructured":"J. Pollard, \u201cMonte Carlo methods for index computation mod p\u201d, Math. Comp., 32 (1978), 918\u2013924.","journal-title":"Math. Comp"},{"key":"19_CR23","first-page":"247","volume":"15","author":"T. Satoh","year":"2000","unstructured":"T. Satoh, \u201cThe canonical lift of an ordinary elliptic curve over a finite field and its point counting\u201d, J. Ramanujan Mathematical Society, 15 (2000), 247\u2013270.","journal-title":"J. Ramanujan Mathematical Society"},{"key":"19_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/BFb0054891","volume-title":"Algorithmic Number Theory","author":"E. Teske","year":"1998","unstructured":"E. Teske, \u201cSpeeding up Pollard\u2019s rho method for computing discrete logarithms\u201d, Algorithmic Number Theory, LNCS 1423, 1998, 541\u2013554."}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2014 INDOCRYPT 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45311-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T08:18:21Z","timestamp":1556957901000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45311-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540430100","9783540453116"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-45311-3_19","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}